IBM Spectrum Scale Security

IBM Spectrum Scale Security
Author :
Publisher : IBM Redbooks
Total Pages : 116
Release :
ISBN-10 : 9780738457161
ISBN-13 : 0738457167
Rating : 4/5 (61 Downloads)

Book Synopsis IBM Spectrum Scale Security by : Felipe Knop

Download or read book IBM Spectrum Scale Security written by Felipe Knop and published by IBM Redbooks. This book was released on 2018-09-18 with total page 116 pages. Available in PDF, EPUB and Kindle. Book excerpt: Storage systems must provide reliable and convenient data access to all authorized users while simultaneously preventing threats coming from outside or even inside the enterprise. Security threats come in many forms, from unauthorized access to data, data tampering, denial of service, and obtaining privileged access to systems. According to the Storage Network Industry Association (SNIA), data security in the context of storage systems is responsible for safeguarding the data against theft, prevention of unauthorized disclosure of data, prevention of data tampering, and accidental corruption. This process ensures accountability, authenticity, business continuity, and regulatory compliance. Security for storage systems can be classified as follows: Data storage (data at rest, which includes data durability and immutability) Access to data Movement of data (data in flight) Management of data IBM® Spectrum Scale is a software-defined storage system for high performance, large-scale workloads on-premises or in the cloud. IBM SpectrumTM Scale addresses all four aspects of security by securing data at rest (protecting data at rest with snapshots, and backups and immutability features) and securing data in flight (providing secure management of data, and secure access to data by using authentication and authorization across multiple supported access protocols). These protocols include POSIX, NFS, SMB, Hadoop, and Object (REST). For automated data management, it is equipped with powerful information lifecycle management (ILM) tools that can help administer unstructured data by providing the correct security for the correct data. This IBM RedpaperTM publication details the various aspects of security in IBM Spectrum ScaleTM, including the following items: Security of data in transit Security of data at rest Authentication Authorization Hadoop security Immutability Secure administration Audit logging Security for transparent cloud tiering (TCT) Security for OpenStack drivers Unless stated otherwise, the functions that are mentioned in this paper are available in IBM Spectrum Scale V4.2.1 or later releases.


IBM Spectrum Scale Security Related Books

IBM Spectrum Scale Security
Language: en
Pages: 116
Authors: Felipe Knop
Categories: Computers
Type: BOOK - Published: 2018-09-18 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

Storage systems must provide reliable and convenient data access to all authorized users while simultaneously preventing threats coming from outside or even ins
Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar: An Enhanced Cyber Resiliency Solution
Language: en
Pages: 68
Authors: Boudhayan Chakrabarty
Categories: Computers
Type: BOOK - Published: 2021-09-13 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detect
IBM Spectrum Scale and IBM Elastic Storage System Network Guide
Language: en
Pages: 110
Authors: Kedar Karmarkar
Categories: Computers
Type: BOOK - Published: 2021-02-17 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

High-speed I/O workloads are moving away from the SAN to Ethernet and IBM® Spectrum Scale is pushing the network limits. The IBM Spectrum® Scale team discover
Privileged Access Management for Secure Storage Administration: IBM Spectrum Scale with IBM Security Verify Privilege Vault
Language: en
Pages: 32
Authors: Vincent Hsu
Categories: Computers
Type: BOOK - Published: 2021-01-08 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

There is a growing insider security risk to organizations. Human error, privilege misuse, and cyberespionage are considered the top insider threats. One of the
Highly Efficient Data Access with RoCE on IBM Elastic Storage Systems and IBM Spectrum Scale
Language: en
Pages: 60
Authors: Olaf Weiser
Categories: Computers
Type: BOOK - Published: 2022-02-18 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

With Remote Direct Memory Access (RDMA), you can make a subset of a host's memory directly available to a remote host. RDMA is available on standard Ethernet-ba