The protection of stored data involves putting off unauthorized users from accessing it as well as preventing unintended or intentional damage, infection or sleaze of information. While data encryption is a familiar subject, it is just one of several methods and technologies that can be used to execute a tiered data-security plan. Steps to secure data include understanding applicable threats, aligning appropriate layers of defense and continual monitoring of activity logs taking action as needed.
- Employ a tiered data protection and security model that includes multiple perimeter rings of security to offset consistent threats. Multiple layers of security can isolate and guard data should one of the protection perimeters be negotiated from internal or external threats.
- Include logical and the physical safety. Logical security comprises of authorization, authentication, encryption, and passwords. Physical security includes restricted access and locks on the server, storage and networking cabinets.
- Logical security incorporates protecting your networks with firewalls, running antispyware and virus-detection programs on servers and network-addressed storage systems. No storage security plan would be complete without making sure that applications, databases, file systems and server operating systems are safe to prevent unauthorized or disruptive access to the stored data.
- Apply storage system based volume or logical unit number mapping as the last line of defense for the stored data.
- When it comes to physical security and access controls, change the key-code or door-lock combinations frequently and inform only to those who need access.
- Change default passwords at installation and on a constant basis. Similarly, limit access to management tools to those who need it.
- If you are planning to move data electronically to avoid losing tapes, then make sure that the data being transmitted over a public or private network is safe and sound. Some methods to protect data while in transit include encryption, virtual private networks, and the IPSec protocol.
- Avoid letting data security become a block to efficiency, because that is a sure way to compromise a security plan. The more translucent the security is to authorize users of the data, the less likely those users will try to dodge your efforts.