Best Practices For Preserving Security
|
|
|
|
|
The centralisation of branch office servers and storage enables enterprises to more effectively manage and secure critical business information.
By moving servers out of branch offices and consolidating IT infrastructure to fewer, purpose-built data centres, enterprises can protect vital business resources through tight physical security and well-defined access procedures.
In addition, server centralisation reduces sensitive user credential stores, helping to ensure that this information remains protected from unauthorised access.
Server centralisation also facilitates adherence to corporate and regulatory compliance policies, which mitigates a companys overall risk of exposure. It enables IT staff to easily, and more cost effectively, identify deviations from established guidelines, such as Sarbanes Oxley, Basel II, and the Health Insurance Portability and Accountability Act (HIPAA), and take appropriate remediation steps when necessary.
However, because of limitations in existing WAN technology, server centralisation can compromise application performance across a distributed enterprise. As a result, WAN acceleration becomes a necessary component to any centralization project as a way to maintain adequate performance. In fact, recent surveys indicate that as many as 90% of respondents are expecting to invest in new application acceleration solutions to address this challenge in the coming years.
While WAN acceleration is a great way to improve application performance, many of these types of solutions can have an adverse impact on security if not implemented properly. For example, many approaches are based on a concept called data reduction, which means they employ local hard drives to store information in real-time and deliver duplicate data locally whenever possible. While data reduction dramatically improves performance, it can make a company more vulnerable to security threats and risks because of lack of encryption on the local appliance. However, there are several basic measures that can ensure that new acceleration products are secure enough to protect vital business resources.
Regardless of the technology used, when new appliances are inserted into a network infrastructure to accelerate application performance, some basic security guidelines can be observed to ensure that they do not compromise data security. Whenever business critical information is stored on a local hard drive, as is the case with WAN acceleration devices that employ data reduction techniques, encryption should be implemented to protect this information from unauthorized access. Even if proprietary methods are used to store this information, and the data has a tendency to be scrambled over time as new information is stored, its still quite possible that large pieces of information will be stored on the appliance as contiguous blocks.
These blocks can contain sensitive information, such as social security numbers, which can be extracted by someone who has access to the appliances partition. By encrypting the local data store, this risk is avoided. Typically, encryption should take place in hardware so as not to adversely impact the performance and scalability of the appliance.
IPsec is often used between appliances to secure data transfer over the WAN. Once again, performing encryption in hardware can ensure that security does not come at the expense of performance. Industry best practices recommend that a 128-bit encoding scheme, such as AES, be used when performing encryption. Older methods, such as 56-bit DES, are easily broken, which is why industry leaders such as Microsoft have moved away from that technology. IPsec can be performed outside of the acceleration appliance, but it typically must occur downstream of this device. Otherwise, the appliance will not have visibility into traffic traversing the WAN, limiting its ability to provide significant performance gains.
TACACS+ and/or RADIUS can be used to prevent unauthorised users from accessing network acceleration appliances. In addition, secure interfaces can be provided on all management consoles, including SNMPv3 and HTTPs. User credentials should be stored in as few places as possible, preferably in a secure environment, such as a purpose-built data centre.
As more and more enterprises undergo server centralisation projects, new products will be introduced to improve network and application performance. By following basic security precautions, enterprises can ensure that these performance improvements do not come at the expense of data security. In fact, by enabling the centralisation of key resources, enterprises are actually increasing their ability to secure business information, which ultimately ensures better compliance with the key regulatory measures that are having an increasingly complicated effect on the way that everyone does business.
Craig Stouffer, Silver Peak
BIOS, Dec 22, 06 | Print | Send | Comments (0) | Posted In Networking
Related Articles
E-Filing For Beginners
Me, Myself & iPod
Turning Regulation Lemons To Lemonade
Test Before You Leap
A Practical Guide To Continuity Planning
Self-Destructing Video E-Mail Introduced
GlobalScape CuteFTP Professional 8.0
IPSWITCH TRANSFERS WS_FTP INTO YOUR CHRISTMAS STOCKING
Using Compliance To Your Advantage
The Lost Art Of Managing Risk
More...
|