Page 41 - Security Today, March 2019
P. 41

solution might not be suitable for applications such as security video recordings, patient telemetry, or virtual desktop infrastructure—a technology which requires extremely high IO, constant access, and efficient deduplication in stark contrast to the X-ray images.
When developing a cost justification for storage, an organization needs to look at more than one use case. Organizations need to con- sider a broad spectrum of potential storage use-cases and how those use cases drive changing requirements change over time. Having in- sight into storage needs and goals early can help a wide organization to innovate and evolve and also keep storage costs down in the long run.
It is advisable to share a common storage architecture framework across the company, and look for opportunities to collaborate on storage management and collocation between various departments to drive efficiency. The organization as a whole is responsible for its data, or its customers’ data, rather than leaving this to individual suborganizations.
Understand Storage Capabilities and Requirements
Technology is never static; storage managers need to understand technologies available today and what is coming down the road in the future—both in terms of secure storage platforms and tools as well as security threats and compliance challenges.
One of the biggest trends underway today is the move toward au- tomation. Companies are looking—or should be looking—to auto- mate every process whenever possible. That includes storage manage- ment and ensuring the security of storage resources.
The cloud, artificial intelligence, and edge-based processing sys- tems are introducing more flexible options than were available in the past. Identify where it makes sense to leverage private and pub- lic cloud services to meet storage needs, how to utilize edge storage and analytics platforms, and when to invest in new and bleeding-edge technology to gain an edge.
When developing a secure storage framework, keep in mind the exponential growth of data and the rise in the number of sources of data. Who would have imagined even a few years ago the impact the Internet of Things (IoT) would have on storage requirements? It is difficult to imagine what the storage scenario will be like in a few years, but it pays to make accurate predictions.
Not All Data Is Equal
Grasp the idea that when it comes to security, not all data is equal. When building and implementing a storage strategy that incor- porates the cloud and the edge, always keep in mind that some data is far more sensitive than others, and that users may not understand
the difference.
For instance, you cannot equate publicly available product data
that can be readily found on a web site with customers’ financial in- formation or individuals’ medical records. The latter two are far more sensitive and need the highest levels of data protection.
Organizations need to efficiently classify their data and have an understanding of what it is, where it lives, and who can access it. Failing to place greater protections around the most sensitive data can expose enterprises to regulatory compliance issues and possibly result in significant fines. The new General Data Protection Regula- tion (GDPR) that went into effect in the European Union in May 2018, for example, is designed to protect the data of EU citizens. The penalties for non-compliance are steep.
When managing data storage, focus on the most sensitive data first and shore up the weakest areas. Many of the data breaches of recent years have resulted from rudimentary mistakes that companies have made, such as not encrypting sensitive data or having poor ac- cess rights management.
It is import to understand what tools are available in the form of
security analytics, logging, and so on are available and take advan- tage of these capabilities. These security tools need visibility. Make sure the security operations center is plugged into cloud initiatives as they are defined and developed.
Choosing the Right Storage Type
Data storage options abound today, whether it is cloud-based solutions or on-premises systems. Organizations need to assess which of these op- tions is best and most secure for particular use cases. For example, they need to know when it makes sense to use data lakes, or when they need global scale read activity or high velocity multi-party updates.
With the growth of edge processing and analytics, they also need to know when to use storage at the edge of the network, as close to the original source of the data as possible. As more data is generated by IoT devices, storage at the edge—and securing those storage re- sources—will become increasing important considerations.
A significant portion of storage strategy is forecasting current and future costs. Companies can leverage analytics to look at storage costs and to help determine the most cost-effective ways to store data and to move data around as needed.
Vitally important also are integration efforts which can bolster security. Companies need to integrate between platforms wherever possible, so they can leverage capabilities such as unified authentica- tion and unified visibility.
Make every attempt to centralize permissions and control through cloud access security brokers (CASBs) or other integrations.
As with everything else in IT, integrate storage into operational pro- cesses and policies to avoid siloes and fractures in operational flows.
Invest in People
Address the “people” issues related to secure storage.
Creating a secure storage infrastructure is not just about having the right products and processes in place. Companies need to make
sure that personnel have the skills in place to succeed.
Data storage in 2018 means having people on the team who un- derstand the latest on-premise storage technologies, cloud computing services and containers, edge computing, storage integration, soft- ware-defined storage, data backup, data architecture, IoT, regulatory
considerations, and of course cyber security.
Organizations may broadly benefit from expanding their capabili-
ties to encompass more advanced skills such as artificial intelligence/ machine learning, data engineering, and data visualization.
Acquiring many of these skill sets can be among the most signifi- cant challenges organizations face when creating and deploying a se- cure storage strategy. It is important for technology and business lead- ers to work together to train current professionals or hire new ones who can build the storage infrastructure that will support the organi- zation for years to come. Companies have to be willing to invest in the people who can help make the new storage environment a reality and avoid the IT staff turnover that can paralyze an entire organization.
There is another important people-related challenge: easing the concerns of existing staffers about the coming changes in data stor- age requirements. At many organizations, especially larger ones, there are bound to be technicians who are experts in on-premise storage who may resist a move to cloud-based storage.
Again, it is up to senior managers in IT and elsewhere to train or retrain people in these emerging areas. That way
they will not feel as if they are being phased out
and at the same time companies will acquire some
needed new skills.
Richard Diver is the cloud security architect, Security Services at Insight Cloud & Data Center Transformation division.
WWW.SECURITYTODAY.COM 39



























































   39   40   41   42   43