Data Encryption Best Practices For Edge Environments
Data Encryption Best Practices For Edge Environments
DATA ENCRYPTION:
BEST PRACTICES FOR EDGE ENVIRONMENTS
It seems that the number of breaches and Encryption is the process of translating data
data leaks is rising year over year, with each from one form (plaintext) to another (ciphertext)
seeming to be bigger and more high-profile than - see fig. 1. It ensures that if the data falls into an
the previous one, resulting in more data and unauthorized party’s hands, the data cannot be
customer information being exposed. The data accessed without having the correct encryption
is either sold on the black-market/”dark web” keys to decrypt the data.
or published on the Internet to embarrass or
discredit a person or company. In some cases, Gartner defines encryption as, “the process of
this has resulted in hefty fines and financial systematically encoding a bit stream before
penalties for the companies involved. transmission so that an unauthorized party
cannot decipher it.” Data-at-rest encryption
The fact is that many of the
breaches can be attributed
to one or more of the
following, unauthorized
access (hacking), malware/
viruses exploiting security
holes from poor computer
maintenance (patching),
social engineering (email
scamming), and in some
cases hardware theft.
SvSAN’s data encryption feature delivers ultra- The scenarios are as follows:
secure encryption using a FIPS 140-2 compliant 1. Normal running state
algorithm and meets HIPAA, PCI DSS and SOX 2. Single KMS server becomes unavailable
requirements. It does not require special self- 3A. All KMS servers in a cluster are unavailable
encrypting disk drives, RAID cards or FPGA/ASICs - VSA online
and has the flexibility to encrypt all mirrored data, 3B. All KMS servers in a cluster are unavailable
or just selected volumes. The data is encrypted - VSA offline or rebooted
in-flight, before it is written to disk. 4. Key revoked/deactivated
SvKMS is a separately licensed product to SvSAN While the connection state to the KMS cluster
is good, SvSAN will recheck the connection to
and the two can be used independently of each
the KMS cluster every 5 minutes.
other. For more information on SvKMS, please
If there is an issue with this connection and
refer to the SvKMS product data sheet.
the VSA can no longer contact the KMS cluster
Furthermore, if your organization is already using it will recheck the connection to the KMS every
an existing KMS solution, providing it is KMIP- minute.
compliant, SvSAN’s data encryption feature is If unable to establish connectivity to the KMS
the VSAs will trigger an event.
already fully compatible and can be integrated
with it immediately.
SCENARIO 3A:
ALL KMS SERVERS IN A CLUSTER ARE
UNAVAILABLE - VSAs ONLINE
SCENARIO 3B:
ALL KMS SERVERS IN A CLUSTER ARE
UNAVAILABLE - VSAS OFFLINE OR REBOOTED
Recovery:
SCENARIO 4:
KEY REVOKED/DEACTIVATED
Fig. 6
Error displayed in the WebGUI.
Fig. 7
Volume in “Offline (Locked)” state.
Fig. 8
Events logged in the WebGUI.
SvSAN’s data encryption feature has been Visit the StorMagic website to read more about
developed to provide ultra-secure FIPS 140- StorMagic’s virtual SAN solution SvSAN and
2 compliant encryption and the flexibility to encryption key management software SvKMS.
work with any KMIP-compliant key manager, Why not explore some of the others, such as
including StorMagic SvKMS. SvSAN is resilient Predictive Storage Caching, or the witness?
and flexible enough to be deployed at remote These features and more can be accessed
and edge sites, enabling safe, secure data through the extensive collection of white
encryption alongside highly available storage. papers on the StorMagic website.
The process of installing and deploying SvSAN is
straightforward enough to ensure data can begin Additional details on SvSAN are available in the
to be encrypted within 15 minutes. As shown Technical Overview which details SvSAN’s
through the scenarios in this white paper, SvSAN capabilities and deployment options.
handles many common failures of a remote
KMS cluster, and endeavors to keep the volumes If you’re ready to test SvSAN or SvKMS in your
online and protected, providing peace of mind. environment, you can do so totally free of
charge, with no obligations. Simply download
a fully-functioning free trial of both products
from the website.
StorMagic
Unit 4, Eastgate
Office Centre
Eastgate Road
Bristol
BS5 6XX
United Kingdom
www.stormagic.com