12.07.2015 Views

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Brocade</strong> Encryption Features• Data encryption key (DEK) cluster• DataFort compatibility mode• FIPS 140-2 Level 3• Common Criteria (EAL-4+)• Multi-path rekeying to a LUN through an EE• System card to enable crypto capability• Quorum authorization of sensitive operations• Access Gateway for third-party support (switch only)• LUN Decommissioning<strong>Brocade</strong> Encryption ProcessThe <strong>Brocade</strong> encryption solution uses the industry standard AES-256encryption algorithm implemented in hardware:• Disk encryption is performed using the XTS mode of encryption,which is better suited for fixed-block data• Tape encryption is performed using the GCM mode of encryption,which is better suited for variable-length and streaming dataCompression is an important component of a data-at-rest encryptionsolution for tape. Once data is encrypted, it is no longer compressible.Compression works on the principle of searching for patterns and optimizingthem. Encryption takes data and removes all patterns byrandomizing the data. Once the data is randomized and all patternsare removed, then the compression algorithm has no patterns to optimize.If encrypted data is sent directly to a tape drive, the nativecompression capabilities of that tape drive will no longer be effective.Hence, it is important to compress the data first and then send it tothe tape drive to prevent an unnecessary increase in the number oftape media used for backups.The compression algorithm used in the <strong>Brocade</strong> encryption solution isbased on a variant of the standard gzip algorithm. The compressionratio obtained using this compression algorithm may vary, like anyother compression algorithm, depending on the type of data and howcompressible it is. Data with a a great deal of white space compressesquite well, while some data may not compress at all.CryptoTarget ContainersA Crypto Target Container (CTC) is created for each storage target porthosted on a <strong>Brocade</strong> encryption device and is used to set up theencryption to a media. A CTC can be composed of only one storageSecuring Fibre Channel Fabrics 179

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!