12.07.2015 Views

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter SummaryAlgorithm Passes DescriptionUS Air Force SystemSecurity Instruction5020NATO DataDestructionStandard3 Pass 1– zeroes; pass 2 – ones; pass 3 –any character with pass verification5 5 passesUS DoD 5220.22-M(ECE)Canadian RCMPTSSIT OPS-IINSA/CSS PolicyManual 9-127 Passes 1 and 2 – certain bytes and itscompliment; passes 3 and 4 – randomcharacter; passes 5 and 6 – characterand its compliment; pass 7 – randomcharacter7 Alternating passes of ones and zeroesand last pass with random characters7 Alternating passes of ones and zeroesBruce Schneier 7 Pass 1 – zeroes; pass 2 – ones; passes 3through 7 – random charactersPeter Guttman 35 35 passes of pre-defined patterns(considered excessive given today’s drivetechnology)Chapter SummaryWhen securing a SAN environment, it is important to consider a holisticapproach. A defense-in-depth strategy presents attackers withmultiple layers of challenges and hardens all aspects of the environment.Technological defenses, although important, do not necessarilyaddress issues related to the human element such as human error.Security policies, training, operation procedures, and raising awarenesscan go a long way to address these issues and are unfortunatelyoften overlooked.Securing Fibre Channel Fabrics 71

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!