Dell Compellent 6.5 SED Reference Architecture and Best Practices
|
|
|
- Alexander Lee
- 10 years ago
- Views:
Transcription
1 Dell Compellent 6.5 SED Reference Architecture and Best Practices Dell Storage Technical Solutions May 2014 A Dell Reference Architecture
2 Revisions Date May 2014 Description Initial release THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED AS IS, WITHOUT EXPRESS OR IMPLIED WARRANTIES OF ANY KIND Dell Inc. All rights reserved. Reproduction of this material in any manner whatsoever without the express written permission of Dell Inc. is strictly forbidden. For more information, contact Dell. PRODUCT WARRANTIES APPLICABLE TO THE DELL PRODUCTS DESCRIBED IN THIS DOCUMENT MAY BE FOUND AT: Performance of network reference architectures discussed in this document may vary with differing deployment conditions, network loads, and the like. Third party products may be included in reference architectures for the convenience of the reader. Inclusion of such third party products does not necessarily constitute Dell s recommendation of those products. Please consult your Dell representative for additional information. Trademarks used in this text: Dell, the Dell logo, Dell Boomi, Dell Precision,OptiPlex, Latitude, PowerEdge, PowerVault, PowerConnect, OpenManage, EqualLogic, Compellent, KACE, FlexAddress, Force10 and Vostro are trademarks of Dell Inc. Other Dell trademarks may be used in this document. Cisco Nexus, Cisco MDS, Cisco NX- 0S, and other Cisco Catalyst are registered trademarks of Cisco System Inc. EMC VNX, and EMC Unisphere are registered trademarks of EMC Corporation. Intel, Pentium, Xeon, Core and Celeron are registered trademarks of Intel Corporation in the U.S. and other countries. AMD is a registered trademark and AMD Opteron, AMD Phenom and AMD Sempron are trademarks of Advanced Micro Devices, Inc. Microsoft, Windows, Windows Server, Internet Explorer, MS-DOS, Windows Vista and Active Directory are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Red Hat and Red Hat Enterprise Linux are registered trademarks of Red Hat, Inc. in the United States and/or other countries. Novell and SUSE are registered trademarks of Novell Inc. in the United States and other countries. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Citrix, Xen, XenServer and XenMotion are either registered trademarks or trademarks of Citrix Systems, Inc. in the United States and/or other countries. VMware, Virtual SMP, vmotion, vcenter and vsphere are registered trademarks or trademarks of VMware, Inc. in the United States or other countries. IBM is a registered trademark of International Business Machines Corporation. Broadcom and NetXtreme are registered trademarks of Broadcom Corporation. Qlogic is a registered trademark of QLogic Corporation. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and/or names or their products and are the property of their respective owners. Dell disclaims proprietary interest in the marks and names of others. 2 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
3 Table of contents Revisions... 2 Executive summary Secure Data overview Securing data with SED technology on Dell Compellent Storage Center arrays SED technology overview Security threats covered by SEDs Security Scenarios not covered by SEDs Protecting data from unauthorized access Cryptographic erase Reference architecture Secure Data hardware requirements Secure Data software requirements Reference architecture hardware Secure Data configuration Apply license file Configure Key Management Server Add SEDs to Secure Data Folder Create volume Volume migration Best practices A Frequently Asked Questions B Glossary C Additional resources Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
4 Executive summary Data and intellectual property is the life blood for a company in the modern information-driven economy. The legal aspects of a data breach unprotected by encryption (safe harbor) could tarnish your business reputation, destroy consumer confidence, provoke customers to walk away, and at the very worst, wipe out your business completely. According to the Ponemon Institute s annual 2013 survey, the average organizational cost of a data breach was $5.4 million for the U.S. alone, followed by $4.8 million in Germanyand $4.1 million in Australia. Although much money and effort has been spent at protecting corporate networks from outside intrusion, many security analysts agree that there are still considerable vulnerabilities relating to data theft by either physically stealing, misplacing, or inappropriate redeployment or disposal of hard drives from corporate computers and storage arrays. An effective solution to the above problems is to employ Self-Encrypting Drive (SED) technology. SEDs, coupled with Dell Compellent storage arrays provide an industry-leading Data at Rest Encryption solution for securing corporate data from hard drive loss or theft. This white paper provides a detailed description of the Dell Storage Secure Data solution including an overview on SEDs, encryption features and Key Manager Server integration. 4 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
5 1 Secure Data overview With data security risks on the rise, an influx of government regulations for securing data have been mandated and are becoming part of the corporate business requirements for many organizations. Even in the absence of a government mandate, eliminating exposure of private data is now simply viewed as a sound business practice. This is a high priority for companies operating in the healthcare, Federal/State government, financial, banking, education and manufacturing spaces, just to name a few. Providing data storage solutions that are easy to manage and implement, both now and into the future, is what Dell Storage has been about since its start. And we do this through deployment of technology that is non-disruptive to our customers so that they can seamlessly grow with new requirements and regulations, like PCI DSS, GLBA, SOX, HIPAA, the recently passed HITECH Act, as well as the 45+ state laws requiring businesses to publicly disclose data breach incidents. To avoid the high cost and other negative consequences of a data breach or lost data, it is important for organizations to put a comprehensive security strategy in place. A comprehensive strategy requires understanding where data is at all times across the organization and securing it at each of these points. These points, or levels of security, can be broken down into three basic categories: data-in-use, data-inmotion, and data-at-rest. Data in Use User, OS, or application use of data (for example, print, copy, or move) Data in Motion All data being transferred between two nodes across the network Data at Rest Data recorded on the storage media Figure 1 Levels of data to be secured across an organization The primary focus of this guide is securing Data at Rest (DAR). While each point in the storage infrastructure provides unique threat models, DAR presents one of the highest security vulnerabilities. 5 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
6 Data, in fact, spends most of its life at rest on drives. When these drives eventually leave the data center for repair, retirement, relocation, or maintenance, the drives and their data are most vulnerable to being lost or stolen. The emergence of full disk encryption technology and SEDs is timely for mitigating the security vulnerabilities of DAR. SEDs are also becoming a standardized technology across many of the world s top drive vendors, which allows for interoperability and ensures greater market competition and competitive pricing. To further highlight the importance of SEDs, the Storage Networking Industry Association (SNIA) best practices recommends encryption as close to the information source as possible, which is the media where the data resides. In addition, many safe harbor laws, such as California state regulations CA 1798 (formerly SB-1386), protect organizations that store data in compliance with security encryption requirements. With safe harbor laws such as these, organizations might not have to notify customers of lost data if that data was stored and secured on SEDs. Current SEDs use the Advanced Encryption Standard (AES) algorithm as defined by the National Institute of Standards and Technology (NIST) and has been widely adopted as an encryption standard. The SEDs selected by Dell for use in the Dell Storage product line are approved for use in applications requiring compliance with Federal Information Processing Standards (FIPS) Level Securing data with SED technology on Dell Compellent Storage Center arrays As a leader in storage technologies, Dell provides support and management capabilities that allow users to safely secure their DAR in the Compellent Storage Center arrays. This support is offered through a wide variety of SEDs with multiple capacities managed through Trusted Computing Group (TCG) protocols within the Storage Center SAN. Dell s solution is compatible with KMIP v1.0 standards and customerdefined external Key Management Servers. The Secure Data support for DAR encryption in Dell Compellent Storage Center extends from encrypting the full array, multiple disk folders, or even at a Volume level as tied to a separate Secure Data folder. SED and Non-SEDs are supported separately, within the same array with negligible performance impact on the system or your applications. The encryption technology also works on Legacy Compellent Storage (with the addition of new SED drives). Figure 2 shows a Dell Compellent array with both SED and Non-SEDs as an example. 6 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
7 Figure 2 Storage Center array with both SEDs and Non-SEDs managed independently. 7 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
8 Figure 3 FIPS Level 2 Tamper-evident Drive 1.2 SED technology overview An SED is a self-encrypting hard drive with an encryption / decryption function performing like any other hard drive with the encryption being completely transparent to the user, built into the disk drive controller chip that encrypts all data written to the magnetic media and decrypts all the data read from the media automatically. With the encrypting engine built-in the hardware of each individual drive, there is no performance impact on the Storage system. SEDs encrypt constantly, There are two primary functions of SED technology: 1. Protecting hard drive data from unauthorized access: secure DAR 2. Cryptographic Erase (CE): provides a mechanism to securely erase the data on the drive so that the drive can be repurposed or retired Security threats covered by SEDs While using SEDs is fairly simple and transparent, it is important to understand what protection they provide and what protection they do not provide. The threats that Secure Data provides data protection for are: Protects data against lost, transported, or stolen drives. When a powered on drive leaves the array (whether by failure, removal, or otherwise), the drive immediately locks itself. Its contents are 8 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
9 inaccessible without the Authority Credential (AC). At the same time, the volumes with data on that drive will begin a RAID rebuild using the associated hot spare. If that drive is inserted into a different array, the drive will remain in a locked state. The administrator must explicitly bring the drive into service, which then will result in an CE of the SED. Furthermore, even if the platters were removed from the drive itself and placed on a spin stand, the data would be secure due to the AES-256 encryption used to write the bits. Protects against theft of data through the theft of an entire enclosure. Protects against theft of data through the theft of an entire Storage Center system Security Scenarios not covered by SEDs Insider attack: Any person who possesses the administrator password can access any volume on the array, or change Storage Center user permissions to allow others to do the same. Similarly, a compromised host can access volumes that the host is authorized to access. SEDss cannot provide protection against improper access to an online data volume. Data-in-flight: SEDs are intended to solely provide protection for DAR, and thus provide no protection for data-in-flight on the network. Tampering with array hardware. Secure Data is not resistant to hardware probes, other snooping devices, or the removal of a drive without loss of power to that drive. Theft of the KMS and the associated ACs saved in it. 1.3 Protecting data from unauthorized access To protect the data from unauthorized access, SEDs use two sets of keys. One key is called the Media Encryption Key (MEK). In the drive factory, each SED randomly generates an MEK that is encrypted and embedded within the drive. The MEK is never exposed outside the drive and requires no management by the user. The MEK functions as a secret password so that the encryption / decryption engine built into the drive will know how to decrypt the user data stored on the physical media. The encryption in the drive uses a symmetric key algorithm which means the MEK is the same for encrypting and decrypting the data on the disk. This MEK can be changed by Crypt-Erase but the encryption can never be turned off. The second required key is called the Authority Credential (AC), sometimes referred to as the locking key, credentials, authentication keys or Access Key (AK). It is used to unlock and configure the SED. There is one AC for each SED. Dell Compellent Storage Center arrays automatically detect SED drives and will create the ACs when the array is initially configured with SEDs or when SEDs are added to a legacy system (requires an encryption software license and Storage Center v6.5.1 or greater). The AC is stored in a Key Management Interoperability Protocol (KMIP) Secret Data object on the Key Management Server (KMS). There is one valid Secret Data object for each SED that has been put into a lockable state. Storage Center completes a KMIP Register on this Secret Data object, and the Secret Data 9 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
10 object s keyblock contains the AC. Storage Center also controls the contents of the Secret Data object. Once an SED has been configured with an AC, the AC must be provided to unlock the drive, and the drive remains unlocked only while powered on. The drive locks itself upon losing power or shutting down, and the AC must be provided again before the drive will unlock and participate in I/O operations. Figure 4 describes the process of how data is accessed on a SED during normal operation: Figure 4 Accessing data on an SED 1. Data is requested from the SED by the storage controller. If data is requested from the drive and it is locked, an error code is returned which indicates it is locked. Then, the Storage Center OS (SCOS) sends a series of commands to the drive to unlock. One of those commands is an Authentication Request which carries the AC. 2. The drive electronics hash the AC from the storage controller and pull the stored hashed access key from the drive storage. The hashed keys are compared. 3. If the hashed keys do not match, no access is given to the data and an error is passed back to the storage controller stating that the drive is locked and that the subsystem does not have authorization to access it. If the hashed keys match, a subsequent drive command is sent to unlock the drive. 4. The encrypting / decrypting circuit pulls the requested data from the drive and uses the decoded MEK to decrypt the encrypted user data. 5. The decrypted user data is then passed back to the storage controller. 10 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
11 In summary, the true value of SEDs is realized when a drive is lost, removed, or stolen. In such an instance, the drive becomes locked and the data remains encrypted.. Because an unauthorized user would not have the appropriate AC, the drive will remain locked and data will remain inaccessible to any attacker. 1.4 Cryptographic erase Another security method available with SEDs is cryptographic erase (CE). CE simply replaces the encryption key inside the encrypted drive, making it impossible to ever decrypt the data encrypted with the deleted key. Alternative methods, such as de-gaussing each drive or simply overwriting the data with zeros, are available to permanently erase this data; however, these methods often are expensive, slow, or do not provide the complete data erasure. A common use of CE is when a failing drive is preemptively copied to a spare SED drive and then removed from use (unmanaged) by the Storage Center firmware. After the copy-to-spare occurs, the failing drive undergoes a CE so that it may be safely returned to the manufacturer under warranty. Through this process of unmanaging out of a Secure Data folder, the CE function destroys the stored encrypted MEK, and if/when the drive is removed from the array, it will not lock when power is removed. At this point a new randomly generated MEK is created by the drive and stored on the drive. Without the original MEK, there is no way to decode the already encrypted data on the drive. Drives that fail hard (head crash, unreadable, or other issues) do not undergo CE because they are not reachable, but they do lock when removed because their SED settings are still intact. 11 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
12 Figure 5 Crypto-Erase Process As shown in Figure 5, CE prompts the SED to permanently erase the current media encryption key and replace it with a new key, randomly generated within the drive. When the media encryption key is changed, any data that has been written to the drive using the previous key cannot be decoded by the new media encryption key, which renders all of the data unusable. Thus, data that was encrypted with the previous media encryption key is now cryptographically destroyed. 12 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
13 2 Reference architecture The goal of the section is to provide a SED Reference Architecture to use as a starting point for designing and implementing SED into your infrastructure. 2.1 Secure Data hardware requirements Table 1 Controller Model Controller support Supported SC8000 Series 40 Series 30 / 20 Yes Yes No Table 2 Enclosure support Enclosure Model SC200 SC220 SC280 Other enclosure models Supported Yes Yes Yes No 2.2 Secure Data software requirements Table 3 Storage Center OS versions Storage Center OS Supported or greater Yes or below No Note: To use SEDs, you must apply a license file that has the Self Encrypting Drives feature enabled. 2.3 Reference architecture hardware The hardware used for this environment consists of the following: Table 4 Reference architecture hardware Model Quantity Dell Compellent SC8000 Controllers 2 13 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
14 Dell Compellent SC220 Disk enclosures 4 Dell PowerEdge R620 Rackmount Server 2 Brocade Gb Fibre Channel Switches 1 SafeNet K460 Key Management Server 1 Dell Compellent 300GB 15K SED 48 Figure 6 Reference Architecture Environment 2.4 Secure Data configuration The Dell Secure Data implementation is simple to setup. The following steps outline how to setup Self Encrypting drives on a Dell Compellent Storage Center Apply license file 1. In the System Manager go to Storage Management System Setup Apply a license file. Select the file ending in.lic and click OK. 14 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
15 15 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
16 2. Locate your Compellent Storage Center License file and click Select. 3. Select OK Configure Key Management Server By applying the license file, you can now configure a Key Management Server. 1. In the System Manager select System Management System Access Configure Key Management Servers. 16 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
17 2. In this dialog, enter the IP or hostname of the KMS, and the timeout. If your Key Management Server uses authentication, also enter that. 3. Then provide the certificate files for each controller, and click Continue. 17 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
18 4. At the main screen select Upload Certstore Cert. 18 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
19 5. On completion of the Certstore Cert, click Continue to save the configuration. The Compellent Storage Center is now communicating with the Key Management Server Add SEDs to Secure Data Folder 1. In the Compellent System Manager, select Storage Management Disk Folder Create Disk Folder. 19 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
20 20 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
21 2. Dell Compellent recommends putting all drives into one Disk Folder. Dell Compellent does not support mixing of SEDs and non-seds in the same Disk Folder. Select Yes to continue to create a Disk Folder. 21 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
22 3. The Storage Center has detected there are Unconfigured Self-Encrypting Drives. Select Yes to create a Secure Data folder. 22 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
23 4. Select the SED drives that you want to include in the Secure Data Disk Folder and click Continue. 23 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
24 5. Select the drives to be Hot Spares and click Continue. 24 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
25 6. Assign a name to the Disk Folder. In this example we used SED to distinguish between the SED and non-sed drive Disk Folders. 25 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
26 26 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
27 7. The Disk Folder is now a Secure Data folder. The yellow lock icon on the Disk Folder and drive indicates the drives are now encrypting data using a randomly generated key which is stored on the Key Management Server Create volume 1. In the System Manager, expand the Storage section and right-click Volumes. Select Create Volume. 27 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
28 2. Select the Disk Folder that you want the volume to be created on. Since the intent is for this Volume to be encrypted, select SED. 28 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
29 3. Enter a size for the volume and select Continue. 29 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
30 4. Select a Replay Profile to use and click Continue. 30 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
31 5. Provide the volume with a Name and click Continue. 31 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
32 6. Review the summary page and select Create Now. 32 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
33 7. Select Map this Volume to this Server to start the mapping process 33 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
34 8. Select Create Now to map the volume to the server. 34 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
35 9. The volume is now created and is on a Secure Data Disk Folder. The AC is now stored on the KMS. If a drive needs to be unlocked, the AC from the KMS will be retrieved. 35 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
36 2.4.5 Volume migration 1. To migrate a volume from a non-secure Data folder to another, start by right-clicking on the Volume you want to move. The selected volume is on a disk folder named Infrastructure, which is not a Secure Data Disk Folder. 36 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
37 2. Select Create New Volume. 37 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
38 3. Select the Secure Data folder named SED. 38 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
39 4. Enter the Volume size then click Continue. Note: The Volume size must be equal to or larger than the source volume. 39 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
40 5. Select the Replay Profile you want to use, and click Continue. 40 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
41 6. Provide a Name for the destination Volume and select Continue. 41 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
42 7. The review page displays attributes for the new volume. Select Create Now to create the volume. 42 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
43 8. Select the newly named Destination Volume, and click Continue. 43 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
44 9. Review the details relating to the Copy/Migrate process, and click Continue. 44 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
45 10. Select Start Now to start the Copy/Migrate process. The data will be moved from the Infrastructure Disk Folder to the SED Disk Folder, which is a Secure Data Disk Folder. 45 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
46 11. The volume is now on the SED Disk Folder, which is encrypted. 46 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
47 3 Best practices Volume migration using Copy/Mirror/Migrate to a Secure Data Disk Folder The Dell Compellent Fluid architecture allows volumes to be moved from one Disk Folder to another Disk Folder. It is expected that volumes may be moved from a non-secure Data Disk Folder to a Secure Data Disk Folder when attaching SED drives to a system. When completing this, make sure there is enough RAID10 space allocated in your Tier 1 space, Storage Center Design Guidance with SEDs There is no performance difference between non-seds and SEDs. When designing a Dell Compellent Storage Center system, follow standard design guidance, Using Crypto-Erase There is no (CE) button in the system. When necessary - such as marking a failing drive as failed or repurposing a drive into a new array, the controller firmware will perform a CE as part of the process when unmanaging out of a Secure Data folder. Note: Secure-erase is also known as cryptographic erase or crypto-erase in the general SED literature. Mixing drive types in the same Disk Folder SED and Non-SED drives can be used in the same array. In order to securely lock and manage the SED drives for DAR protection, the SED drives will be managed in their own Disk Folder. 47 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
48 A Frequently Asked Questions What is the difference between a locked drive and a securely-erased drive? Data that is locked is inaccessible without the Authority Credential. Data that is securely erased has been cryptographically destroyed. What if the entire array is stolen? The data will be protected as long as the thieves were not able to also steal and access the Key Management Server (KMS) and compromise the ACs to unlock all of the SED drives in the Array. Is it safe to discard or return a locked SED? Yes. Any data that was written to the drive will be locked and inaccessible. When you return a drive to Dell, the only information that remains readable are its operating statistics (S.M.A.R.T. data), the RAID type that the drive was used in, and drive hardware error logs. 48 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
49 B Glossary Self-Encrypting Drives (SED): A drive with a dedicated ASICs encryption engine built in to encrypt/decrypt all data to the media transparently, without user intervention. Data at Rest (DAR) encryption: Protection of data written on the storage media via symmetric encryption/decryption keys. Data-in-motion: Data in transit between two nodes. This is also known as Data In Flight. Note: Data-in-motion is also known as Data In Flight. Data-in-use: Data being used by a person, an application, or an operating system Secure Data: The Dell storage term for the DAR encryption solution in a Dell Storage array. Media Encryption Key (MEK): Functions as a secret password so that the encryption / decryption engine built into the drive will know how to decrypt the user data stored on the physical media. Generated in the drive factory, the MEK is encrypted and embedded within the drive and is never exposed outside the drive. Authority Credential (AC): sometimes referred to as the locking key, credentials, authentication keys or Access Key (AK). It is used to unlock and configure the SED. There is one AC for each SED. Table 5 Term Media Encryption Key (MEK) vs Authority Credential (AC) Definition and Usage Location & Management How is it Generated Media Encryption Key (MEK) Required to encrypt and decrypt data Resides and managed by the drives Never leaves the drives Unique MEK for every drive Generated by the drive at the manufacturer Authority Credential (AC) Needed to unlock a drive Managed by the Storage Center Firmware and stored on Key Management Server Created by a random number generator in the drive 256-bit Advanced Encryption Standard (AES) encryption: AES is a specification established by the U.S. National Standards of Institute and Technology (NIST) FIPS Level 2 - (Federal Information Processing Standards): FIPS Security Level 2 provides certification for the cryptographic module and tamper-evident labels/seals around the drive to show physical access to the inside. 49 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
50 Disk Folder: A logical pool of storage disks with multiple Disk drives, RAID levels and Volumes managed with a virtualization layer for application and user efficiencies. Key Management Server (KMS): An external appliance that manages (stores and serves up) authority credentials to lock/unlock SEDs. Key Management Interoperability Protocol (KMIP) v1.0: The standards-based protocol used to communicate between a KMS and a storage device such as a Dell Storage Array. TCG: Trusted Computing Group. Locked drive: An SED in which security has been enabled and the drive has been unexpectedly removed from the storage array, or powered down. Data on the drive cannot be read from or written to until the appropriate AC is provided. Unlocked: Data on a drive is accessible for all read and write operations. Cryptographic erase (CE): This feature permanently changes the Media Encryption Key so the drive can be re-used or re-purposed. After the CE is performed, the data previously written to the drive becomes unreadable. Re-purpose: Changes the drive from a secured state to an unsecured state so that it can be safely used for another purpose. This task is accomplished using the CE feature. RevertSP function: Reverts the drive to factory default condition. 50 Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
51 C Additional resources Guidelines for Media Sanitation, National Institute of Standards and Technology, Computer Security Division Best_Practices_Secure_Storage.pdf SNIA Guidance and Best Practices The Dell Compellent Secure Data architecture relies on a key management server that operates using KMIP. Currently certified for use is the SafeNet KeySecure K460 product. SafeNet KeySecure K460 IBM Security Key Lifecycle Manager (SKLM) formerly Tivoli Key Lifecycle EMC RSA Data Protection Manager Brocade offers in-flight encryption available in the Brocade 6510, Brocade 6520 and Brocade DCX Using this feature will provide additional security for frames between switches Dell Compellent 6.5 SED Reference Architecture and Best Practices CML1043
Dell Wyse Datacenter for View RDS Desktops and Remote Applications
Dell Wyse Datacenter for View RDS Desktops and Remote Applications An overview of Remote Desktop Session (RDS) based desktops and Remote Applications in a VMware Horizon View environment Dell Wyse Solutions
How To Create A Web Server On A Zen Nlb 2.2.2 (Networking) With A Web Browser On A Linux Server On An Ipad Or Ipad 2.3.2 On A Raspberry Web 2.4 (
Wyse vworkspace 8.6 - Setting up load balancing using ZEN NLB Appliance Dell Cloud Client-Computing Revision 20150828 August 2015 A Dell Best Practices Revisions Date August 2015 August, 20 th 2015 Description
High Performance SQL Server with Storage Center 6.4 All Flash Array
High Performance SQL Server with Storage Center 6.4 All Flash Array Dell Storage November 2013 A Dell Compellent Technical White Paper Revisions Date November 2013 Description Initial release THIS WHITE
Installing idrac Certificate Using RACADM Commands
Installing idrac Certificate Using RACADM Commands This Dell Technical white paper provides detailed information about generation of idrac certificate by using RACADM CLI. Dell Engineering October 2013
Managing Web Server Certificates on idrac
Managing Web Server Certificates on idrac This Dell technical white paper explains how to configure the web server certificates on idrac to establish secure remote connections. Dell Engineering November
Dell Solutions Configurator Guide for the Dell Blueprint for Big Data & Analytics
Dell Solutions Configurator Guide for the Dell Blueprint for Big Data & Analytics This Dell Best Practices guide provides assistance to configure the reference architecture solutions of the Dell Blueprint
Using Dell EqualLogic and Multipath I/O with Citrix XenServer 6.2
Using Dell EqualLogic and Multipath I/O with Citrix XenServer 6.2 Dell Engineering Donald Williams November 2013 A Dell Deployment and Configuration Guide Revisions Date November 2013 Description Initial
Dell Fabric Manager Installation Guide 1.0.0
Dell Fabric Manager Installation Guide 1.0.0 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates either
Self-encrypting drives (SED): helping prevent data loss, theft, and misplacement
Self-encrypting drives (SED): helping prevent data loss, theft, and misplacement White paper Version: 1.0 Updated: Abstract: This white paper introduces Infortrend self-encrypting drive technology, or
Active Fabric Manager (AFM) Plug-in for VMware vcenter Virtual Distributed Switch (VDS) CLI Guide
Active Fabric Manager (AFM) Plug-in for VMware vcenter Virtual Distributed Switch (VDS) CLI Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use
Accessing Remote Desktop using VNC on Dell PowerEdge Servers
Accessing Remote Desktop using VNC on Dell PowerEdge Servers Establish secure remote desktop connections to Server Host OS using standard VNC clients, starting idrac7 firmware version 1.50.50 Harsha S
Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager Solution Guide
Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager Solution Guide Securing sensitive client and company data is becoming an IT task of paramount importance. Often
Dell Server Management Pack Suite Version 5.0.1 For Microsoft System Center Operations Manager And System Center Essentials User s Guide
Dell Server Management Pack Suite Version 5.0.1 For Microsoft System Center Operations Manager And System Center Essentials User s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information
Data Security Using TCG Self-Encrypting Drive Technology
Data Security Using TCG Self-Encrypting Drive Technology June 11, 2013 2:00PM EDT Copyright 2013 Trusted Computing Group 1 Copyright 2013 Trusted Computing Group 2 Tom Coughlin, Founder, Coughlin Associates.
Recommended Methods for Updating Firmware on Dell Servers
Recommended Methods for Updating Firmware on Dell Servers AVS Sashi Kiran November 2013 Revisions Date December 2013 Description Initial release THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND
Self-Encrypting Hard Disk Drives in the Data Center
Technology Paper Self-Encrypting Hard Disk Introduction At least 35 U.S. states now have data privacy laws that state if you encrypt data-at-rest, you don t have to report breaches of that data. U.S. Congressional
Perceptions about Self-Encrypting Drives: A Study of IT Practitioners
Perceptions about Self-Encrypting Drives: A Study of IT Practitioners Executive Summary Sponsored by Trusted Computing Group Independently conducted by Ponemon Institute LLC Publication Date: April 2011
Solid-State Drives with Self-Encryption: Solidly Secure
Solid-State Drives with Self-Encryption: Solidly Secure 09/22/2011 Michael Willett Storage Security Strategist SAMSUNG SOLID STATE DRIVES Solid-State Drives SSD ADVANTAGES SOLID STATE DRIVES Save $$ on
Navigating Endpoint Encryption Technologies
Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
idrac7 Version 1.30.30 With Lifecycle Controller 2 Version 1.1 Quick Start Guide
idrac7 Version 1.30.30 With Lifecycle Controller 2 Version 1.1 Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
Seagate Instant Secure Erase Deployment Options
Technology Paper Seagate Instant Secure Erase Introduction When hard drives are retired and moved outside the data centre into the hands of others, the data on those drives is put at significant risk.
ABC of Storage Security. M. Granata NetApp System Engineer
ABC of Storage Security M. Granata NetApp System Engineer Encryption Challenges Meet Regulatory Requirements No Performance Impact Ease of Installation Government and industry regulations mandate protection
Dell OpenManage Network Manager Version 5.3 Service Pack 2 Quick Start Guide
Dell OpenManage Network Manager Version 5.3 Service Pack 2 Quick Start Guide Notes and Cautions A NOTE indicates important information that helps you make better use of your computer. A CAUTION indicates
EMC Symmetrix Data at Rest Encryption
Detailed Review Abstract This white paper provides a detailed description of EMC Symmetrix Data at Rest Encryption features and operations. March 2011 Copyright 2010, 2011 EMC Corporation. All rights reserved.
Frequently Asked Questions: EMC Isilon Data at Rest Encryption Solution
1 Frequently Asked Questions: EMC Isilon Data at Rest Encryption Solution Table of Contents What s New? Target Customers Customer Benefits Competitive Positioning Technical Sales Questions General Sales
Aegis Padlock for business
Aegis Padlock for business Problem: Securing private information is critical for individuals and mandatory for business. Mobile users need to protect their personal information from identity theft. Businesses
Dell PowerEdge Blades Outperform Cisco UCS in East-West Network Performance
Dell PowerEdge Blades Outperform Cisco UCS in East-West Network Performance This white paper compares the performance of blade-to-blade network traffic between two enterprise blade solutions: the Dell
Data-at-Rest Encryption Addresses SAN Security Requirements
Data-at-Rest Encryption Addresses SAN Security Requirements QLogic 2500 Series Fibre Channel Adapters Meet Enterprise Security Needs Key Findings SAN security via encryption is necessary for protecting
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...
EMC VMAX3 DATA AT REST ENCRYPTION
EMC VMAX3 DATA AT REST ENCRYPTION ABSTRACT In the interconnected world, data and intellectual property is the highest value currency which can be held by corporations. From recent newsworthy examples,
Solutions for Encrypting Data on Tape: Considerations and Best Practices
Solutions for Encrypting Data on Tape: Considerations and Best Practices NOTICE This white paper may contain proprietary information protected by copyright. Information in this white paper is subject to
Alliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
EMC VNX2: Data at Rest Encryption
White Paper EMC VNX2: Data at Rest Encryption Abstract This white paper introduces Data at Rest Encryption for EMC VNX 2, a feature that provides data protection if a drive is stolen or misplaced. This
EMC DATA DOMAIN ENCRYPTION A Detailed Review
White Paper EMC DATA DOMAIN ENCRYPTION A Detailed Review Abstract The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers to
Data Security using Encryption in SwiftStack
Data Security using Encryption in SwiftStack May 2015 Copyright 2015 SwiftStack, Inc. swiftstack.com Page 1 of 11 Table of Contents Introduction... 3 Defining Three Threat Models... 3 Encrypted Data and
Making Data at Rest Encryption Easy
Making Data at Rest Encryption Easy MM/DD/YYYY Jason Cox Client Security Products Lead Seagate Technology What is SED? Self Encrypting Drive Basics The storage device LOCKS when it powers OFF. The storage
Citrix XenDesktop VDI with Dell Storage SC4020 All-Flash Arrays for 1,800 Persistent Desktop Users
Citrix XenDesktop VDI with Dell Storage SC4020 All-Flash Arrays for 1,800 Persistent Desktop Users Dell Storage Technical Solutions August 2014 A Dell Reference Architecture Revisions Date June 2014 August
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
Intel RAID Controller Premium Feature Key Training
Intel RAID Controller Premium Feature Key Training AXXRPFKSNSH Snapshot Recovery AXXRPFKDE Self Encrypting Drive (SED) AXXRPFKSSD SSD Cache with Fastpath Note: Graphics for this training is based on RAID
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
Windows BitLocker Drive Encryption Step-by-Step Guide
Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
SecureD Technical Overview
WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD
Dell DR4000 Disk Backup System. Introduction to the Dell DR4000 Restore Manager A primer for creating and using a Restore Manager USB flash drive
Dell DR4000 Disk Backup System Introduction to the Dell DR4000 Restore Manager A primer for creating and using a Restore Manager USB flash drive Storage Engineering Dell Product Group February 2012 THIS
Securing Data on Portable Media. www.roxio.com
Securing Data on Portable Media www.roxio.com Contents 2 Contents 3 Introduction 4 1 The Importance of Data Security 5 2 Roxio Secure 5 Security Means Strong Encryption 6 Policy Control of Encryption 7
How Drive Encryption Works
WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................
DVS Enterprise. Reference Architecture. VMware Horizon View Reference
DVS Enterprise Reference Architecture VMware Horizon View Reference THIS DOCUMENT IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED
Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
DELL POWERVAULT LIBRARY-MANAGED ENCRYPTION FOR TAPE. By Libby McTeer
DELL POWERVAULT LIBRARY-MANAGED ENCRYPTION FOR TAPE By Libby McTeer CONTENTS ABSTRACT 3 WHAT IS ENCRYPTION? 3 WHY SHOULD I USE ENCRYPTION? 3 ENCRYPTION METHOD OVERVIEW 4 LTO4 ENCRYPTION BASICS 5 ENCRYPTION
ACER ProShield. Table of Contents
ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...
XTREMIO DATA AT REST ENCRYPTION
White Paper XTREMIO DATA AT REST ENCRYPTION Abstract Data at Rest Encryption is a mandatory requirement in various industries that host private or sensitive data. This white paper introduces and explains
Seagate Secure Technology
Seagate Secure Technology Marketing Bulletin Frequently Asked Questions What is the value of a self-encrypting drive (SED)? SEDs ensure user data can be quickly deleted (erased) using standard drive commands,
How To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
Proactively Managing Servers with Dell KACE and Open Manage Essentials
Proactively Managing Servers with Dell KACE and Open Manage Essentials A Dell Technical White Paper Dell KACE Dell Open Manage Essentials THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Dell SAS RAID Storage Manager. User s Guide. www.dell.com support.dell.com
Dell SAS RAID Storage Manager User s Guide www.dell.com support.dell.com Notes, Notices, and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE:
Cautions When Using BitLocker Drive Encryption on PRIMERGY
Cautions When Using BitLocker Drive Encryption on PRIMERGY July 2008 Fujitsu Limited Table of Contents Preface...3 1 Recovery mode...4 2 Changes in hardware configurations...5 3 Prior to hardware maintenance
Configuring Dell OpenManage IT Assistant 8.0 to Monitor SNMP Traps Generated by VMware ESX Server
Configuring Dell OpenManage IT Assistant 8.0 to Monitor SNMP Traps Generated by VMware ESX Server Amresh Singh Dell Virtualization Solutions Engineering January 2007 Dell Inc. 1 www.dell.com/vmware Contents
Technical Note. Installing Micron SEDs in Windows 8 and 10. Introduction. TN-FD-28: Installing Micron SEDs in Windows 8 and 10.
Technical Note Installing Micron SEDs in Windows 8 and 10 TN-FD-28: Installing Micron SEDs in Windows 8 and 10 Introduction Introduction Self-encrypting drives (SEDs) can provide an effective way of protecting
Top 7 Tips for Better Business Continuity
Top 7 Tips for Better Business Continuity With Hosted Fax www.biscom.com [email protected] (+1) 800-477-2472 or (+1) 978-250-1800 Introduction Biscom s Secure File Transfer (Biscom SFT) solution enables
Dell EqualLogic PS Series iscsi Storage Arrays With Microsoft Windows Server Failover Clusters Hardware Installation and Troubleshooting Guide
Dell EqualLogic PS Series iscsi Storage Arrays With Microsoft Windows Server Failover Clusters Hardware Installation and Troubleshooting Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important
How To Backup And Restore A Database With A Powervault Backup And Powervaults Backup Software On A Poweredge Powervalt Backup On A Netvault 2.5 (Powervault) Powervast Backup On An Uniden Power
Database Backup and Recovery using NetVault Backup and PowerVault MD3260 A Dell Technical White Paper Database Solutions Engineering Dell Product Group Umesh Sunnapu Mayura Deshmukh Robert Pound This document
Dell ControlPoint Security Manager
Dell ControlPoint Security Manager www.dell.com support.dell.com Notes NOTE: A NOTE indicates important information that helps you make better use of your computer. Information in this document is subject
White Paper: Whole Disk Encryption
How Whole Disk Encryption Works White Paper: Whole Disk Encryption How Whole Disk Encryption Works Contents Introduction to Whole Disk Encryption.....................................................................
RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief
RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information
Open Networking: Dell s Point of View on SDN A Dell White Paper
Open Networking: Dell s Point of View on SDN A Dell White Paper Author: Keerthy Rajagopal August 2015 2015 Dell Inc., All rights reserved. Except as stated below, no part of this document may be reproduced,
A Dell Technical White Paper Dell Compellent
The Architectural Advantages of Dell Compellent Automated Tiered Storage A Dell Technical White Paper Dell Compellent THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL
Service Description. Remote Consulting Service. Introduction to your service agreement. The scope of your service agreement
Service Description Remote Consulting Service Introduction to your service agreement Remote Consulting Services ( RCS ) provide for remote assistance with certain IT infrastructure tasks ( Service or Services
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
Enova X-Wall LX Frequently Asked Questions
Enova X-Wall LX Frequently Asked Questions Q: What is X-Wall LX? A: X-Wall LX is the third generation of Enova real-time hard drive cryptographic gateway ASIC (Application Specific Integrated Circuit)
Healthcare Compliance Solutions
Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and
Enterprise Manager. Version 6.2. Administrator s Guide
Enterprise Manager Version 6.2 Administrator s Guide Enterprise Manager 6.2 Administrator s Guide Document Number 680-017-017 Revision Date Description A August 2012 Initial release to support version
Samsung SED Security in Collaboration with Wave Systems
Samsung SED Security in Collaboration with Wave Systems Safeguarding sensitive data with enhanced performance, robust security, and manageability Samsung Super-speed Drive Secure sensitive data economically
Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture. Dell Compellent Product Specialist Team
Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture Dell Compellent Product Specialist Team THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL
Configuring a Microsoft Windows Server 2012/R2 Failover Cluster with Storage Center
Configuring a Microsoft Windows Server 2012/R2 Failover Cluster with Storage Center Dell Compellent Solution Guide Kris Piepho, Microsoft Product Specialist October, 2013 Revisions Date Description 1/4/2013
CommVault Simpana 10 Best Practices
CommVault Simpana 10 Best Practices for the Dell Compellent Storage Center Andrew Smith, Data Protection Product Specialist Kris Piepho, Microsoft Product Specialist July, 2013 Revisions Date Description
Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform
Managing Privileged Identities in the Cloud How Privileged Identity Management Evolved to a Service Platform Managing Privileged Identities in the Cloud Contents Overview...3 Management Issues...3 Real-World
Building Microsoft Windows Server 2012 Clusters on the Dell PowerEdge VRTX
Building Microsoft Windows Server 2012 Clusters on the Dell PowerEdge VRTX Startup Guide Paul Marquardt Contents Introduction... 4 Requirements... 4 Chassis setup... 6 Chassis placement and CMC cabling...
Interoperability of Bloombase StoreSafe and Thales e-security keyauthority for Data At- Rest Encryption
Bloombase Interoperability Program P1 2015 Bloombase, Inc. Interoperability of Bloombase StoreSafe and Thales e-security keyauthority for Data At- Rest Encryption April, 2015 Executive Summary Thales e-security
Interworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
Dell PowerVault MD32xx Deployment Guide for VMware ESX4.1 Server
Dell PowerVault MD32xx Deployment Guide for VMware ESX4.1 Server A Dell Technical White Paper PowerVault MD32xx Storage Array www.dell.com/md32xx THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND
Using Red Hat Network Satellite Server to Manage Dell PowerEdge Servers
Using Red Hat Network Satellite Server to Manage Dell PowerEdge Servers Enterprise Product Group (EPG) Dell White Paper By Todd Muirhead and Peter Lillian July 2004 Contents Executive Summary... 3 Introduction...
Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security
Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
2007 Microsoft Office System Document Encryption
2007 Microsoft Office System Document Encryption June 2007 Table of Contents Introduction 1 Benefits of Document Encryption 2 Microsoft 2007 Office system Document Encryption Improvements 5 End-User Microsoft
An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance
An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security
Solid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant
Solid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant Flash Memory Summit 2014 Santa Clara, CA 1 The Problem 2005-2013: over 864,108,052
VMware ESX 2.5 Server Software Backup and Restore Guide on Dell PowerEdge Servers and PowerVault Storage
VMware ESX 2.5 Server Software Backup and Restore Guide on Dell PowerEdge Servers and PowerVault Storage This document provides best practices for backup and recovery of Virtual Machines running on VMware
CONFIGURATION GUIDELINES: EMC STORAGE FOR PHYSICAL SECURITY
White Paper CONFIGURATION GUIDELINES: EMC STORAGE FOR PHYSICAL SECURITY DVTel Latitude NVMS performance using EMC Isilon storage arrays Correct sizing for storage in a DVTel Latitude physical security
DELL. Virtual Desktop Infrastructure Study END-TO-END COMPUTING. Dell Enterprise Solutions Engineering
DELL Virtual Desktop Infrastructure Study END-TO-END COMPUTING Dell Enterprise Solutions Engineering 1 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL
Hitachi Virtual Storage Platform Family: Security Overview. By Hitachi Data Systems
Hitachi Virtual Storage Platform Family: Security Overview By Hitachi Data Systems April 2015 Contents Executive Summary... 3 Hitachi Virtual Storage Platform G1000 Security Components... 4 Privileged
Firmware security features in HP Compaq business notebooks
HP ProtectTools Firmware security features in HP Compaq business notebooks Embedded security overview... 2 Basics of protection... 2 Protecting against unauthorized access user authentication... 3 Pre-boot
A Dell Technical White Paper Dell PowerConnect Team
Flow Control and Network Performance A Dell Technical White Paper Dell PowerConnect Team THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.
IBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.
GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...
RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief
RSA SecurID Authentication in Action: Securing Privileged User Access RSA SecurID solutions not only protect enterprises against access by outsiders, but also secure resources from internal threats The
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
