The Register® — Biting the hand that feeds IT

Feeds

Deciphering the secrets of network encryption

Focus on all-round security

Email delivery: Hate phishing emails? You'll love DMARC

Modern data centres are pools of shared resources and segmenting the data in them has become a requirement as much for regulatory as for security reasons. It is no longer enough simply to provide access and expect individual users to take care of security themselves.

Relying on file system permissions or even virtual provisioning is inadequate. The larger the datacentre, the more critical that end-to-end security, with a focus on encryption, becomes.

The benefits of encrypting mobile devices have repeatedly become painfully obvious.

Encrypting websites is now mainstream, though the system requires major revision. Less popular – but just as important in shared environments – are the back-end encryption systems available to large data centres.

Tower of Babel

Modern filers offer encryption. Network switches offer encryption. But making sure that all of the various widgets can talk to each other is where everything becomes a little sticky: past a certain point, manually managing encryption keys is simply not feasible.

Keeping track of your encryption keys is the job of an enterprise key management system (EKMS).

Enterprise players in many markets each have their own solution to this problem. The two most popular EKMS offerings available are from RSA and NetApp. To avoid key management sprawl, other encrypted devices must be capable of working with these systems.

Safe take-off

Key management interoperability is vital and standards are important for any large-scale encryption project to succeed. The Oasis Key Management Interoperability Protocol (KMIP) is one worthy initiative in this space, allowing servers, storage, switches and other devices created by different manufacturers to operate effectively in a unified environment.

Brocade is an example of a participating vendor, offering network encryption products designed to provide both encryption at rest (disk based), as well as in flight (network based).

NetApp is another involved vendor, offering storage filers as well as key management software. Assemble the various pieces, and you can achieve a robust encryption environment.

Locked out

Data on the filer is encrypted. Even if somebody walks away with the disks, they would have little chance of interpreting anything intelligible without access to the key management system and the appropriate permissions.

Data being written to tape can be encrypted. This is important as backup tapes are often overlooked as a potential security breach.

The transmission of data between the filer, the switch and the end HBA can all be encrypted. It is not inconceivable that attempts will be made to sniff information on the wire and the right algorithms can make decrypting this information without detection nearly impossible.

The existence of rainbow tables – as well as projects devoted to completing them – requires a constant march toward newer and more complex encryption algorithms.

You would be unlikely to sneak that much gear into somebody’s data centre without being noticed

Today, AES-256 should be considered the minimum security standard employed on any network. Though theoretically it is a vulnerable algorithm, the equipment required to attack AES-256 is still measured in acres.

You would be unlikely to sneak that much gear into somebody’s data centre, or park it outside, without being noticed. Nor is there any chance of being able to attack AES-256 remotely: the bandwidth requirements would be extraordinary.

Encryption and segmentation of data at the network level is an expected security element of modern large-scale networks. On its own, the security it provides is not enough. Yet neither do any other standard security precautions provide a complete solution.

Network encryption is one piece of the puzzle whose various pieces have to be tracked and managed throughout their lifetime. ®

5 ways to reduce advertising network latency

Whitepapers

Microsoft’s Cloud OS
System Center Virtual Machine manager and how this product allows the level of virtualization abstraction to move from individual physical computers and clusters to unifying the whole Data Centre as an abstraction layer.
5 ways to prepare your advertising infrastructure for disaster
Being prepared allows your brand to greatly improve your advertising infrastructure performance and reliability that, in the end, will boost confidence in your brand.
Supercharge your infrastructure
Fusion­‐io has developed a shared storage solution that provides new performance management capabilities required to maximize flash utilization.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Avere FXT with FlashMove and FlashMirror
This ESG Lab validation report documents hands-on testing of the Avere FXT Series Edge Filer with the AOS 3.0 operating environment.

More from The Register

next story
Multipath TCP: Siri's new toy isn't a game-changer
This experiment is an alpha and carriers could swat it like a bug
Barmy Army to get Wi-Fi to the seat for cricket's Ashes
Sydney Test Match will offer replays to the smartmobe
Dedupe-dedupe, dedupe-dedupe-dedupe: Flashy clients crowd around Permabit diamond
3 of the top six flash vendors are casing the OEM dedupe tech, claims analyst
Seagate to storage bods: You CAN touch this (at last). Stop, HAMR time
We've talked about it for a while... next month, you'll actually *see* it
Disk-pushers, get reel: Even GOOGLE relies on tape
Prepare to be beaten by your old, cheap rival
Dragons' Den star's biz Outsourcery sends yet more millions up in smoke
Telly moneybags went into the cloud and still nobody's making any profit
Hong Kong's data centres stay high and dry amid Typhoon Usagi
180 km/h winds kill 25 in China, but the data centres keep humming
prev story