Keeping stored data safe within company walls
Storage professionals protect data with encryption and key management
Computerworld - BECU, Washington state's largest credit union, used to keep its stored data locked down using an appliance to encrypt data before it was stored to tape. But when it had the opportunity to upgrade storage equipment, the company chose a simpler, cheaper and perhaps more secure option -- an application that encrypts tapes in the tape library.
The appliance "was the best solution at the time," says Kathryn Antonetti, IT systems and security manager at Tukwila-based BECU, a not-for-profit financial cooperative with assets of more than $8.5 billion. "Now encryption is being offered at virtually every layer." The switch eliminated maintenance and training costs for the appliance, and other headaches. "I had [three vendors] pointing fingers at each other" when the system had problems, she adds.
Protecting stored information is the next wave in data security. "We're starting to see more emphasis on data at rest," says Robert Rosen, former president of IBM user group Share and CIO at the National Institute of Arthritis and Musculoskeletal and Skin Diseases in Bethesda, Md. "It's kind of a no-brainer. If you've done it, your [data is] protected and you don't have to worry about it."
As companies upgrade their storage equipment, many are taking advantage of technological advances such as tape drive encryption, tape library encryption and enhancements in the way encryption keys are managed. There has also been progress in adopting the disk and tape encryption specifications of the IEEE P1619 standard, says James Damoulakis, chief technology officer at storage services provider GlassHouse Technologies Inc. "Still, it's fair to say that [storage security] has lost some momentum" because of policy and process limitations, says Damoulakis, who is a Computerworld columnist.
"There's a feeling that [data in storage] is a locked door -- so it's not a high priority," Rosen says. "But I think that's ultimately going to change with the turnover of equipment."
"Unfortunately, most companies wait until the problem exists before fixing it," says Ari Kaplan, a senior consultant at Datalink Corp. in Chanhassen, Minn., and former president of the Independent Oracle Users Group.
With data security breaches now costing companies $202 per compromised record, according to the Ponemon Institute, it's time to start locking down data at rest. Here are three techniques for protecting stored data.
Gartner Inc. has found that companies that encrypt stored data do so because they have to, not because they want to. "There are regulatory compliance pressures -- PCI or HIPAA," says Gartner analyst Eric Ouellet, referring to the Payment Card Industry Data Security Standard and the Health Insurance Portability and Accountability Act. "Or it's the fear that the tape will fall off the back of the truck and you'll have a disclosure issue."
What's more, most encryption systems can get pricey. "When you're looking at the cost associated with this, whether it's the time to deploy or the amount of [labor] or the actual cost in dollars of the solution -- these things are not cheap," Ouellet adds.
A less expensive way to add encryption is to use the capabilities that come built into many applications, Ouellet advises. "You'll have to pay for it, but it's needed, and as far as integration is concerned, it's not going to take an inordinate amount of time," he says.
Looking for an ultracheap approach? Ouellet suggests buying a hard drive with built-in encryption. Seagate, Toshiba and Hitachi are among the vendors introducing self-encrypting drives. "It costs only a few bucks more to buy a drive with encryption," Ouellet says. "The applications aren't even aware there's any encryption. It's all in the background at the low-level driver level."
But keep in mind that self-encrypting drives address only storage issues, Ouellet warns. "As far as the application is concerned, once it reads the data off the drive, it's in clear text -- and in a backup, it's in clear text," he says. "Only in the storage environment is it safe."
On the bright side, self-encrypting drives will be helpful down the road when you have to dispose of a drive, Ouellet adds. "I can just lose or dispose of the key that was on that drive. Then the data is gone."
- 2014 Healthcare Data Management Survey Summary This report provides insights into how much information Healthcare IT organizations are managing, the rate of data growth they are experiencing and which...
- State of Cloud Security Report In a relatively short time, cloud computing, specifically Infrastructure-as a-Service, has shifted from a new but unproven approach to an accepted, even inevitable,...
- What is this "File Sync" Thing and Why Should I Care About It? All of a sudden, getting a file from your work laptop to your iPad became as simple as clicking "Save." So it's no...
- Server and system administrators challenged to keep up with enterprise storage explosion Read this whitepaper to learn how administrators are leveraging their existing skills to simplify the management of storage and servers.
- Brunswick Moves Messaging and Collaboration to the IBM cloud Gerry Orten, Jr, Electronic Messaging Manager at Brunswick talks about why Brunswick moved to the IBM cloud.
- Increase Your Data Center IQ Discover how to improve network efficiency, lower IT costs and more proactively manage your physical, virtual and cloud environments. All Data Storage White Papers | Webcasts