News
3/29/2008
01:12 PM
Terry Sweeney
Terry Sweeney
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Lockdown Tradeoffs

Enterprise users and consumers alike have been scared straight about data protection, given the regular headlines about laptop theft or misplaced hard drives. But as users rush to secure the desktop, are their good intentions making the jobs (and lives) of storage pros more difficult?

Enterprise users and consumers alike have been scared straight about data protection, given the regular headlines about laptop theft or misplaced hard drives. But as users rush to secure the desktop, are their good intentions making the jobs (and lives) of storage pros more difficult?I ask this as after reading over this interesting review of whole-disk encryption which looks at seven different products and rates them on ease of use, cool extras, cost, and manageability.

There's certainly no good reason not to encrypt. It's gotten a lot easier and more transparent to the user in the last five years. Many programs are even available free of charge, and whether you're Windows or open source based, there are lots of choices. In many cases, crypto developers have gone to great lengths top ensure that their protections don't swallow up tons of capacity or overhead.

We'll leave the issue of whether your data's worth protecting for another time. Better yet, we'll check in with you on this topic a few minutes after you discover your laptop's gone. Funny how urgency can often create value.

What's less clear to me is how these programs get treated from a data center perspective (assuming that the usage case is business, and not standalone, personal data). Do the virtual volumes on which these encrypted files reside get backed up as well by enterprise servers? Is it presumed that IT has signed off on approved programs or that file protections won't make a hash of daily or weekly backup processes?

And what about the impact of encryption on the wave of data de-duplication that's sweeping the market? If it doesn't make them moot, what does encryption do to restoration times? I'm guessing it's not going to accelerate them any.

I'd love to hear from readers about how you address this, either with your users or CIO. Does one crypto policy fit all where backup's concerned? Let me know.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
DevOps’ Impact on Application Security
DevOps’ Impact on Application Security
Managing the interdependency between software and infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.