官术网_书友最值得收藏!

Storage threats

There are many different types of storage that can be used by VMware vSphere; however, for the purposes of this brief explanation of storage threats, we will focus on storage area networks (SAN) and network-attached storage (NAS). From a protocol perspective, Fibre Channel and Internet Small Computer System Interface (iSCSI) will be briefly reviewed in the context of which threats and potential vulnerabilities they bring to the risk equation.

In the past, there was a clear delineation between SAN storage and NAS, but in recent years, high-performing devices have become much more popular for small- and medium-sized businesses. Likewise, most enterprises that historically used Fiber Channel exclusively now tend to have some iSCSI in their storage environment. Both protocols are inherently insecure on their own. In the case of Fiber Channel, sending information in clear text would seem to be the major risk; however, this is mitigated largely due to the physical characteristics of the fiber that the data passes over. That's not to say that Fiber Channel can't be exploited, but the nature of its closed-loop system makes it a lower risk.

iSCSI, on the other hand, uses the same RJ-45 network cables and physical switches that the normal IP traffic utilizes within the network. Without a proper process for securing iSCSI, traffic is very vulnerable to attack and exploit. It's crucial to isolate iSCSI traffic in order to separate switches or by VLAN. Additionally, the use of Challenge Handshake Authentication Protocol (CHAP) authentication will ensure that only approved iSCSI endpoints can communicate with the storage system.

主站蜘蛛池模板: 宁化县| 东方市| 葫芦岛市| 汨罗市| 庆阳市| 信宜市| 凤翔县| 阳高县| 龙游县| 泰顺县| 平凉市| 金乡县| 镇赉县| 福鼎市| 偏关县| 仙桃市| 蓝田县| 武陟县| 毕节市| 普陀区| 英超| 吐鲁番市| 稻城县| 扶余县| 亚东县| 扶风县| 榆林市| 武冈市| 竹北市| 松原市| 贵溪市| 四会市| 东明县| 淮阳县| 苗栗市| 永济市| 延庆县| 南汇区| 明水县| 翁牛特旗| 凤凰县|