SNIA&FCIA:2024光纖通道(FC)數據存儲安全白皮書(第二版)(英文版)(18頁).pdf

編號:178049 PDF  DOCX  中文版 18頁 761.41KB 下載積分:VIP專享
下載報告請您先登錄!

SNIA&FCIA:2024光纖通道(FC)數據存儲安全白皮書(第二版)(英文版)(18頁).pdf

1、 Storage Security:Fibre Channel Security Version 2.0 February 14,2024 Eric A.Hibbard,CISSP,FIP,CISA Storage Security:Fibre Channel Security ii 2024 SNIA&FCIA Table of Contents Executive Summary.1 1 Introduction.1 2 Storage Technology Overview.1 2.1 Storage Area Networks(SAN).1 2.2 Fibre Channel(FC).

2、2 2.3 FC address discovery and access control.3 3 FC and SAN Security Background.4 3.1 Threats.4 3.2 SAN Security.5 3.3 Overview of Fibre Channel Security.5 3.3.1 DH-CHAP authentication.7 3.3.2 ESP_Header.8 3.3.3 CT_Authentication.8 3.3.4 Fibre Channel Security Association.9 3.3.5 FC-SP Zoning.9 4 S

3、ummary of FC Security Guidance.9 4.1 FC SAN Security.9 4.2 FC Device Security.10 5 SNIA Observations and Guidance for FC.10 5.1 FC Link Encryption.10 5.2 Data at-rest encryption.11 6 Summary.11 7 Abbreviations.12 8 Acknowledgments.12 10.1 About the Author.12 10.2 Reviewers and Contributors.13 Biblio

4、graphy.14 List of Tables Table 1.Fibre Channel Layers.2 Storage Security:Fibre Channel Security iii 2024 SNIA&FCIA List of Figures Figure 1.FC Port Types.3 Figure 2.FC Authentication.6 Figure 3.Relationship between FC-SP-2 Authentication Protocols and Security Associations.7 Storage Security:Fibre C

5、hannel Security 1 2024 SNIA&FCIA Executive Summary Fibre Channel(FC)is the premier transport for storage within and across datacenters,known for its reliability,resilience,and high-speed connectivity.Yet the capabilities available to provide security protections within a Fibre Channel network are ne

6、ither well known nor well understood.In reality,in a Fibre Channel network both servers and storage systems provide many security capabilities themselves,while there are also other Fibre Channel-specific capabilities of the infrastructure that are available to provide additional security within the

7、network.This SNIA/Fibre Channel Industry Association(FCIA)storage security paper provides information on Fibre Channel as it relates to storage systems and the Fibre Channel ecosystem.1 Introduction Storage security capabilities and practices have seen significant advances since their initial introd

8、uctions.Storage systems(e.g.,hard disk drives,solid state drives,storage arrays,and file servers)and storage ecosystems(e.g.,storage devices and systems,storage networks,and storage management software)are able to protect data in a variety of ways.This technical paper is intended to enhance understa

9、nding of Fibre Channel security.The whitepaper provides background information on Fibre Channel,summarizes the FC security options,and offers additional information to help secure FC-based storage.2 Storage Technology Overview This section briefly describes key storage technologies with the intent o

10、f setting the stage for the security descriptions and guidance.2.1 Storage Area Networks(SAN)A Storage Area Network(SAN)is a specialized,high-speed network that interconnects hosts and storage devices primarily for the purposes of data storage,data retrieval,and archival.SANs are typically composed

11、of hosts,switches,storage elements,and storage devices that are interconnected using a variety of technologies,topologies,and protocols.SANs may also span multiple sites,often in configurations intended to support high availability and disaster recovery configurations.SANs are often used to:improve

12、application availability(e.g.,multiple paths on the SAN to the same storage),increase scalability(e.g.,number of devices accessible to a host,number of hosts accessible to a storage device),enhance application performance(e.g.,off-load storage functions,segregate networks,clustering,etc.),increase s

13、torage utilization and effectiveness(e.g.,consolidate storage resources,provide tiered storage,etc.),and Storage Security:Fibre Channel Security 2 2024 SNIA&FCIA improve data protection and security.In addition,SANs typically play an important role in an organizations Business Continuity Management(

14、BCM)1.SANs are commonly based on Fibre Channel network technology2 that interconnects hosts and devices supporting storage command sets such as SCSI,NVM Express,and Single Byte(SB)command sets.2.2 Fibre Channel(FC)According to the SNIA Dictionary,Fibre Channel is:A serial I/O interconnect capable of

15、 supporting multiple protocols.Protocols supported include FCP,NVMe,SB(FICON),and IP.Fibre Channel supports point-to-point and switched topologies with a variety of copper and optical links running at a variety of speeds and distances.The Fibre Channel architecture is described in INCITS 5622024(FC-

16、FS-6)3 as a network architecture organized into five layers or levels.Table 1 provides a summary for each of the levels:Table 1.Fibre Channel Layers FC-4 Protocol mapping layer(upper level protocols,such as SCSI,NVMe,IP,or SB,are encapsulated into a protocol information unit for delivery to the FC-2

17、 layer)FC-3 Common services layer FC-2 Network layer(core of Fibre Channel,and defines the framing and signaling protocols)FC-1 Data link layer(implements line coding of signals)FC-0 Physical layer(cabling,connectors,etc.)The FC-2 level defines the FC frame format,the transport services,and control

18、functions required for information transfer.Fibre Channel Generic Services share a Common Transport(CT)at the FC-4 level defined in INCITS 5482020(FC-GS-8)2.The CT provides access to a Service(e.g.,Directory Service)with a set of service parameters that facilitates the usage of Fibre Channel constru

19、cts.Fibre Channel Link Services provide two sets of architected functions:1 Business Continuity Management(BCM)is used in ISO/IEC 27002:2022 to cover topics such as Disaster Recovery(DR)and the broader issue of Business Continuity(BC).In the past,DR and BC were addressed differently by the security

20、community,but the current trend is to handle them as elements under BCM.2 SANs that are based on the Fibre Channel switched fabric 3 topology are referred to as FC fabrics.Storage Security:Fibre Channel Security 3 2024 SNIA&FCIA -Basic Link Services(BLSs)(see FC-FS-6)define a set of basic control fu

21、nctions that operate within the context of an existing Exchange(e.g.,Abort Exchange);and-Extended Link Services(ELSs)(see FC-LS-5)define a set of functions that a Fibre Channel entity may use to request another FC entity to perform a service.ELSs are used for authentication and security association

22、management.A Fibre Channel port is a hardware path into and out of a node that communicates over an FC link.FC defines different types of ports,and the following are relevant to this whitepaper(see Figure 1):Figure 1.FC Port Types N_Port:A node port used to connect a node to an FC switch,or another

23、node in point-to-point topology.This is typically an initiator HBA(Host Bus Adapter)in a host or a target port on a storage array.An N_Port is associated with a World Wide Node Name,is identified by a World Wide Port Name,and is assigned an FC address identifier3.F_Port:A switch port used to connect

24、 the FC fabric to a node(N_Port).E_Port:An extender port used to connect FC switches together;the connection between two E_Ports form an Inter-Switch Link(ISL).2.3 FC Address Discovery and Access Control In an FC fabric,an N_Port determines connectivity to other N_Ports by registering with and query

25、ing the FC fabric“Directory Service”.Queries of the Directory Service return N_Port identifiers(e.g.,WWNs,3 A physical FC Port minimally supports one N_Port.Additional N_Ports may share the physical FC Port via the use of the FC N_Port_ID Virtualization(NPIV)feature.Using NPIV,each of the N_Ports on

26、 the physical FC Port will have an independent FC address identifier.Storage Security:Fibre Channel Security 4 2024 SNIA&FCIA their FC address identifiers,and FC-4 protocol attributes)for the other N_Ports attached to the FC fabric.The N_Port can then initiate communication to the other N_Ports if d

27、esired.The FC fabric may be divided into“zones”.A zone is a grouping of N_Ports that are allowed to communicate with each other.The FC Directory Service will limit an N_Ports query results to only the N_Ports that are in the same zone(s)as the querying N_Port.One level of security is to construct zo

28、nes to prohibit communication between particular nodes.3 FC and SAN Security Background This section provides a description of the more common forms of threats and security measures for SANs and Fibre Channel specifically.3.1 Threats The following list is a summary of the major threats4 that may con

29、front Fibre Channel implementations and deployments.Storage Theft:Theft of storage media or storage devices can be used to access data as well as to deny legitimate use of the data.Sniffing Storage Traffic:Storage traffic on dedicated storage networks or shared networks can be sniffed via passive ne

30、twork taps or traffic monitoring revealing data,metadata,and storage protocol signaling.If the sniffed traffic includes authentication details,it may be possible for the attacker to replay5(retransmit)this information in an attempt to escalate the attack.Network Disruption:Regardless of the underlyi

31、ng network technology,any software or congestion disruption to the network between the user and the storage system can degrade or disable storage.WWN Spoofing:An unauthorized user gains access to a storage system in order to access/modify/deny data or metadata.Storage Masquerading:An attacker insert

32、s a rogue storage device in order to access/modify/deny data or metadata supplied by a host.Corruption of Data:Accidental or intentional corruption of data can occur when the wrong hosts gain access to storage.4 Risk cannot be discussed as it is specific to the circumstances in your particular envir

33、onment.Risk refers to the probability of something unfortunate happening and the resulting impact to your organization.Threats can be more generally cataloged but you must assign the likelihood of a threat being instantiated and the resulting impact based on your environment.5 A replay attack is a f

34、orm of network attack in which a valid data transmission is maliciously or fraudulently repeated.Storage Security:Fibre Channel Security 5 2024 SNIA&FCIA Rogue Switch:An attacker inserts a rogue switch in order to perform reconnaissance on the fabric(e.g.,configurations,policies,security parameters,

35、etc.)or facilitate other attacks.Denial of Service(DoS):An attacker can disrupt,block or slow down access to data in a variety of ways by flooding storage networks with error messages or other approaches in an attempt to overload specific systems within the network.3.2 SAN Security Security controls

36、 relevant to a SAN are grouped into the following categories:Access Control:Access control on a SAN is implemented through application of zoning,access control lists,and port binding mechanisms.Access control in a SAN is based on machine identities rather than on the more familiar user and group ide

37、ntity types.o Port Binding:World Wide Names(WWN)are used for identification in a SAN.Port binding is a SAN security mechanism that specifies which WWNs are permitted to connect through that physical port.This association can mitigate snooping or spoofing attempts by an adversary and should be used w

38、henever possible.o Zoning:A SAN fabric can be segmented into separate zones to restrict the visibility of portions of a SAN to specific hosts and storage devices.Soft zoning is based on limiting SAN fabric nameserver responses to queries based on the assumption that hosts will not contact storage de

39、vices that are not discovered via the nameserver.Some modern switches allow“hard”(switch ASIC)zoning based on WWN that uses physical port numbers on SAN switches to restrict traffic forwarding and is a more secure zoning method because it does not rely on correct host behavior and in particular is n

40、ot vulnerable to spoofing of host identity.o Storage Device Access Control Lists-A storage device controls and varies the presentation and access to storage objects on the device based on the host communicating with the device.This includes items such as SCSI Logical Units(LUNs)with LUN masking,as w

41、ell as NVM Express Subsystems and Namespaces.For example,a storage device may allow Host A to view/access SCSI LUNs A and B,but allows Host B to only view/access SCSI LUNs B and C.Authentication:For SANs,it is important for a switch to verify the identity of other switches in the SAN with which it c

42、ommunicates to prevent rogue switches from joining a SAN.Likewise,the nodes in a SAN(e.g.,storage devices and hosts)need to employ authentication to guard against unauthorized access to data.Encryption:Sensitive and high-value data needs to be cryptographically protected when in motion in an FC fabr

43、ic.3.3 Overview of Fibre Channel Security Fibre Channel fabrics may be deployed across multiple,distantly separated sites,which make it critical that security services be available to assure confidentiality of the data and proper access controls.INCITS 496-2012(FC-SP-2)5 defines protocols to authent

44、icate Fibre Channel entities,set up session encryption keys,negotiate parameters to ensure frame-by-frame integrity and confidentiality,and define Storage Security:Fibre Channel Security 6 2024 SNIA&FCIA and distribute policies across a Fibre Channel fabric.It is also worth noting that FC-SP-2 inclu

45、des compliance elements,which is somewhat unique for FC standards.The security architecture defined by FC-SP-2 encompasses the following components:Authentication infrastructure Defines an architecture for authentication infrastructures:secret-based and certificate-based.Authentication Defines authe

46、ntication protocols allowing entities to assure the identity of communicating entities.Two entities may negotiate whether authentication is required,and which authentication protocol may be used.Authentication is defined for switch-to-switch,node-to-switch,and node-to-node(see Figure 2),using one of

47、 the following protocols:Figure 2.FC Authentication o Diffie-Hellman Challenge Handshake Authentication Protocol(DH-CHAP)(see 3.3.1);o Fibre Channel Certificate Authentication Protocol(FCAP);o Fibre Channel Password Authentication Protocol(FCPAP);o Fibre Channel Extensible Authentication Protocol(FC

48、EAP);o The Security Association Management Protocol(IKEv2-AUTH).Security associations A subset(i.e.,the Security Association Management protocol)of the Internet Key Exchange Protocol Version 2(IKEv2)9 protocol suitable for Fibre Channel is defined(see 3.3.4)in order to establish Security Association

49、s between entities.Cryptographic integrity and confidentiality Frame by frame cryptographic integrity and confidentiality,replay protection,and traffic origin authentication(verification that the traffic came from a given endpoint)is achieved by using the ESP_Header(see 3.3.2).CT_Authentication(see

50、3.3.3)may be leveraged to provide cryptographic integrity and confidentiality,replay protection,and traffic origin authentication to Common Transport Information Units.ESP_Header processing and CT_Authentication processing are independent.Authorization(access control)Fabric policies provide basic au

51、thorization controls and are of two types:Storage Security:Fibre Channel Security 7 2024 SNIA&FCIA o policies that contain fabric-wide data and are distributed to every switch of the fabric;o policies that contain per switch data and are sent to an individual switch.Fabric policies may be used to co

52、ntrol which switches are allowed to comprise a fabric and which nodes are allowed to connect to a fabric.Policies may be further used to specify topology restrictions within the fabric environment(e.g.,which switches may connect to which other switches or which nodes may connect to which switches).F

53、abric policies also provide the mechanism for controlling management access to the fabric,the ability to control authentication choices and to specify optional security attributes for fabric entities(e.g.,nodes and switches).Management access to the fabric may be controlled for Common Transport or I

54、P access.Figure 3,which is from clause 4.5 of the FC-SP-2 standard,shows the relationship between the authentication protocols and security associations.The defined authentication protocols are able to perform mutual authentication with optional shared key establishment.The shared key computed at th

55、e end of an authentication transaction may be used to establish security associations.Figure 3.Relationship between FC-SP-2 Authentication Protocols and Security Associations 3.3.1 DH-CHAP authentication DH-CHAP is a secret-based authentication and key management protocol that uses the CHAP algorith

56、m with an optional Diffie-Hellmann algorithm.DH-CHAP provides unidirectional or bidirectional authentication between an Authentication Initiator and an Authentication Responder.When the Diffie-Hellmann part of the protocol is not used,DH-CHAP reduces its operations to those of the CHAP protocol,and

57、it is referred to as DH-CHAP with a NULL DH algorithm.In addition to identifying the authentication algorithm,FC-SP-2 specifies that authentication is defined for Switch-to-Switch,Device-to-Switch,and Device-to-Device entities(see Figure 2),and that the protocols Storage Security:Fibre Channel Secur

58、ity 8 2024 SNIA&FCIA are able to support mutual authentication.Thus,conformant or compliant products are required to also implement each of the following when applicable:Switch-to-SwitchProducts that include authentication between these types of entities must be able to authenticate a switch as well

59、 as be authenticated by a switch.Device-to-SwitchProducts that include authentication between these types of entities must be able to authenticate a switch as well as be authenticated by a switch,from a device perspective,or be able to authenticate a device as well as be authenticated by a device,fr

60、om a switch perspective.Device-to-DeviceProducts that include authentication between these types of entities must be able to authenticate a device as well as be authenticated by a device.Products conformant to FC-SP-2 must also implement re-authentication such that the entity can be re-authenticated

61、 by the other entity at any time.3.3.2 ESP_Header ESP_Header is a security protocol for FC-2 Fibre Channel frames that provides origin authentication,integrity assurance,anti-replay protection,and confidentiality.INCITS 5622024(FC-FS-6)3 defines optional headers that can be used within Fibre Channel

62、 frames.Of these optional headers,the ESP_Header and ESP_Trailer play an important security role because they are the mechanism used to support encryption of frame payloads.The Encapsulating Security Payload(ESP),defined in RFC 4303 7,is a generic mechanism to provide confidentiality,data origin aut

63、hentication,and anti-replay protection for IP packets.FC-SP-2 defines how to use ESP in Fibre Channel.FC-FS-6 states that End-to-end ESP_Header processing shall be applied to FC frames in transport mode(see RFC 43036),and Link-by-link ESP_Header processing shall be applied to FC frames in tunnel mod

64、e7(see RFC 4303).The Authentication option shall be used,and confidentiality(i.e.,use of encryption)may be negotiated by the two communicating FC_Ports(see FC-SP-2).NOTE-An intended application of link-by-link ESP_Header processing is to secure a link in a fabric or between fabrics without requiring

65、 use of ESP by every N_Port.3.3.3 CT_Authentication Fibre Channel defines two security protocols that provide security services for different portions of Fibre Channel traffic:the ESP_Header(see 3.3.2)and CT_Authentication defined in INCITS 5482020,(FC-GS-8)2.The CT_Authentication protocol provides

66、origin authentication,integrity assurance,anti-replay 6 IETF RFC 4303 describes an updated version of ESP,which is used to provide confidentiality,data origin authentication,connectionless integrity,an anti-replay service(a form of partial sequence integrity),and limited traffic flow confidentiality

67、.7 In tunnel mode the internal routing information is protected by encrypting the header of the original packet/frame whereas transport mode only protects the payload with encryption.Storage Security:Fibre Channel Security 9 2024 SNIA&FCIA protection,and optionally,confidentiality protection for Com

68、mon Transport Information Units,which are used to convey control information.Unlike ESP_Header,which operates at the FC frame level,CT_Authentication operates at the Common Transport(CT)level and provides access to a service(e.g.,Directory Service)with a set of service parameters that facilitates th

69、e usage of Fibre Channel functionality.3.3.4 Fibre Channel Security Association As described earlier,two mechanisms are available to protect specific classes of traffic:the ESP_Header is used to protect Fibre Channel frames,and CT_Authentication is used to protect Common Transport Information Units.

70、Security associations for the ESP_Header and CT_Authentication protocols between two Fibre Channel entities(hosts,storage,or switches)are negotiated by the Fibre Channel Security Association Management Protocol(defined in FC-SP-2).The protocol is a modified subset of the Key Exchange Protocol Versio

71、n 2(IKEv2)9 that performs the same core operations,but uses the Fibre Channel AUTH protocol to transport IKEv2 messages.IETF RFC 4595 8 provides additional information on Fibre Channel use of IKEv2.NOTE-Only one protocol(i.e.,either ESP_Header or CT_Authentication)is applicable to any Fibre Channel

72、Security Association.3.3.5 FC-SP Zoning In order to preserve backward compatibility with existing zoning definitions and implementations,FC-SP-2 describes a variant of the Enhanced Zoning model defined in INCITS 5472020(FC-SW-7)3 and INCITS 5482020(FC-GS-8)2,denoted as FC-SP Zoning,that follows the

73、general concepts of the Enhanced Zoning model,but keeps zoning management and enforcement completely independent from other policy management and enforcement.Fabric policies and zoning policies allow an asymmetric distribution of policy information in the fabric with the definition of three types of

74、 switches:Host Switches:Switches that retain all policy objects and all node to node(zoning)information;Autonomous Switches:Switches that retain their own per switch policy objects,all fabric-wide policy objects,and all node to node(zoning)information;Client Switches:Switches that retain their per s

75、witch policy objects,all fabric-wide policy objects and the subset of the node to node(zoning)information relevant for their operations,which is pulled from a host switch when needed.4 Summary of FC Security Guidance When considering relevant Fibre Channel controls,it is important to remember that t

76、hey can be applied in at least two places:1)FC SAN security,and 2)FC device security.4.1 FC SAN Security When using Fibre Channel as part of a SAN,focus on controlling FC nodes(e.g.,hosts,storage),through implementing switch-based controls,and controlling the interconnection of FC SANS.The following

77、 is a summary of the guidance:Storage Security:Fibre Channel Security 10 2024 SNIA&FCIA Control FC node access by restricting host access on the switches using techniques such as Zoning,Access Control Lists(ACLs),and FC-SP-2 fabric policies.Zoning should be used in FC SAN fabrics with a preference f

78、or hard zoning;carefully use default zones and zone sets(assume a least privilege posture).If basic zoning is a not a strong enough security measure for the target environment,use stronger techniques like FC-SP Zoning where supported by the vendor.Last,but not least,disable unused ports on switches.

79、Interconnect different FC SANs securely by configuring switches,extenders,routers,and gateways necessary to meet requirements(e.g.,preserving security domains).4.2 FC Device Security For Fibre Channel devices(above and beyond what may be implemented within FC SANs),the following guidance should be c

80、onsidered:Use Storage Device Access Control Lists(such as LUN masking),WWN filtering,and other access control mechanisms to restrict access to storage.Utilize FC security measures such as mutual authentication using FC-SP-2 AUTH-A with all hosts and switches,leveraging centralized authentication ser

81、vices(e.g.,RADIUS 6)when possible.For sensitive information transmitted on the FC fabric,especially if the data leaves protected areas(e.g.,confines of a physically controlled data center),use link encryption(e.g.,ESP_Header with GCM encryption8).5 SNIA/FCIA Observations and Guidance for FC Fibre Ch

82、annel standards specify a wide range of features and functionality which may be used for security.This section highlights link encryption and data-at-rest encryption.5.1 FC Link Encryption Link encryption is the data security process of encrypting all the data along a specific communication path.Lin

83、k encryption typically occurs at the data link and physical layers between two communication points(e.g.,routers).It is also important to note that link encryption is not the same as end-to-end encryption,which protects communications between the originating and receiving devices.Within the context

84、of Fibre Channel,link encryption can show up as part of the FC framing protocols(e.g.,ESP_Header)or as an external mechanism(e.g.,IPsec protecting FCIP).Link encryption is typically only used to protect FC connections between sites that employ Fibre Channel over IP(FCIP)as the transport.Assuming lin

85、k-level encryption is available,it is important to remember that its use can have a major impact on data reduction technologies(i.e.,compression and de-duplication)that might be employed between data centers.8 Fibre Channel frame integrity or confidentiality can be provided with ESP_Header optional

86、headers,which are defined in INCITS 5622024(FC-FS-6)4.Storage Security:Fibre Channel Security 11 2024 SNIA&FCIA 5.2 Data at-rest Encryption Data at-rest encryption is not an element of Fibre Channel security,but it is briefly mentioned here because it complements link and endpoint encryption securit

87、y,but also can have an impact on data reduction technologies in a similar way as link encryption.It is important to always remember that encryption within storage ecosystems provides media-level protection and can be a safety net,but for real confidentiality protections the data needs to be encrypte

88、d near its source or use(i.e.,by a host,application,etc.)through the fabric to its destination(target).Additional details on data at-rest encryption can be found in the SNIA Storage Security:Encryption and Key Management whitepaper.6 Summary System storage security is a critical,yet complex,topic wi

89、th various solution options that may be implemented,each addressing one or more identified security threats.Fibre Channel offers methods for servers,storage devices,and SANs to authenticate identities and ensure rights to access as well as for the use of encryption to provide for the integrity and c

90、onfidentiality of data transferred between entities.Security requirements evolve over time,and work is underway in the FC standards to produce a revised standard,FC-SP-3,that will provide updates to address the latest security developments in the industry.Storage Security:Fibre Channel Security 12 2

91、024 SNIA&FCIA 7 Abbreviations Abbreviations used in this paper:ACL Access Control List BC Business Continuity BCM Business Continuity Management CHAP Challenge Handshake Authentication Protocol CNA Converged Network Adapter CT Common Transport DR Disaster Recovery DH Diffie-Hellman DOS Denial of Ser

92、vice ESP Encapsulating Security Payload FC Fibre Channel FC-SP Fibre Channel-Security Protocols FC-FS Fibre Channel-Framing and Signaling FC-GS Fibre Channel-Generic Services FCAP Fibre Channel Certificate Authentication Protocol FCIP Fibre Channel over IP FCP Fibre Channel Protocol IETF Internet En

93、gineering Task Force IKE Internet Key Exchange IP Internet Protocol IPsec IP Security iSCSI Internet Small Computer System Interface LUN Logical Unit NPIV N_Port ID Virtualization RADIUS Remote Authentication Dial In User Service RFC Request For Comment SAN Storage Area Network SCSI Small Computer S

94、ystem Interface TCP/IP Transmission Control Protocol/Internet Protocol WWN World Wide Name WWPN World Wide Port Name 8 Acknowledgments 10.1 About the Author Eric A.Hibbard is the Director,Product Planning Security at Samsung Semiconductor,Inc.and a cybersecurity and privacy leader with extensive exp

95、erience in industry(PrivSec Consulting LLC,Hitachi,Raytheon,Hughes,OAO Corp),U.S.Government(NASA,DoE,DoD),and academia(University of Storage Security:Fibre Channel Security 13 2024 SNIA&FCIA California).Mr.Hibbard holds leadership positions in standards development organization and industry associat

96、ions,including ISO/IEC,INCITS,IEEE,SNIA,ABA,and CSA.He has also served as editor of ISO/IEC 27040,ISO/IEC 27050 series,ISO/IEC 22123 series,and IEEE 1619-2018.Mr.Hibbard possesses a unique set of professional credentials that include the(ISC)2 CISSP-ISSAP,ISSMP,and ISSEP certifications;IAPP FIP,CIPP

97、/US and CIPT certifications;ISACA CISA and CDPSE certifications;and CSA CCSK certification.He has a BS in Computer Science.Learn more at https:/ Reviewers and Contributors The SNIA Security Technical Work Group(TWG)wishes to thank the following SNIA experts for their contributions to this technical

98、paper:Glen Jaquette,IBM Thomas Rivera,VMware,Inc.Paul Suhler,Kioxia Corporation Mark Carlson,Kioxia Corporation John Geldman,Kioxia Corporation Sridhar Balasubramanian,NetApp Jim Hatfield Gary Sutphin The SNIA Security Technical Work Group(TWG)wishes to thank the following FCIA experts for their con

99、tributions to this technical paper:David Peterson,Broadcom Roger Hathorn,IBM James Smart,Broadcom Patty Driever,IBM Storage Security:Fibre Channel Security 14 2024 SNIA&FCIA Bibliography 1 INCITS 509-2014,Fibre Channel Backbone-6(FC-BB-6)2 INCITS 5482020,Fibre Channel Generic Services-8(FC-GS-8)3 IN

100、CITS 5472020,Fibre Channel Switch Fabric-7(FC-SW-7)4 INCITS 5622024,Fibre Channel Framing and Signaling-6(FC-FS-6)5 INCITS 496-2012,Fibre Channel Security Protocols-2(FC-SP-2)6 IETF RFC 2865 Remote Authentication Dial In User Service(RADIUS)7 IETF RFC 4303 IP Encapsulating Security Payload(ESP)8 IET

101、F RFC 4595,Use of IKEv2 in the Fibre Channel Security Association Management Protocol 9 IETF RFC 7296,Internet Key Exchange Protocol Version 2(IKEv2)10 Storage Networking Industry Association(SNIA),Storage Security:Encryption and Key Management Storage Security:Fibre Channel Security 15 2024 SNIA&FC

102、IA About SNIA SNIA is a not-for-profit global organization made up of corporations,universities,startups,and individuals.The members collaborate to develop and promote vendor-neutral architectures,standards,and education for management,movement,and security for technologies related to handling and o

103、ptimizing data.SNIA focuses on the transport,storage,acceleration,format,protection,and optimization of infrastructure for data.About the Fibre Channel Industry Association(FCIA)The Fibre Channel Industry Association(FCIA)is a non-profit international organization whose sole purpose is to be the ind

104、ependent technology and marketing voice of the Fibre Channel industry.We are committed to helping member organizations promote and position Fibre Channel,and to providing a focal point for Fibre Channel information,standards advocacy,and education.SNIA 5201 Great America Parkway,Suite 320,Santa Clara,CA,95054 Phone:719-694-1380 Fax:719-694-1385 www.snia.org February 2024 SNIA.All rights reserved.

友情提示

1、下載報告失敗解決辦法
2、PDF文件下載后,可能會被瀏覽器默認打開,此種情況可以點擊瀏覽器菜單,保存網頁到桌面,就可以正常下載了。
3、本站不支持迅雷下載,請使用電腦自帶的IE瀏覽器,或者360瀏覽器、谷歌瀏覽器下載即可。
4、本站報告下載后的文檔和圖紙-無水印,預覽文檔經過壓縮,下載后原文更清晰。

本文(SNIA&FCIA:2024光纖通道(FC)數據存儲安全白皮書(第二版)(英文版)(18頁).pdf)為本站 (白日夢派對) 主動上傳,三個皮匠報告文庫僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對上載內容本身不做任何修改或編輯。 若此文所含內容侵犯了您的版權或隱私,請立即通知三個皮匠報告文庫(點擊聯系客服),我們立即給予刪除!

溫馨提示:如果因為網速或其他原因下載失敗請重新下載,重復下載不扣分。
客服
商務合作
小程序
服務號
折疊
午夜网日韩中文字幕,日韩Av中文字幕久久,亚洲中文字幕在线一区二区,最新中文字幕在线视频网站