IBM Spectrum Scale Security

· · · ·
· IBM Redbooks
5,0
5 водгукаў
Электронная кніга
118
Старонкі
Падыходзячыя
Ацэнкі і водгукі не спраўджаны  Даведацца больш

Пра гэту электронную кнігу

Storage systems must provide reliable and convenient data access to all authorized users while simultaneously preventing threats coming from outside or even inside the enterprise.

Security threats come in many forms, from unauthorized access to data, data tampering, denial of service, and obtaining privileged access to systems.

According to the Storage Network Industry Association (SNIA), data security in the context of storage systems is responsible for safeguarding the data against theft, prevention of unauthorized disclosure of data, prevention of data tampering, and accidental corruption. This process ensures accountability, authenticity, business continuity, and regulatory compliance.

Security for storage systems can be classified as follows:


  • Data storage (data at rest, which includes data durability and immutability)
  • Access to data
  • Movement of data (data in flight)
  • Management of data

      IBM® Spectrum Scale is a software-defined storage system for high performance, large-scale workloads on-premises or in the cloud.

IBM SpectrumTM Scale addresses all four aspects of security by securing data at rest (protecting data at rest with snapshots, and backups and immutability features) and securing data in flight (providing secure management of data, and secure access to data by using authentication and authorization across multiple supported access protocols). These protocols include POSIX, NFS, SMB, Hadoop, and Object (REST). For automated data management, it is equipped with powerful information lifecycle management (ILM) tools that can help administer unstructured data by providing the correct security for the correct data.

This IBM RedpaperTM publication details the various aspects of security in IBM Spectrum ScaleTM, including the following items:


  • Security of data in transit
  • Security of data at rest
  • Authentication
  • Authorization
  • Hadoop security
  • Immutability
  • Secure administration
  • Audit logging
  • Security for transparent cloud tiering (TCT)
  • Security for OpenStack drivers

      Unless stated otherwise, the functions that are mentioned in this paper are available in IBM Spectrum Scale V4.2.1 or later releases.

Ацэнкі і агляды

5,0
5 водгукаў

Ацаніце гэту электронную кнігу

Падзяліцеся сваімі меркаваннямі.

Чытанне інфармацыb

Смартфоны і планшэты
Усталюйце праграму "Кнігі Google Play" для Android і iPad/iPhone. Яна аўтаматычна сінхранізуецца з вашым уліковым запісам і дазваляе чытаць у інтэрнэце або па-за сеткай, дзе б вы ні былі.
Ноўтбукі і камп’ютары
У вэб-браўзеры камп’ютара можна слухаць аўдыякнігі, купленыя ў Google Play.
Электронныя кнiгi i iншыя прылады
Каб чытаць на такіх прыладах для электронных кніг, як, напрыклад, Kobo, трэба спампаваць файл і перанесці яго на сваю прыладу. Выканайце падрабязныя інструкцыі, прыведзеныя ў Даведачным цэнтры, каб перанесці файлы на прылады, якія падтрымліваюцца.