*>>What I'm proposing isn't that difficult, as far as I know. A firewall*




*with an IPSec tunnel back to HQ, and sitting behind that a DPM instance
with BitLocker enabled, plus likely a DC with same. Ifneeded, we can do
IPSec connections between the local and colo DCs and DPM instances as well
- that would require a bit more horsepower for the server CPUs, of course.*

I'd love to see your business justification for doing proposing the
additional hardware to accomplish this in a reasonable window.

Also, why would you terminate the IPsec tunnel at the firewall, if you're
so keen on *end-to-end* encryption?   Every gap is an attack vector.  You
need to configure the IPsec connectivity at the host, my friend...

I notice that you failed to answer the 3 non-rhetorical questions that I
asked...

 Regards,





*ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>
*Providing Virtual CIO Services (IT Operations & Information Security) for
the SMB market…*




On Sun, Dec 22, 2013 at 10:12 PM, Kurt Buff <[email protected]> wrote:

> On Sun, Dec 22, 2013 at 6:54 PM, Andrew S. Baker <[email protected]>
> wrote:
> >
> > >>OTOH, if we did use colo - and I'm pushing it for backups/DR/BC -
> > it'll be on machines that have encrypted file systems, using encrypted
> > links, and it'll be monitored at least as well as the internal
> > infrastructure.
> >
> > What do you believe that monitoring will do for you as it relates to
> this discussion?
> >
> > So, you're going to encrypt *all* traffic of every type from the
> machines?   More power to you if you manage to pull it off, but most orgs
> don't make that trade-off until forced.
> >
> > I'm not implying that it is undesirable to provide full encryption.  I'm
> suggesting that there are often business objectives/decisions that preclude
> it except in the Utopian realm of online discussion.
> >
> > Are you encrypting all of your traffic today?!?
> > Are you using any Data Leak Prevention technologies today?
> > Have you forbidden all wireless access to your network today?
> >
> > Just asking/saying...
>
> What I'm proposing isn't that difficult, as far as I know. A firewall
> with an IPSec tunnel back to HQ, and sitting behind that a DPM
> instance with BitLocker enabled, plus likely a DC with same. If
> needed, we can do IPSec connections between the local and colo DCs and
> DPM instances as well - that would require a bit more horsepower for
> the server CPUs, of course.
>
>
>

Reply via email to