Russell,

I'm not familiar with the wording of the standard, but it seems to me that
data at rest can be defined as data stored at its ultimate media location.
To this end data in cache, data in channels and memory, etc is not at rest
because it requires further handling or processing before it reaches the
ultimate storage media location - disk, tape, or flashdrive.

For most disk arrays this means Encrypt/Decrypt of the data occurs as it is
moves between the cache to the drive. Any overhead will be carried by the
Cipher ASIC, and will not affect the line speed of the FCAL, SATA or SAS
interface used to access the drives. Any degradation would depend on the
where and how the ASIC for is situated in the processor path to the storage
media, and would mainly affect read cache misses, write destage, and
sequential pre-fetch.

As for rules, my take on this is that if 2 out of 10 applications require
encryption, and the most cost effective way to do it is to store it all as
encrypted, then what rule has been broken?

I don't think that the standard is intended to grant or deny access to data,
but rather to deny access to data on storage media when it is removed from
those access security controls.

Ron

> -----Original Message-----
> From: IBM Mainframe Discussion List [mailto:[email protected]] On
Behalf Of
> Russell Witt
> Sent: Wednesday, February 11, 2009 1:42 PM
> To: [email protected]
> Subject: Re: [IBM-MAIN] Crypto-DASD?
> 
> Scott,
> 
> Okay, if you think data stored on disk is "data at rest"; please define
> "disk". Does a SSD (Solid-State Drive) count as a disk drive? What about a
> RAM drive (using either SRAM or DRAM)? If a RAM drive using SRAM or DRAM
is
> a disk; then what is the difference between a RAM drive and memory in a
> computer?
> 
> And of course as Phil said, the decryption should not be done on an
> "automatic" basis; but rather based on rules. And who will control those
> rules; the external-security system. So, if the external-security system
> will control who can access the data via automatic decryption; how is that
> different than having the external-security system control access to the
> data in the first place.
> 
> Just my opinion, but PCI really needs to do a better job of defining what
> needs to be done.
> 
> But again, just my 2-cents
> Russell
> 

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to