19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 15: Databases and Storage Systems<br />

Following Best Practices for Minimizing<br />

Storage Security Risks<br />

Like database security, storage security is not brain surgery. Keeping your<br />

storage systems secure is also simple if you do the following:<br />

✓ Check the underlying operating systems for security vulnerabilities. I<br />

cover operating system exploits for Windows and Linux in Chapters 11<br />

and 12.<br />

✓ Ensure that your network storage (SAN and NAS systems) falls within<br />

the scope of patching and system hardening.<br />

✓ Require strong passwords on every storage management interface.<br />

✓ Use appropriate file and share permissions to keep prying eyes away.<br />

✓ Educate your users on where to store sensitive information and the risks<br />

of mishandling it.<br />

✓ De-identify any sensitive production data before it’s used in development<br />

or QA. There are tools made for this specific purpose.<br />

✓ Use a network firewall, such as those available from Fortinet (www.<br />

fortinet.com) or SonicWALL (www.sonicwall.com) to ensure only<br />

the people and systems that need to access your storage environment<br />

can do so and nothing more.<br />

315

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!