.Part 5 Storage Security Best Practices and Support Information HP SAN Design Reference Guide 785355-001

21 Storage security
This chapter describes storage security best practices. It describes the following topics:
“Storage security threats (page 369)
“Storage security compliance (page 370)
“Security technologies (page 370)
“HP security strategy (page 372)
“Storage security best practices (page 374)
Assessing security risks (page 374)
“HP storage security solutions” (page 375)
Storage security threats
Securing SAN environments has become an increasingly important aspect of data security. IT
organizations face many security threats and must comply with numerous industry and government
regulations. In the past, IT organizations accepted that authentication issues were handled by the
network architecture; they were not responsible for SAN security.
The NSA IATF defines five security attack classes that you should consider when defining your
solution (Table 191).
Table 191 Security attack classes
DescriptionAttack class
Attacks that can disclose information to an attacker.
Passive attacks include:
Passive
Analyzing traffic
Monitoring unprotected communications
Decrypting weakly encrypted traffic
Capturing authentication information (passwords)
An example of a passive attack is the disclosure of information such as credit card numbers and
passwords.
Attacks that can disclose information, deny service, or modify data.
Active attacks include:
Active
Attempting to circumvent or break protection features
Introducing malicious code
Stealing or modifying information
Attacking a network backbone
Exploiting in-transit information
Penetrating an enclave
Attacking when a remote user attempts to connect to an enclave
Attacks by an unauthorized user who is in close physical proximity to networks, systems, or facilities.
The user may attempt to gather or modify information, or deny authorized users access to information.
Close-in
Unauthorized attacks by an authorized user can be malicious or nonmalicious.
Malicious attackers can:
Insider
Eavesdrop
Steal or damage data
Storage security threats 369