12.07.2015 Views

Strategies for Data Protection - Brocade

Strategies for Data Protection - Brocade

Strategies for Data Protection - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

SAN SecuritySecuring the SAN <strong>Data</strong> TransportThe fact that the majority of SANs are based on Fibre Channel insteadof TCP/IP has created a false sense of security <strong>for</strong> data center storagenetworks. Hacking Fibre Channel data streams would require veryexpensive equipment and a high degree of expertise. In addition, thephysical security of data center environments is often assumed to providesufficient protection against malfeasance. As SAN technology hasbecome ubiquitous in data centers, however, no one should assumethat the SANs are inherently secure. Simply reconfiguring a server so itnow has access to designated storage assets could enable unauthorizedaccess to valuable corporate in<strong>for</strong>mation.Although Fibre Channel has relied on the physical separation of communicationnetworks and storage networks to provide a rudimentarysecurity barrier, modern business practices require a much higherassurance of data defense. Physical isolation alone does not providesecurity against internal attacks or inadvertent configuration errors.The storage industry has there<strong>for</strong>e responded with a spectrum ofsecurity capabilities to provide a high degree of data protection, whilestill maintaining the per<strong>for</strong>mance required <strong>for</strong> storage applications.ZoningAt a low level, zoning of resources in the SAN provides authorizedaccess between servers and storage ports through the Fibre Channelnetwork or fabric as illustrated in Figure 13. Zoning can be port based,restricting access by authorizing only designated Fibre Channel switchports and attached devices to communicate to each other. Alternately,zoning can be based on a 64-bit Fibre Channel World Wide Name(WWN). Since each Fibre Channel device has a unique WWN, it is possibleto authorize connections based on the unique identity of eachdevice.<strong>Strategies</strong> <strong>for</strong> <strong>Data</strong> <strong>Protection</strong> 25

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!