12.07.2015 Views

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ContentsIsolation and Separation ............................................................................15Logging and Change Management ...........................................................18Fabric-Based Encryption ....................................................................................19FIPS Mode ...................................................................................................19Other FC Security Features ........................................................................21Chapter Summary ...............................................................................................23Chapter 9: Compliance and Storage ......................................................1Payment Card Industry Data Security Standard (PCI-DSS) ................................1Breach Disclosure Laws .......................................................................................4Health Insurance Portability and Accountability Act (HIPAA) .............................6Gramm-Leach-Bliley Act (GLBA) ...........................................................................7Sarbanes-Oxley Act (SOX) .....................................................................................8Export Laws for Cryptographic Products .............................................................8Federal Information Processing Standards (FIPS) ..............................................9Security Level 1 ..........................................................................................10Security Level 2 ..........................................................................................10Security Level 3 ..........................................................................................10Security Level 4 ..........................................................................................11FIPS Process ...............................................................................................11Common Criteria (CC) .........................................................................................11Evaluation Assurance Levels (EAL) ............................................................12Defense Information Systems Agency (DISA) ...................................................13Federal Information Security Management Act (FISMA) ..................................14Chapter Summary ...............................................................................................14Chapter 10: Other SAN Security Topics ..................................................1iSCSI ......................................................................................................................1FCoE/DCB .............................................................................................................2The Future of Key Management ..........................................................................3OASIS and KMIP ...........................................................................................3Chapter 11: <strong>Brocade</strong> Data Encryption Products ...................................1<strong>Brocade</strong> Encryption for Data-At-Rest ...................................................................1<strong>Brocade</strong> Encryption Switch ..........................................................................2<strong>Brocade</strong> FS8-18 Encryption Blade ..............................................................4<strong>Brocade</strong> Encryption Features ..............................................................................6<strong>Brocade</strong> Encryption Process ........................................................................7Clustering and Availability ............................................................................9Redundant Key Vaults ................................................................................13<strong>Brocade</strong> Encryption Internals ............................................................................16Encryption FPGA Complex ..........................................................................17Security Processor + TRNG ........................................................................18Battery .........................................................................................................18Control Processor (CP) ...............................................................................18Blade Processor (BP) ..................................................................................18Condor 2 ASIC .............................................................................................18Design and Implementation Best Practices .....................................................19xiiSecuring Fibre Channel Fabrics

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!