2 Overview Surveys reveal time and again that security and data protection concerns are the top barriers to Cloud adoption. At, we take these concerns seriously and have made security an integral part of our storage offering. Our storage-as-a-service (STaaS) offering is based on Zadara s Virtual Private Storage Array (VPSA) technology. 365 Cloud Storage provides physical security, access, data privacy and data encryption to ensure security and data privacy. With multiple layers of security, our customers can enjoy full, end-to-end data privacy and protection from our physical storage infrastructure all the way to customers physical or virtual servers. Physical security 365 Cloud Storage is physically located in HIPAA and SSAE 16 compliant data centers. Access Control Private network access is provided via a dedicated cross connects, metro Ethernet or metro fiber connectivity. Additionally, the VPSA GUI and RESTful API uses HTTPS and 256-bit SSL-encrypted communication and secure identity management system. Data Privacy The VPSA architecture provides complete data privacy for end users by granting dedicated compute resources (RAM and CPU vcores) and dedicated networking resources (NIC VFs) to partition IO stack data handling per-user as well as dedicated physical drives. The VPSA also requires the usage of Challenge-Handshake Authentication Protocol (CHAP) over iscsi to authenticate a Cloud Server to a VPSA. CHAP requires that both the Cloud Server and VPSA know a shared CHAP Secret. This secret is never sent on the wire. Data Encryption 365 Cloud Storage supports 128-bit Encryption of Data-at-Rest (DAR) and Data-in-Flight (DIF).
3 Physical security 365 Cloud Storage is physically located in all of 365 s seventeen U.S. data centers. Our data centers feature, at minimum, the following important physical security attributes: 24x7 surveillance Redundant power feeds and generators Robust fire suppression Carefully monitored climate control (to protect the servers that store customer data) HIPAA and SSAE 16 compliance Access Control Private Access Customers access 365 Cloud Storage securely via a cross connect from their colocation cabinet or a dedicated fiber or Ethernet Private Line into our data center. Cross connect options include Single Mode Fiber (1 Gbps or 10 Gbps) or Ethernet Copper (1 Gbps). Network connectivity options include Metro Fiber or Metro Ethernet (requires sub-4 ms RT latency. Secure Communication The 365 Cloud Console and VPSA expose RESTful API calls via the HTTPS protocol. This requires 256-bit SSL-encrypted communication and securely identifies the web server with which the client is communicating. The VPSA GUI client also communicates with the VPSA web server RESTful API via HTTPS to ensure the same level of security.
4 Identity Management Each end user creates an account within the 365 Cloud Console. The user s Cloud Console Password is not stored as plain text in the Cloud Console DB. Instead, a cryptographic hash value (using a one-way SHA-1 hash function) is stored for further Cloud Console login authentication. When a user creates the first VPSA at, a corresponding tenant is created within the Cloud Storage Identity Management Server (which is based on OpenStack Keystone). The Cloud Console generates a random 128-bit Tenant Password for that tenant and provides the password, in encrypted form, to the Identity Management Server. Thereafter, the Tenant Password is used by the Cloud Console and the VPSA for retrieving a Keystone API Token and establishing a session-based communication for managing the objects (i.e, VPSAs) belonging to that tenant. For accessing the VPSA (via API or GUI), the Cloud Console provides (via ) an initial 5-character temporary access code. This code can be used only once. The user is requested to enter a strong VPSA User Password to replace the 5-character temporary access code. The 365 Cloud Console Password and VPSA User Password can be different. This enables support for different permission levels (roles) within an organization. In the event a user forgets the VPSA password, an will be sent to the user with a new temporary 5-digit access code. The existing VPSA User Password will protect access to the VPSA until the new access code is used.
5 A cryptographic hash value (using a one-way SHA-1 hash function) of the VPSA User Password is stored in the VPSA database for further VPSA login authentication. 365 Cloud Storage employs a session-based authentication mechanism as a means to identify a user for every HTTP request to a VPSA. The client initiates a session by logging in with the VPSA User Password. Upon successful authentication, a Secret API Token is sent back to the client application for any subsequent REST API communication with the VPSA to identify the authenticated user and validate the session. A user can generate a new Secret API Token at any time, thus invalidating the previous token and any sessions using it. Data Privacy VPSA Architecture The VPSA architecture provides the basic building blocks for granting complete data privacy for cloud storage Users: Each VPSA Virtual Controller is granted dedicated compute resources (RAM and CPU vcores) and dedicated networking resources (NIC VFs) to partition IO stack data handling per-user. Physical drives are the basic storage allocation unit. As a result, only a single VPSA and hence a single User has access to any given physical drive. Physical drives are exposed as iscsi LUNs to the VPSA Virtual Controllers via a separate back-end network, which is not accessible from outside the Zadara Storage Cloud. IQN-based SCSI LUN Masking is used to ensure that physical disk drives are exposed only to the authorized VPSA.
6 Each user can look up the physical location (by Storage Node Number) of the drives assigned to that user. VPSA Virtual Volumes are presented as iscsi LUNs and are attached to selected Cloud Servers. Again, SCSI LUN Masking is used to prevent access to those Virtual Volumes from other Cloud Servers. CHAP VPSA requires the usage of Challenge-Handshake Authentication Protocol (CHAP) over iscsi to authenticate a Cloud Server to a VPSA. CHAP requires that both the Cloud Server and VPSA know a shared CHAP Secret. This secret is never sent on the wire. Each VPSA maintains its CHAP credentials. When a VPSA is created, it autogenerates CHAP Username (corresponding to the VPSA name) and a random 12-character CHAP Secret. A VPSA User can modify both CHAP Username and CHAP Secret at any time. Existing iscsi connections will remain valid, but the new credentials will be required for establishing new connections. A VPSA user must enter these values at the Cloud Server (iscsi Initiator) side to be able to establish an iscsi connection with the VPSA. The VPSA uses a 128-bit Secret Key to encrypt the CHAP Secret, using the Advanced Encryption Standard (AES), before storing the CHAP Secret on disk. The Secret Key itself is stored in a separate location in the Zadara Storage Cloud. The VPSA retrieves the Secret Key from the Zadara Storage Cloud at runtime, decrypts the CHAP Secret and stores it in Kernel Space only. This means that core-dumping the user-mode process of the VPSA will not reveal the decrypted CHAP Secret.
7 Data Encryption 365 Cloud Storage supports Encryption of Data-at-Rest (DAR) and Data-in- Flight (DIF). Because data encryption requires compute overhead, we leave it up to end users to evaluate the trade-off between security and performance. Hence both DAR and DIF encryption are optional features and are disabled by default. Encryption of Data-at-Rest Encryption management of Data-at-Rest is done at the VPSA Virtual Controller and is defined on a Volume-by-Volume basis, i.e. a user can decide that some Volumes are encrypted, while others are not. A VPSA generates a unique random 128-bit Encryption Key per encrypted Volume, and uses the Advanced Encryption Standard (AES) to encrypt and decrypt the Volume data. The Volume Encryption Keys are stored on disk as ciphertext, using AES with a 128-bit Master Encryption Key, which is generated from a usersupplied Master Encryption Password. The Master Encryption Password is not saved on disk. Only its SHA1 hashsum is saved on disk, for verification purposes only. Since it is virtually impossible to restore the Master Encryption Password from the SHA1 hashsum, each user is fully responsible to retain and protect the Master Encryption Password. During VPSA operation, the Master Encryption Password itself is held in kernel memory of the VPSA. Core-dumping any User Mode process within the VPSA will not reveal the Master Encryption Key. The above method ensures that encrypted Data-at-Rest cannot be accessed without explicitly knowing the user-supplied Master Encryption Password, thus providing full protection to end users who opt for Data-at- Rest encryption.
8 Encryption of Data-in-Flight For advanced security needs, 365 Cloud Storage supports encryption of Data-in-Flight between the User Server and the VPSA using Internet Protocol Security (IPSec). 365 Cloud Storage uses Internet Key Exchange (IKE) protocol to negotiate the IPSec encryption keys with a user s Cloud Server. The encryption keys used to encrypt the Data-in-Flight are stored in kernel memory only (of both the VPSA and Cloud Servers), and are never stored on disk in any form. Periodically, encryption keys are renegotiated by VPSA and Cloud Servers IKE daemons. A user can configure the renegotiation trigger for each Cloud Server. For example, encryption keys can be renegotiated every hour, every 10 Gb of sent/received data, etc. Copyright 2014 Last Updated 9/9/2014
Solutions Guide for Data-At-Rest - 2 - SSIF Guide to Data-At-Rest Solutions Table of Contents Introduction... 5 Why Should You Encrypt Your Data?... 6 Threat Model for Data-at-Rest... 7 Encryption Strength...
Set Up the VM-Series Firewall in AWS Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054
Security Overview Introduction ShowMyPC provides real-time communication services to organizations and a large number of corporations. These corporations use ShowMyPC services for diverse purposes ranging
WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method...1 About SSL...1 About SSH...2 About OpenPGP...2 Using FIPS 140-2 Validated Cryptography...2
Iomega EZ Media and Backup Center User Guide Table of Contents Setting up Your Device... 1 Setup Overview... 1 Set up My Iomega StorCenter If It's Not Discovered... 2 Discovering with Iomega Storage Manager...
OS X Support Essentials 10.10 Exam Preparation Guide Updated January 2015 1 Contents About This Guide... 3 Exam Details... 4 Recommended Exam Preparation... 4 Part One: Installation and Configuration...
Certificate Management Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
TECHNICAL NOTE Secure VidyoConferencing SM Protecting your communications 2012 Vidyo, Inc. All rights reserved. Vidyo, VidyoTechnology, VidyoConferencing, VidyoLine, VidyoRouter, VidyoPortal,, VidyoRouter,
Institute of Parallel and Distributed Systems University of Stuttgart Universitätsstraße 38 D 70569 Stuttgart Diplomarbeit Nr. 3242 Data security in multi-tenant environments in the cloud Tim Waizenegger
Apple Technical White Paper Best Practices for Deploying FileVault 2 Deploying OS X Full Disk Encryption Technology August 2012 OS X 10.7.4 1 Contents Overview 3 Gain Protection. Retain Simplicity. 4 Design
. Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside
Securing Data at Rest with Encryption Ken Beer and Ryan Holland November 2013 (Please consult http://aws.amazon.com/whitepapers for the latest version of this whitepaper) Page 1 of 15 Abstract Organizational
Linksys Business Series Network Storage System Getting Started Guide GETTING STARTED GUIDE Linksys Business Series Network Storage System Models NSS4000 and NSS6000 Series 2007-2008 Copyright 2007-2008,
Basic System Administration ESX Server 3.0 and VirtualCenter 2.0 Basic System Administration Revision: 20090213 Item: VI-ENG-Q206-219 You can find the most up-to-date technical documentation at: http://www.vmware.com/support/pubs
LevelOne User Manual ACC-2000 KVM IP Console Module Ver. 1.1 1 / 87 Certificates Ver. 1.0.0-0709 FCC This equipment has been tested and found to comply with Part 15 of the FCC Rules. Operation is subject
GALSYNC V4.3 Manual NETSEC 18. March 2013 NETsec GmbH & Co.KG Schillingsstrasse 117 DE - 52355 Düren THE ADVANTAGES OF GALSYNC... 6 EASY TO USE... 6 NO SECURITY RISKS IN YOUR FIREWALL... 6 VALUES FOR YOUR
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway Administration Guide September 23, 2014, Rev: 9112 Copyright 2008-2014, ciphermail.com. Acknowledgements: Thanks goes out to Andreas Hödle for feedback. CONTENTS
Parallels Deploying Microsoft Clusters in Parallels Virtuozzo-Based Systems Copyright 1999-2008 Parallels, Inc. ISBN: N/A Parallels Holdings, Ltd. c/o Parallels Software, Inc. 13755 Sunrise Valley Drive