Answer

What you need to know about containerized data center security

What you need to know about containerized data center security

    Requires Free Membership to View

Security is a multi-faceted issue to consider on multiple levels. It typically involves the physical facility, data at rest and data in flight. By their very nature, containers pose some potential security vulnerabilities.

Consider the cabling that connects a container to the rest of the data center network. Ideally, cabling is run through a conduit to protect the cabling from the elements as well as physical tampering or hacking -- it's simple for a thief to slip a packet sniffer on an exposed cable to read unencrypted data.

Also consider that containers are mobile installations designed to be relocated with relative ease. It's not enough to just padlock the container; the container and any data at rest within the container are at risk of being simply disconnected, loaded onto a flatbed or truck, and just driven away. Remote deployment sites with no personnel can be particularly vulnerable to such outright theft.

Organizations can enhance security by using several tactics, including encrypting all data at rest within the container (making the data inaccessible even if the container is physically removed from the premises). In addition, physical security might include affixing the container to a permanent foundation, such as a heavy concrete base, and interlocking any access doors with switches that signal alarms and even start migrating data to other locations if the doors are opened unexpectedly.

The point is that a container may be unacceptable for certain types of highly sensitive data. Organizations contemplating a container facility must involve their compliance officers to determine any limitations on the data that container might host. Such planning translates into workload and data storage policies.

Containerized data centers have proven themselves to the IT industry, but they are not always the right choice for data center capacity expansions. As with any data center project, organizations must understand the suitability of the data they plan to migrate to a container and take the steps to secure and protect the container over its working lifespan.

This was first published in April 2013

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: