Storage Security: Protecting, SANs, NAS and DAS
||Author: John Chirillo, Scott Blaul|
List Price: $45.00
Our Price: Click to see the latest and low price
Publisher: John Wiley & Sons (20 December, 2002)
Sales Rank: 64,814
Average Customer Rating: 4.8 out of 5
Customer ReviewsRating: 5 out of 5
Great tool for security planning and implementation
Prior to this book I was ignorant of a lot of data storage issues. This book opened up areas to me that I had previously overlooked as I always took data storage for granted. The equipment breakdown and analysis was the most concise that I've ever seen. Nearly every page brought me a new item to learn or ponder. The sections on packet breakdown and network latency were fascinating. The information in this book is fully explained and with the author's help, easy to understand. The chapter(8) on designing and implementing a sound data security program almost serves as a blueprint as the steps and procedures are clearly outlined for the reader. This book provides BIG TIME info to the IT professional.
Rating: 4 out of 5
Comprehensive coverage of an oft-overlooked topic
What does "Information Security" mean to you? To many, it means firewalls and encryption. To some, it means intrusion detection systems. Chances are the words "file servers" weren't high on your list, but they probably should be. After all, "information security" is about information, and when it's not flying across the network it's got to be stored somewhere, right? In fact, the security of the storage mechanism is often overlooked, which makes it an attractive target for attackers. In their new book, Storage Security, Chirillo and Blaul take a comprehensive look at this often-ignored subject.
Storage Security is not about turning on the right configuration options on your XYZ brand server appliance. It's about applying solid, methodical security practices to your storage systems, regardless of whether they are disks directly attached to a single computer, Network Attached Storage or part of a Storage Area Network. The authors address the full security cycle, too, starting with evaluating the security of proposed new storage solutions. Comparative data in hand, the book shows you how to narrow the field to a single solution that offers the best balance between functionality and security. And once the system is selected, you can't stop there. You've got to decide upon appropriate security policies for the new storage system, draft and implement a backup and restore plan, deal with disaster recovery and take care of a host of other issues. In short, this is a good guide to an entire range of considerations necessary to select, deploy and manage a secure storage solution.
The book's evaluation methodology is particularly valuable. Each type of storage (direct attach, NAS and SAN) is covered in a chapter of its own. Within each chapter, the authors address specific technologies used to implement that type of storage. For example, the direct attach chapter discusses such common storage technologies as SCSI and IDE, moderately exotic systems like USB and Firewire drives, and some more advanced solutions like HiPPI and SSA. Each technology is then placed in a matrix and scored in 11 different categories, including popularity and industry acceptance, built-in data protection features, typical fault tolerance and physical security characteristics. The authors assign each rating on a scale of 1 (poor) to 5 (the best). This gives a good general indication of how each technology measures up, but they tend to rely on a straight average of the ratings when determining the "best" technology. Although it's true that the average allows you to make a quick ballpark comparison, there are many other factors to consider as well, such as the suitability for your particular environment and the way in which your users need to access their data. The matrixes are quite useful, but just remember that you can't always boil things down to a simple numerical score.
Probably the biggest problem with this book is that it's pretty dry. As a reference book, the writing style is fine: since it's easy to find what you're looking for, and the chapters are concise. It's difficult to read from cover-to-cover, though, which is a shame because that's what you should probably do the first time through. Take it in small doses, a chapter or so at a time, and you should be fine.
Storage Security is about just what you'd think: the security of your data as it's being stored on your server(s). It's not a detailed look at the configuration of any one product, but rather a comprehensive, theory-based approach to managing the security of your storage subsystem from evaluation to purchase to daily operations. If you manage a small or mid-size network, you may not need this book. If you have a larger network, though, or have significant data storage needs, this deserves a space on your shelf.
Rating: 5 out of 5
Excellent discussion of Security and Storage
As a Project Manager for an IT company, I found this book to be interesting and compelling. It touches on many of the issues that are facing today's IT managers with it's discussion of SANs, NAS and DAS. The book offers explanations and histories of the technologies without insulting the intelligence of knowledgeable readers.
As stated in another review, the case studies are most helpful and give real world examples. John and Scott do a fine job of creating realistic scenarios and discuss the solutions in a positive way. Any reader will be able to relate in some way to the examples.
One of the features that I enjoyed were the "Security Thoughts" spread throughout the book. They make intersting points and give the reader some real food for thought.
Good job Scott and John! I look forward to your next book.
· Using SANs and NAS
· Storage Network Performance Analysis
· iSCSI: The Universal Storage Connection
· IP SANS: An Introduction to iSCSI, iFCP, and FCIP Protocols for Storage Area Networks
· Designing Storage Area Networks: A Practical Reference for Implementing Fibre Channel and IP SANs, Second Edition