ABSTRACT

It’s 3 AM; do you know where your data is and who it is with? – Greg Schulz

• Risks and security challenges for cloud, virtual, and data storage networks • Security should be effective without being a barrier to productivity • Techniques, technologies, and best practices for securing information resources

This chapter looks at securing data infrastructure resources in cloud, virtual, networked, and storage environments to counter various internal and external threat risks and other security-related challenges. A good defense-having multiple layers, rings, or lines of protection-along with a strong offense of proactive policies combine to enable productivity while protecting resources. Key themes addressed in this chapter include securing data during transit as well as when at rest, authorization, authentication, and physical security. Additional buzzwords include multitenancy, blind spots (dark territories or dark clouds), encryption and key management, data loss prevention (DLP), and self-encrypting disk drives (SEDs), also known as trusted computing group (TCG) OPAL devices.