Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security Books Media Privacy Book Reviews

Storage Security 125

shiroi_kami writes "What does Information Security mean to you? To many, it means firewalls and encryption. To some, it means intrusion detection systems. Chances are the words "file servers" weren't high on your list, but they probably should be. After all, information security is about information, and when it's not flying across the network it's got to be stored somewhere, right? In fact, the security of the storage mechanism is often overlooked, which makes it an attractive target for attackers. In their new book, Storage Security, the authors take a comprehensive look at this often-ignored subject. Update: 03/26 05:44 GMT by T : Please note, this review was written by David Bianco under the handle shiroi_kami as an Amazon.com review, and also appears at InfosecBooks.com. Apologies to David for the misplaced and delayed attribution.
Storage Security: Protecting, SANs, NAS and DAS
author John Chirillo, Scott Blaul
pages 408
publisher John Wiley & Sons
rating 9.8
reviewer David Bianco
ISBN 0764516884
summary A storage security handbook that examines strengths and weaknesses, describes architectural security concerns and considerations, and identifies ways to implement and design more secure storage systems.

Storage Security is not about turning on the right configuration options on your XYZ brand server appliance. It's about applying solid, methodical security practices to your storage systems, regardless of whether they are disks directly attached to a single computer, Network Attached Storage or part of a Storage Area Network. The authors address the full security cycle, too, starting with evaluating the security of proposed new storage solutions. Comparative data in hand, the book shows you how to narrow the field to a single solution that offers the best balance between functionality and security.

And once the system is selected, you can't stop there. You've got to decide on appropriate security policies for the new storage system, draft and implement a backup and restore plan, deal with disaster recovery and take care of a host of other issues. In short, this is a good guide to an entire range of considerations necessary to select, deploy and manage a secure storage solution.

The book's evaluation methodology is particularly valuable. Each type of storage (directly attached, NAS and SAN) is covered in a chapter of its own. Within each chapter, the authors address specific technologies used to implement that type of storage. For example, the direct-attach chapter discusses such common storage technologies as SCSI and IDE, moderately exotic systems like USB and Firewire drives, and some more advanced solutions like HiPPI and SSA. Each technology is then placed in a matrix and scored in 11 different categories, including popularity and industry acceptance, built-in data protection features, typical fault tolerance and physical security characteristics.

The authors assign each rating on a scale of 1 (poor) to 5 (the best). This gives a good general indication of how each technology measures up, but they tend to rely on a straight average of the ratings when determining the best technology. Although it's true that the average allows you to make a quick ballpark comparison, there are many other factors to consider as well, such as the suitability for your particular environment and the way in which your users need to access their data. The matrixes are quite useful, but just remember that you can't always boil things down to a simple numerical score.

Probably the biggest problem with this book is that it's pretty dry. As a reference book, the writing style is fine, since it's easy to find what you're looking for, and the chapters are concise. It's difficult to read from cover-to-cover, though, which is a shame because that's what you should probably do the first time through. Take it in small doses, a chapter or so at a time, and you should be fine.

Storage Security is about just what you'd think: the security of your data as it's being stored on your server(s). It's not a detailed look at the configuration of any one product, but rather a comprehensive, theory-based approach to managing the security of your storage subsystem from evaluation to purchase to daily operations. If you manage a small or mid-size network, you may or may not need this book. If you have a larger network, though, or have significant data-storage needs, this deserves a space on your shelf.


You can purchase Storage Security: Protecting, SANs, NAS and DAS from bn.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.
This discussion has been archived. No new comments can be posted.

Storage Security

Comments Filter:
  • Duct Tape (Score:3, Funny)

    by Anonymous Coward on Monday February 24, 2003 @11:03AM (#5370562)
    Duct tape your storage devices.

    Protect Freedom!
    Buy Tom Ridge Brand Duct Tape, it's minty fresh!

  • by Anonymous Coward on Monday February 24, 2003 @11:12AM (#5370606)
    This is something I've wondered about, and this reminded me.

    Is there any operating system that supports encrypting the storage at the file system level. In other words, is there any operating system where I can specify that I want a particular path encrypted, and then copy files over, edit files, etc without worrying about having to decrypt, recrypt manually all the time?

    Even a weak encryption would satisfy me.
    • by mericet ( 550554 ) on Monday February 24, 2003 @11:16AM (#5370628) Homepage
      There are a few product to do just that, such as bestcrypt [jetico.com].
    • by nakhla ( 68363 ) on Monday February 24, 2003 @11:18AM (#5370632) Homepage
      Yes, Windows 2000/XP Professional and Windows Server 2003 all support this feature. Encryption/decryption is done transparently so there is no additional user intervention required.

      Also, with PGP you can create PGP disks that are essentially files that are loopback-mounted as an encrypted drive. Any files you copy to this virtual drive are automatically encrypted with your PGP keys.
      • by paulhar ( 652995 ) on Monday February 24, 2003 @11:27AM (#5370683)
        Unfortunately the words "weak encryption" can definately be attributed to Windows EFS encryption.

        Every time you open the file it's decrypted in place, so while the file is "open" it's in an unencrypted state.

        A few scenarios to consider:

        A) Application A always running. While the application is running, the data file in unencrypted on disk so anyone with the appropriate permissions can read it. Exchange is a good example of this - how often do you shut it off?

        B) What happens when you have a powercut. If the file was unencrypted guess what state it'll stay in until you manually poke it?

        C) If it's data like word documents then this is the chain of events: open encrypted file, (it decrypts in the background), you change the file, you save it, windows creates a NEW file and writes the changes to it, office deletes the old file, office renames the NEW file to the name of the old file, windows encrypts the changed file, and office etc rename the encrypted version back to the original filename. But the blocks for the decrypted one are on disk for anyone with the appropriate undelete tools to use.

        Still, better than nothing?

        • The next problem to securing data on EFS is Window's use of a recovery agent.

          By default, the Administrator is recognized as the recovery agent so in an environment without a properly configured domain, it is very possible that someone can take ownership of your EFS files/folders and decrypt them.

          Windows does encode a unique marker onto each drive to identify it's affiliation with a certain domain or Admin, but if someone has physical access to the drive it's also quite easy for the Admin on another system to take ownership of the physical disk.
          • What do you define an "environment without a properly configured domain"?

            If I'm on a corporate network then certainly the domain admin should be able to access my files. The way I understand the Group Policy settings in 2000/XP the domain certificate is keyed upon the actual domain controller/account -- so it would be very difficult to impossible to impersonate a domain controller on the compromised box. Of course, I could have read the whitepaper wrong -- I'm trying to figure out the security settings myself.

            In a home setting:
            "EFS can also be used in small office or home office environments. EFS will automatically generate a recovery key, issue a self-signed certificate to the local administrator account on first logon and save it in the administrator's certificate store just as is the case for default policy in the domain. This makes the local administrator the default recovery agent on stand-alone workstation/servers allowing the local administrator to recover any encrypted file on the system. Note that this is only the default policy. Users may change this to suit their requirements."

            So, unless a home user does something really, really weird then there's no big deal (unless they leave their administrator password blank or easy to guess...)
        • I'm intrigued... some of your arguments against EFS are obvious - (such as the idea that once you've got the physical disk if it's not hard to discover the EFS certificate used for reading - hence the encryption is pointless.) This makes perfect sense - I suspect this issue can be addressed (to some extent) using physically secured domain controllers. However I would like to know your source of information regarding this issue that files are decrypted when open. Do you mean by this that the whole file is written back to disk in plaintext form, or do you mean that only the in-memory copy (which obviously may be swapped out at some stage) is decrypted? Do you have references for this assertion?

          • It looks like even disk access would make recovery difficult:
            " Physically access to the media--An individual with physical access to the machine could potentially attempt sophisticated attacks by going to the disk directly. Attempts to read the data this way will fail because it is encrypted and a successful process would require implementing EFS itself. Another possible attack with physical access can be to invalidate or delete the recovery portion on the encrypted file. This will not still not work because EFS will automatically recreate the recovery information when the file is successfully opened next time."
        • A couple clarifications I found while reading the Word Document [microsoft.com] gleaned from this URL [microsoft.com].

          A) Application A always running. While the application is running, the data file in unencrypted on disk so anyone with the appropriate permissions can read it. Exchange is a good example of this - how often do you shut it off?

          From reading the doc, the file(s) are not un-encrypted and stored temporarily on disk whilst an authorized user is accessing them. That would not make much sense -- it simply un-encrypts the byte stream being read from the file. I assume this is similar to how NTFS file compression works.

          To quote: "A file need not be decrypted before use -- encryption and decryption is done transparently when bytes travel to and from the disk."

          Not only that, but even if the file was on a shared directory any old user could still not access it -- they have to be added as a valid decrypt account (so it really does not matter that they can access it, you explicitly gave them the right!).

          B) What happens when you have a powercut. If the file was unencrypted guess what state it'll stay in until you manually poke it?

          As the file is never decrypted (on disk) until you request it to be, this is false. Obviously if you request a file to be un-encrypted and forget to encrypt it when you turn off your machine then it will, obviously, be accessible.

          C) If it's data like word documents then this is the chain of events: open encrypted file, (it decrypts in the background), you change the file, you save it, windows creates a NEW file and writes the changes to it, office deletes the old file, office renames the NEW file to the name of the old file, windows encrypts the changed file, and office etc rename the encrypted version back to the original filename. But the blocks for the decrypted one are on disk for anyone with the appropriate undelete tools to use.

          Again, incorrect, provided your temporary files are created on an NTFS volume. To wit: "EFS is tightly integrated with NTFS. When temporary files are created, the attributes from the original file may be copied to temporary files as long as all files are on NTFS volume. If the original file is encrypted, EFS encrypts its temporary copies when attributes are transferred during file creation. EFS resides in the Windows 2000 kernel and uses the non-paged pool to store file encryption keys, ensuring that they never make it to the paging file."

          Also, if you encrypt an entire directory any new files created in it are also encrypted (e.g. user encrypts "My Documents" then Word temp files would be automagically encrypted even if the flags were not preserved.)

          This was all readily available with a simple "Windows NTFS Encryption File System" search on Google (it is the second result).

          It seems you either cleverly trolled or did not take the time to research your assumptions. The opening remarks of the document say the exact opposite of what you were trying to say:

          "Manual encryption and decryption on each use. Leaks from temporary and paging files. EFS addresses all the problems mentioned above and more. The following four sections go into detail on the encryption technology, where encryption takes place in the system, user interaction, and data recovery."
          • It seems I spoke a little too soon:
            " Recovery from fatal failures during encryption/decryption operations--EFS also incorporates a crash recovery scheme whereby no data is lost in the event of a fatal error such as system crash, disk full, or hardware failure. This is accomplished by creating a plaintext backup of the original file being encrypted or decrypted. Once the original is successfully encrypted or decrypted, the backup is deleted. NOTE: Creating a plaintext copy has the side-effect that the plaintext version of the file may exist on the disk, until those disk blocks are used by NTFS for some other file. For this reason, it is recommended that it is always better to start by creating an empty encrypted folder and creating files directly in that folder. Doing so, ensures that plaintext bits of that file never get saved anywhere on the disk. It also has a better performance as EFS does not need to create a backup and then delete the backup, etc."

            So, if you take a file and attempt to en/de-crypt it in a non-encrypted folder and are in the MIDDLE of the process your system is hosed then yes, the bits of the file could be accessed. Also, we all know magnetic media is recoverable, so as long as someone wants to apply electron analysis they could obtain the decrypted file.

            Of course, the fact that the file was, at least originally, *not* encrypted also makes it vulnerable to that sort of recovery technique -- the only 'best' method would be to create all sensitive files in an encrypted folder so non-encrypted versions are never created.

            I have an UPS attached to my system -- it should not be out of the question for someone needing high security (and needing to use Windows 2000/XP ;) ) to also own an UPS to avoid many such issues.

            In any rate, creating an encrypted folder seems like an acceptable workaround to a remote chance this will happen.
    • by Lxy ( 80823 )
      Windows 2000/XP (and maybe NT4) have the ability to encrypt the data written to disk. Since it's an MS product, I wouldn't trust anything important to it, but the theory is already put in practice.

      AFAIK linux doesn't have an encrypted FS, nor have I heard about anything under development. If any FS hackers are reading this, this would be a handy project if you're looking for something to do.
      • by wfberg ( 24378 ) on Monday February 24, 2003 @11:28AM (#5370686)

        AFAIK linux doesn't have an encrypted FS, nor have I heard about anything under development. If any FS hackers are reading this, this would be a handy project if you're looking for something to do.


        • by Anonymous Coward
          well, you've just learned something new then.

          Linux has had encrypted filesystems for years now.

          It isn't discussed often because it works well, and there aren't any big suprises.

          if you read through some of the other replies to this thread, there are links to aes, loopback, and the crypto kernel setup.
    • by olip ( 203119 ) on Monday February 24, 2003 @11:19AM (#5370642)
      Encrypted HD can't be safe, can it ?
      Fo example, if it's a PKI, the private key has to be somewhere in the computer (BIOS, HD, ROM, etc.) for the OS to be able to decrypt. So it is very vulnerable.
      The computer is a deterministic system, it fully contains all the information needed for automated processing ; usually security is ensured by the externalization of some part of data (password, private key, fingerprint) considered as needed for some processing.
      I mean, you wont type your password everytime your OS reads from the HD ;-)
      BTW NTFS is a first step in the direction you suggest.

      • by Anonymous Coward
        Fo example, if it's a PKI, the private key has to be somewhere in the computer (BIOS, HD, ROM, etc.) for the OS to be able to decrypt. So it is very vulnerable.

        Encrypt the key with a OTP.

        Another question; why not implement the encryption in the VFS? While a lot of people who want an encrypted FS don't care about the FS implementation, wouldn't it be useful to be able to take advantage of all the current filesystems out there (E.g. Reiser, XFS etc.) and use encryption?
      • by Beetjebrak ( 545819 ) on Monday February 24, 2003 @11:47AM (#5370796) Homepage
        Would a smartcard system not solve this problem? Smartcard reading will bring some overhead, but it needn't be done every time a file is accessed, just once during the user session. Store the key in RAM and make sure that particular bit of RAM never gets swapped to disk. That way the key remains outside the computer, and gets permanently erased when the user logs out or the screensaver kicks in. The user only gets their desktop back from the screensaver after they plug their smartcard back in and enter their password. Combined with S/Key passwords this could be pretty secure... though I'm no expert, so comments more than welcome!
        • I know a guy who works for Sun Microsystems, and this is about half of what they're working on as far as smartcards are concerned; the other half being replacement of SecurID tokens with smartcards.
        • > Would a smartcard system not solve this problem?

          Lets put you in charge of the server 2500 miles away from you in a company server room somewhere that gets rebooted due to a power outage lasting longer than the UPSs could at 4am, and see how you like having to enter codes so it can read the filesystem.

          Servers tend to run by themselfs. Any human interaction defeats the point.
          But the only way to make it automated means someone can get to the key.

          The only thing Close i've seen is a hardware solution a few friends were working on way back when.

          It was a PCI card that monitored the BIOS.
          When the BIOS was performing a POST, it allowed you to read from the ROM on the card.
          Once you peformed this read, you could not read it again until its unlocked via BIOS POST.

          This way with the system running a full root compromise will not yeild your keys.

          However this still doesnt help physical security much. (Does anything?)

          • I had more of a desktop setting in mind where most of the physical security is needed most of the time (concerning compromisable swapfiles, temp files, user profiles, unclean "deletion" and what not). Your point about the remote server is very valid. Smartcards are very impractical on remote servers but those servers that actually require such stringent security measures are hopefully set up in a datacenter that has physical access locks and policies up to and including the actual rack.. probably also involving credit card sized electronic keys ;-))
            Do your friends have any details on this PCI-card posted anywhere? I'd like to learn some more about it! It would seem to me pretty much the ultimate way to secure a key.. but they did weld the card into the slot, right?
            • > Do your friends have any details on this PCI-card
              > posted anywhere? I'd like to learn some more about
              > it! It would seem to me pretty much the ultimate
              > way to secure a key.. but they did weld the card
              > into the slot, right?

              Unfortunatly they gave up on the project because of all the physical security issues still remaining. Like you just said, assuring it isnt removed from the computer somehow is one, i have no idea if they thought of or solved that.

              I also lost touch about 3 years ago, the only thing keeping most people from doing this with easy to get parts is the BIOS monitoring stuffs they used. Im more of an electronics buff, but im sure someone knows how to monitor resets and post from the PCI bus.. after all, SCSI cards and the like are passed control for booting at this time, that would be one good way to do it.

              However for desktops, they decided it was easier to store an encryption key on a floppy disk and require that read to unlock the encrypted disk (just a second disk, not the boot volume)
              One can do this pretty nify like today with front panel USB jacks and one of those 16-32mb USB keychain disks (Plus have room for your files too!)
          • That would be funny. Company X spends hundreds of thousands, possibly millions, on making their network secure, then lose hundreds of thousands in lost transactions and downtime because their admins get locked out of their network or don't have access to properly administrate it.
          • What about the system having a system with a separate cryptosystem, with a private key, for which I, the admin, has the corresponding public key, and my public key. This system should hold no other data, and only accept a transmission signed by my private key, and encrypted with its public key, containing the private key for the main system? Optimally, this system should be a physical box inside the main computer, which will self-destruct if opened.

            This way, when the computer 800km away boots up, I get a message it booted (by SMS or whatever unsecure but instant channel available) and I send it its private key, which it stores in the box and uses to decrypt the main filesystem in RAM...
        • Well if we are theorising it is fair to say that a private key sitting in RAM is able to be stolen regardless of disk writes.

          If you want the private key to be safe then it needs to stay on the smart card in an irretrievable way. The decoding would have to happen on the card.

          Unfortunately you have a new bottleneck in your computers IO now. Your smartcard CPU.

          All theory. I don't ground any of this in reality yet...
    • Yes, it's a common feature on Windows 2000 on, Linux, etc. Google can help.

    • by burgburgburg ( 574866 ) <splisken06&email,com> on Monday February 24, 2003 @11:26AM (#5370677)
      Even if your final documents are stored under the encrypted path, you have to worry about temp files that might have been created that are "stored" elsewhere.

      MS products, in particular, like to create a large number of temp files and there is no way of configuring where they are kept. I'm not sure if OSS alternatives have this configuration ability.

      And of course, you also have to worry about elements of documents in memory (which can be recovered).

      • by homer_ca ( 144738 ) on Monday February 24, 2003 @11:51AM (#5370818)
        LoopAES for Linux can encrypt your swap partition and your root partition (all it needs a small unencrypted /boot partition). Unfortunately, there is a big overhead in CPU usage. I tried CryptoAPI for the 2.2 kernels, and on my K6-2 400 Mhz file server it dropped transfer rate to 1.2MB/s. Assuming linear CPU scaling, you'd need about a 2 Ghz just to keep up with 100Mb fast ethernet.
        • > it dropped transfer rate to 1.2MB/s

          Boy there is something wrong in your setup.

          I use LoopAES with a P3-450, underclocked at 300 MHz (66MHz FSB). I get about 4.5 MB/s on the Ethernet to/from a crypto partition. I think the bottleneck is my QoS traffic shaper on that interface, and not the crypto itself. Just by reordering the QoS rules I got speeds varying from 300 kb/s to 4.5 MB/s. Probably you loose performance on similar items, and blame it on the crypto.

          Marc
          • I'm pretty sure it was the crypto. Transfer rate from an unencrypted partition was about 5MB/s (blame that on a cheap 10/100 hub). The K6-2 is a pretty weak processor compared to your PIII even at 400Mhz. Also I didn't try LoopAES yet on that box, it was using the CryptoAPI patch from kerneli.org on a 2.2 kernel. If LoopAES is that much faster, I'd be real happy.
            • Btw. I implemented a DOS/Win9x harddrive crypter once, which used RC5 as algorithm. RC5 is very fast on modern CPUs. With a lot of hand-crafting the assembler implementation, I got approx 150 MByte/s of data throughput. That's RC5 with 12 rounds (64bit blocksize) and the CPU was an Athlon 1.2GHz with 133 FSB. The measurement did not include harddrive access. When you're still not impressed: it runs in 16 bit real-mode.

              To my knowledge, the upper limit of AES is about 30 MByte/s on modern ~1GHz machines. I don't know which particular implementation LoopAES uses, so it may be slower.
      • by GGardner ( 97375 ) on Monday February 24, 2003 @11:52AM (#5370830)
        Don't forget about swap or paging space, either.
    • by stilwebm ( 129567 ) on Monday February 24, 2003 @11:28AM (#5370687)
      There are patches for the Linux Kernel that use loopback devices and the international patches (CryptoAPI) to encrypt filesystems transparently. They also require CryptoAPI enabled losetup, mount, and umount binaries. Linux Encrypted File System Howto [abeowitz.com]

      A similar arrangement is available to OpenBSD. OpenBSD Encrypted Virtual Filesystem Mini-HOWTO [backwatcher.org]
      • by Sloppy ( 14984 ) on Monday February 24, 2003 @12:39PM (#5371212) Homepage Journal
        The loopback device approach just encrypts at a device level, rather than the filesystem level. While that is cool, it isn't quite what the original poster was asking about. While it's good for your personal porn collection on your (effectively) single-user PC, it's not very useful in a multiuser situation, where you don't want everything on the filesystem to have the same key.

        It would be nice to have actual filesystems (not just devices) that have crypto really designed into them.

      • Finally someone has mentioned it! Of course Linux supported the encrypted filesystems, and it works very well too. It's configured on my home partition for the past few months and it's as fast and transparent as a rocket.
    • by giminy ( 94188 ) on Monday February 24, 2003 @11:29AM (#5370694) Homepage Journal
      MacOS supports it too. You can create AES encrypted disk images and mount them. And of course so does linux (and I'd guess *bsd). You can make a file and mount it encrypted through the loopback device.
    • by Anonymous Coward

      FreeBSD has a new system in the 5.x series. It's called GBDE [freebsd.org] (Geom Based Disk Encryption).

      Basically you ``open'' a partition that's encrypted and you can do any operation you want and only ciphertext will hit the disk. You can then ``close'' the partition and no one should be able to read it.

      You can have upto four different pass-phrases so four different people can access the data independently. Each of the four people can also self-destruct access to the data in case of ``attack'' (``blackening'').

      The man(1) page list above has a good description.

    • by Anonymous Coward
      DriveCrypt Plus Pack ($150 USD), which only works with Windows XP, encrypts the entire operating system and/or individual partitions/physical drives. It authenticates from the boot sector and decrypts into system memory on the fly.

      An alternative is to create virtual encrypted disks, which sounds like the solution you may be looking for:

      DriveCrypt "classic" and Bestcrypt (both under $100) will create virtual encrypted disks. For Windows 98/ME, a free program known as ScramDisk does the same thing (it's the precursor to DriveCrypt).

      A freeware version (6.0.2?) of PGP comes with PGPDisk, it can be obtained at www.pgpi.org. PGPDisk does basically the same thing as DriveCrypt/ScramDisk and BestCrypt. PGP 8.0 Personal also has this feature, it's $50 for a personal license.
    • Yeah, its called EFS and its available on Win2k and XP
  • by Anonymous Coward on Monday February 24, 2003 @11:13AM (#5370609)
    This is nothing new. Administrators and other have known for a long thime that no machine is secure if someone has access to the physical machine. If someone can open your box up, reboot it, attach new devices to its private subnet, etc. then it is not secure.

    Why anyone thinks this should be different for storage systems is beyond me. If someone can break in and steal your data, or attach new devices to the data transfer channel, or whatever, then your data isn't secure. That the authors think this comes as a revelation to anyone means either they are really stupid or they think administrators are really stupid.

    Get your machines installed in a location with good physical security. That's really all there is to it.
    • by Anonymous Coward

      This is nothing new. Administrators and other have known for a long thime that no machine is secure if someone has access to the physical machine.

      Some machines are more secure then others. With Suns you can lock the PROM (== BIOS) so that even to boot you need to enter a password. You basically need to open up the box, pull the EEPROM chip, and put in another before you can even think about booting.

      Alot harder then simply press DEL on bootup, wouldn't you say? :)

      Try doing that with a regular PC BIOS. (I think Apple also uses OpenFirmware (IEEE 1275 [openfirmware.org] as well.)

      • Erm, several PC BIOSes support passwords on boot etc., likewise necessitating opening the machine up (to discharge the battery or whatnot)..

        • by Anonymous Coward

          Yes, and there are programs that either crack or read the password (doing a quick Google):

          • http://www.cgsecurity.org/index.html?cmospwd.htm l
          • http://www.expage.com/page/toshibapassword
          • http://pascal.sources.ru/hacker/amipsw.htm

          If you don't the PROM password for a Sun the only thing you can do is can a new EEPROM chip -- you can't access the password in anyway. There is no ``discharging'' the battery (though I think some PC BIOSes now do this). Of course you can simply do a BIOS-update to get rid of all the values....

    • ... or they think administrators are really stupid.

      I've taken the pessimistic stance that most of them are... otherwise I wouldn't be regularly bombarded by worm attacks. That and this overwhelming feeling that my universities networking department is run by monkeys...
    • I'm sure others have said this already, but there's more to security than physical location. You're only as secure as your weakest link. If any unauthorized people can gain physical access to the system you KNOW its insecure. If it uses any unencrypted network protocols it is possibly insecure, depending on what data is transmitted over them, like NFS and possibly SMB, telnet, ftp, etc. Its unlikely that, on a switched network, an attacker could gather much valuable data, but there's always the possibility.

      Security is almost a state of mind. If anyone in your company isn't thinking securely and isn't trained to think this way you may be insecure. In short EVERY corporation I've worked for is entirely insecure and could easily be hacked by a professional like myself. Its a good thing I choose to work for the high paying tech industry instead of the high paying black market.

      And if you think things are insecure now just wait a couple years as our modern technology pours out into the hands of those black hat script kiddies. A 400Mhz PDA sitting outside your building could be logging and forwarding all wireless communications anywhere and to anyone and nobody would ever know it. That same PDA could easily be walked into a building and connected to a live net drop for an hour at lunch someday, again snooping for useful data. Its only a matter of time before they find something and gain access. Then you're hacked. Its almost that easy, for them.
  • Blah (Score:2, Redundant)

    by Anonymous Coward
    "Security is a process, not a product"
  • Why? (Score:5, Insightful)

    by netwiz ( 33291 ) on Monday February 24, 2003 @11:18AM (#5370633) Homepage
    Why is this something you'd need a book for? It comes down to the basics.

    One, never allow physical access to what you're trying to secure.

    Two, _never_ allow physical access to what you're trying to secure.

    Three and so on: log all security events, break users into groups for simplification of manageability, set permissions properly, protect network shares and device access, and be aware of the content that's being secured (what it is, how it's used, etc.)

    Beyond that, there's not much else to consider. However, from the review it looks like they go beyond security issues to stuff like, "what hardware is best for my particular application." Sure, it's a big consideration. For example, you wouldn't want a two million row database running off a Network Appliance over NFS across switched fast ethernet, but there's enough free information out there that making decisions like that should be trivial. Furthermore, if you're doing system specifications w/o knowing about the technologies you have to choose from, I sure hope you're not an employee of the place for which you're building a system, because they're not going to like you very much when it dies on a regular basis.

    Not having actually read the book, I may be way off base, but from the title and the review above, I don't see how it would be all that helpful except maybe as a primer to a junior-level engineer.
    • Re:Why? (Score:4, Funny)

      by AftanGustur ( 7715 ) on Monday February 24, 2003 @11:33AM (#5370712) Homepage


      Why is this something you'd need a book for? It comes down to the basics.

      One, never allow physical access to what you're trying to secure.
      Two, _never_ allow physical access to what you're trying to secure.

      And then, one day, you come to work and realise that you :

      Three: Your IP center burned last night.
      Four: Your IP center burned last night.

      Five: Your backups were in the center.
      Six: Your backups were in the center.

      • Should have been "IT Center"
      • And more of the physical security aspect is keep backups at a separate location. Have a disaster recovery plan, etc.

        Physical security is just as important as network security (permissions, passwords, encryption, etc.) As far as I'm concerned, no system is completely, 100% foolproof secure from network attacks unless it meets one of the following two criteria:

        (1) It doesn't exist; or
        (2) There is no I/O connection available to the outside world. The only electrical conection is the power cord.

        (At risk of revealing my network ignorance, I continue)

        Anything more than that is a security risk. Firewalls try to address #1 by making the machine invisible to port scanners. This, it seems to me, can be worked around with a packet sniffer; if the data packet comes from or is bound for a particular IP, then chances are that the machine at that IP exists. Look for the evidence of a machine's existence as opposed to the machine itself. You don't look for black holes, you look for evidence indicating their existence.

        #2 just makes a machine worthless. So that is obviously not a solution.

        Any desired level of security except absolute can be achieved; it is a function of how much money you are willing to spend on it.
      • And then, one day, you come to work and realise that you :

        Three: Your IP center burned last night.
        Four: Your IP center burned last night.

        Five: Your backups were in the center.
        Six: Your backups were in the center.


        This may be a funny, but aside from the human tragedy, I know some folks who implemented 'off-site' storage - in the other tower... not sure whether to laugh or cry about that one. [Inigo Montoya voice] "You keep using that word. I do not think it means what you think it means."
    • Re:Why? (Score:5, Informative)

      by Hanashi ( 93356 ) on Monday February 24, 2003 @12:14PM (#5371007) Homepage
      [Disclaimer: I wrote the review in question.]

      Actually, there's a lot more to security than just keeping your data secret. Information Security practice is based on three pillars: Confidentiality, Integrity and Availability (AKA "CIA", which sounds like an oxymoron, doesn't it?). There's a lot more to it than just keeping people away from the physical storage medium.

      Maybe I should have made this more clear, but the nicest thing about this book is that they cover *all* the security bases, not just the ones most people think of. They show how to evaluate technologies or specific solutions on the "I" and the "A" as well. That's why I think this book is so useful. It points out areas of security that many people often overlook.

      • Okay. That makes more sense. I just tend to break the separate parts you mention (availability, integrity, etc) into separate functions, and don't group them all under the umbrella of "Security." Integrity and Availability to me seem better suited as a reliability planning task, not one concerned w/ security.

        And I'm not saying that physical security is the end-all-be-all of this particular scenario. It does, however, play a very big part. It may just be my environment, but most of the storage I deal with is locally attached, or via NFS/CIFS shares. Both are relatively easy to secure, from an access standpoint (woo-hoo RFC1918), and both are relatively simple to maintain. In this scenario, system remote access is granted to very few trusted persons, with the actual greatest threat to the data being hardware failure, or someone tailgating the datacenter door and then proceeding to rip drives out of systems.
  • by Anonymous Coward on Monday February 24, 2003 @11:18AM (#5370634)

    IEEE is working on [ieee.org] a standard (IEEE P1619) which will allow encryption to shared media (SANs I guess). They've set up a working group [ieee-tfia.org].

    They're looking at (from the website):

    • Cryptographic algorithms for storage
    • Cryptanalysis of existing and proposed systems and protocols
    • Key management for storage
    • Attacks on storage area networks and storage systems and countermeasures
    • Standardization approaches
    • Deployment of secure storage mechanisms
    • Defining and defending trust boundaries in storage
    • Relating storage security to system and network security.

    Something to look at in the future. Hopefully it'll be more secure than WEP. :)

    • As a matter of fact, I believe it will not be another WEP standard because we have engaged the cryptographers before the standardization process is complete, and to that end, our first proposal has actually been withdrawn because of a non trivial flaw found and published even before it reached draft status. I believe that this process is working.

      The process is ongoing and I suggest people participate. The next meeting is in April in San Diego just after the IEEE MSST conference in San Diego.

      Thanks

      Jim Hughes
      Chair, IEEE P1619.
      jim@network.com
  • I know that the term security here is refering to keeping thinigs secret, but I've often wondered what is the best medium for stable storage of data. Right now I've got a large external firewire hd that I backup everything to. However, I'm really paranoid about keeping the drive level, keeping it away from monitors an all other sorts of magnetic devices. I wonder if I'm being too paranoid?

    Anyway, the question I ask is what is a good place to backup data to (besides tape). I know if my firewire were to die I'd probably wanna die too. I've got gigs of my own music on there, and that stuff is not replacable. How paranoid about magnets etc. should I be?
    • When we talk about "Information Assurance," it's based on 3 principles:
      Confidentiality--Nobody reads your data unless they're allowed to (think top-secret information)
      Integrity--Nobody can change your data unless they're allowed to (think bank account balance)
      Availability--When you need the data, it's there (backups, redundancy, etc.)

    • One is never enough, you need two disks. Don't bother with RAID, just keep them in sync with something like Unison.

      That way you also know as soon as one of them has failed and can do something about it. Not like backup media which you might have to worry about demagnetizing/whatever.

    • If you are doing a complete copy to your firewire harddrive and it's being used as a back up you should be fine... If it's the only place that information exsists then you could get screwed.

      Basicly the best back up is a complete copy kept offsite. Media doesn't matter. If it dies it doesn't matter cause you still have the original. You just have to keep one of them working.

      MG

    • What is wrong with tape? It is still the most used media and we have years of experience on how to treat it and the life expectancy. You need to get your copy of the data miles away from your site to be of any use in a real disaster!
  • by airrage ( 514164 ) on Monday February 24, 2003 @11:38AM (#5370744) Homepage Journal
    I've had this similar thinking before, because the information in and of itself is not important, from a technical perspective, it's the mechanism to access that needs to be secure. Hence, a SAN with a fibre-channel fabric would seem secure (a client needs an HBA card), but hook it up to a MS File server, SQL Server, or Oracle, and suddenly all the same exploits apply.

    I would suggest it's not the type of nails used, it's the design of the front door. I could be wrong.

    Peace, Out!

    ~Airrage ;)
  • its true; many IT people do forget that this field is really all about protecting and working with information; computers are mearly the too for doing that.

    In fact, today there was a high profile F-Up by someone in my department; they wanted to be in charge of upgrading our mainframe, even tho they have no experience whatsoever working on such equipment, and know nothing about Unix. Thousands of dollars an many consultant hours later they got it 'Live', and now it routinely drops printer support, and was down for three hours this morning.

    Funny, somewhere they forgot that the information on that machine was very important, and that hundreds of users need that machine to function so they can work. Oh well.

  • by GGardner ( 97375 ) on Monday February 24, 2003 @12:04PM (#5370920)
    Several years ago, I had a dual-boot Linux/Windows machine at work, doing all my real work in Linux. HR would periodically email "important" memos to the whole company as MS word .doc attachments. Note this was before OpenOffice, or any of the other .doc converters were available for Linux. Rather than rebooting, just to read some HR drivel about proper use of the parking lot, I'd often just "strings(1)" the .doc file, and get the gist of what they were saying.

    One particular memo was about the servicing of the water coolers, and went out to the whole company. When I strings'ed the memo, though, at the top was a draft of an employee's termination letter! Oops. Apparently, this was the undo buffer for Word -- the writer of the memo had just written the termination letter, printed it, deleted it from the document, and wrote the water cooler memo in the same instance of word. However, if opened this doc in Word, I couldn't access the hidden info, no matter what I tried.

    Since then, I've always wondered how much other sensitive information has snuck out, via MS Word.

    • by Anonymous Coward

      This issue has been mentioned several times in the RISKS Digest [ncl.ac.uk]:

      • http://catless.ncl.ac.uk/Risks/16.34.html#subj1
      • http://catless.ncl.ac.uk/Risks/16.36.html#subj5
      • http://catless.ncl.ac.uk/Risks/21.69.html#subj5

      There have been issues with Word going back to 1994: The more things change....

    • Yeah you can get bits of other docs in your doc.

      Other sensitive info? Maybe not that sensitive but you can get: the directory path you use to store the document. The configured name, company. The ethernet address of the computer the document was created on.

      Often you can find out things like: which company helped someone write the Tender document.

      Even more fun if the annotation and revision stuff is turned on.

      Also if you are the one creating the Word Document you can insert links to a different tiny image per page. Similar to web bugs, but the difference while browsers tend to load all images (or none), Word only loads images which are to be displayed. So you often can tell which page someone is reading. Of course if word can't load the image you see some ugly icon. But many companies have transparent access to the internet.

      Use your imagination.
  • by TarPitt ( 217247 ) on Monday February 24, 2003 @12:28PM (#5371123)
    May be of interest, but there is a vendor, Cybernetics [cybernetics.com], that offers a tape drive that encrypts backup media in hardware. See this [interex.org] article.


    Keys are stored in smart cards. Reading backup tapes requires a Cyberntics drive and the correct key. Obviously you need to manage this very well to avoid being SOL during an actual recovery situation.


    Of course, consider how vulnerable your backup media really is. I don't need to hack your network, just show up in an Iron Mountain uniform with forged ID maybe 30 minutes before the real Iron Mountain guy shows up. I then drive off with ALL you data.

    • There is also the "Paranoia" series of hardware tape encryption units that are good for any SCSI tape drive or library and operating system. Overcomes the worry of the smart card being cloned by using internal volatile RAM for the keys. Article at http://www.enterprisestorageforum.com/outsourcing/ features/print/0,,10562_882931,00.html

      Also many of the tape backup programs offer a level of tape encryption, of course they are slow and offer lower security levels but are better than nothing.
    • by Qzukk ( 229616 ) on Monday February 24, 2003 @01:50PM (#5371828) Journal
      Obviously you need to manage this very well to avoid being SOL during an actual recovery situation.

      Not only is the key needed, the original drive is needed too according to the interex article. Not good for recovering from offsite backups after the place (and the original drive) burns down.
    • This article seems to be quite old (copyright 2001) and I cannot see any reference to the product on their web site. Maybe it was dropped? Present hardware units do not need the original drive, as it would as you say be pretty dumb for the planned DR usage. Backup does not matter - only the restore counts!
    • Some years ago I hacked up GNU tar to encrypt the tar file as it wrote it. It used the Blowfish algorithm with a key derived from a user-supplied passphrase. It was fast enough to keep my 500 kbyte/sec DDS-2 tape drive streaming when running on the 33 mhz 80486 that I had back then. If there's interest I may dig out the source and put it on my web site. These days though, it's probably simpler to use an external encryption program, since the performance penalty from the external program is more than made up by today's much faster cpu's (tape drives haven't gotten faster by nearly as much).
  • Backup Media (Score:2, Informative)

    I used to work for a Fortune 500 company as a Unix sys admin. One of my projects was to assist in bringing a new Oracle financials system on line. The data on this system was so sensitive that only the executive board was given access, and then only via SecurID cards from specific locations during specific time windows.

    Nightly backup tapes were queued in a fireproof walk-in vault before going offsite at the end of each day. I happened to be strolling by the vault one day and noticed the backup tapes sitting there on a shelf in the vault, right next to the open vault door. I did some checking and found out that the vault was left open during business hours so that the operations folks had easy access to backup media. The vault was in a different department than I/S, on a main hallway, right near the front door of the building. Obviously, I mentioned this to the Operations Manager. The new policy limited access to only a couple of operations supervisors, and instituted a media checkout policy (nothing a little social engineering couldn't thwart, but far better than the previous situation).

    So what's the moral of the story? Make sure your security policy deals with backup media. Don't just assume that your operations department (or the offsite storage provider) is securely managing your media.
  • Similar book (Score:2, Insightful)

    by neoThoth ( 125081 )
    I know the author of a similar book that hasn't quite finished up yet. He was concentrating on the SAN's aspect of it since NAS security is pretty much the same FAQ as 'how to setup a file server'.

    Secure SANs [amazon.com] was slated to come out last year but hasn't ever been more then a link on Amazon. It dealt with the ugliness of iSCSI and how the 'air gap' security that protected this data for so long is now gone and storage administrators are struggling to learn how the real world works.

    Not to bash storage admins but they've relegated most of their 'security efforts' to LUN masking and other such techniques. Now that SCSI drive commands are traversing networks huge security vulnerabilities are opened up. I read an advanced chapter of the Secure SAN title and the best part was an executive from a prominent NAS company stating that he wasn't worried about the security of the products since "only a handful of ppl in the world could have this conversation".

    Check out the recent efforts at Storage Networking Industry Association [snia.org] who have come as close to working miracles as I've personally seen. They have managed to create some various technial frameworks and security processes that make vendors work together.

    One interesting note about the book featured here is that it also deals with NAS and DAS. NAS and SANS have been fighting it out as IDE and SCSI have. One is cheap and easy the other pricey and very difficult. DAS on the other hand is a joke to me. The ability for one computer to change bits in another's memory DIRECTLY does not sound like a good idea. Hackers have worked for decades to write shell code that allows the ability to change bits in memory and now the storage industry has created a way to get directly in there bypassing all OS security.... yea great idea
  • I also read Storage Security and found it to be quite thought provoking. I think there could have been more scenarios and modeling, but all in all, it gave me several ideas and confirmation that the building blocks I've started will help make and ensure my SAN environment is more secure. There were many topics covered that really got me thinking. I'd recommend it. Techierat

"For the love of phlegm...a stupid wall of death rays. How tacky can ya get?" - Post Brothers comics

Working...