> -----Original Message-----
> From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
> Behalf Of Jeffrey Deaver
> Sent: Thursday, January 18, 2007 6:44 PM
> To: [email protected]
> Subject: Re: Decoding the encryption puzzle
> 
> >I wouldn't encrypt data within a datacenter. The only data that gets
> >encrypted around here is data that goes out the door. Internal tapes are
> >not encrypted.
> 
> >If one level of backup are in your automated tape library, in a data
> center
> >with card-key access in a building with armed guards on all entrances who
> >inspect packages coming in AND going out, then I don't think you need to
> >encrypt that data.
> 
> Its too easy for one of those 'secure' tapes to walk out the door with a
> disgruntled employee.  And when the audit turns up a tape missing - its
> not
> going to care how or where it went - only that its missing and not
> encrypted.  More than once I've read notices from companies announcing
> breaches where they state that they are '99% sure its in a landfill,
> but...'.  And while that may be true and the data is more than likely
> safe,
> the damage to the reputation is already done, and the cost to notify is
> real.
> 
> For my money, if it >can< be carried out, its going to be encrypted.
> 
> Jeffrey Deaver, Engineer

My favorite management quote, "We have never had an undetected security
breach."

There are US government publications describing so-called "best practices"
for securing data and managing keys, which also describe themselves as
"evolving documents". That is, they are still inventing the processes
and updating the publications as new ideas are introduced.

If your datacenter is highly secure, that means both physical security
and data security (encrypted). Data is accessible only through a trusted
server that authenticates the user's security permissions (e.g., RACF
security label of the data and of the user). Permission to access
clear data is distinct from permission to access encrypted data (usually
for archival/restore purposes). Permission to read-only is distinct
from permission to read-write. The front-end application never sees
both encrypted and clear data at the same time; it's managed within a
secure boundary of a trusted server.

Jeffrey D. Smith
Principal Product Architect
Farsight Systems Corporation
700 KEN PRATT BLVD. #204-159
LONGMONT, CO 80501-6452
303-774-9381 direct
303-484-6170 FAX
http://www.farsight-systems.com/
see my résumé at my website

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to