BSI 22/30422725 DC 2022
$24.66
BS EN ISO/IEC 27040. Information technology. Security techniques. Storage security
Published By | Publication Date | Number of Pages |
BSI | 2022 | 101 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
7 | Foreword |
8 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions 3.1 General |
10 | 3.2 Terms relating to storage technology |
12 | 3.3 Terms relating to sanitization |
13 | 3.4 Terms relating to availability 3.5 Terms relating to security and cryptography |
14 | 3.6 Terms relating to archives and repositories |
16 | 3.7 Miscellaneous terms 4 Symbols and abbreviated terms |
20 | 5 Structure of this document 5.1 Clauses 5.2 Controls |
21 | 6 Overview and concepts 6.1 General 6.2 Storage concepts |
22 | 6.3 Introduction to storage security |
25 | 6.4 Storage security risks 6.4.1 Background 6.4.2 Data breaches |
26 | 6.4.3 Data corruption or destruction |
27 | 6.4.4 Temporary or permanent loss of access/availability 6.4.5 Failure to meet statutory, regulatory, or legal requirements 7 Organizational controls for storage 7.1 General |
28 | 7.2 Align storage and policy |
29 | 7.3 Business continuity management |
30 | 7.4 Compliance |
31 | 8 People controls for storage |
32 | 9 Physical controls for storage 9.1 General 9.2 Physically secure storage |
33 | 9.3 Protect physical interfaces to storage 9.4 Isolation of storage systems |
34 | 10 Technological controls for storage 10.1 General |
35 | 10.2 Design and implementation of storage security 10.2.1 General 10.2.2 Storage security design principles |
37 | 10.2.3 Storage system quality attributes |
40 | 10.2.4 Retention, preservation, and disposal of data 10.3 Storage systems security 10.3.1 System hardening |
41 | 10.3.2 Security auditing, accounting, and monitoring |
44 | 10.3.3 Storage vulnerability management 10.4 Storage management 10.4.1 Background |
45 | 10.4.2 Authentication and authorization |
46 | 10.4.3 Secure the management interfaces |
48 | 10.5 Data confidentiality 10.5.1 General |
49 | 10.5.2 Encryption and key management issues 10.5.3 Encryption of storage |
52 | 10.5.4 Encrypting transferred data |
53 | 10.5.5 Encrypting data at rest |
54 | 10.6 Storage sanitization 10.6.1 General |
55 | 10.6.2 Selection of sanitization methods |
56 | 10.6.3 Media-based sanitization 10.6.4 Logical sanitization |
57 | 10.6.5 Cryptographic erase |
58 | 10.6.6 Verification of storage sanitization |
59 | 10.6.7 Proof of sanitization |
60 | 10.7 Direct Attached Storage (DAS) 10.8 Storage networking 10.8.1 Background |
61 | 10.8.2 Storage Area Networks (SAN) |
66 | 10.8.3 Network Attached Storage (NAS) protocols |
68 | 10.9 Block-based storage 10.9.1 Fibre Channel (FC) storage |
69 | 10.9.2 IP storage 10.10 File-based storage 10.10.1 General |
70 | 10.10.2 NFS-based NAS 10.10.3 SMB-based NAS |
71 | 10.11 Cloud computing storage 10.11.1 Securing cloud computing storage |
72 | 10.11.2 CDMI security |
73 | 10.12 Object-based storage 10.13 Data reductions |
74 | 10.14 Data protection and recovery 10.14.1 General |
75 | 10.14.2 Storage backups 10.14.3 Storage replication |
76 | 10.14.4 Continuous data protection (CDP) 10.15 Data archives and repositories 10.15.1 General 10.15.2 Data Archives |
80 | 10.15.3 Data Repositories |
81 | 10.16 Virtualization 10.16.1 Storage virtualization |
82 | 10.16.2 Storage for virtualized systems |
83 | 10.17 Secure multi-tenancy |
84 | 10.18 Secure autonomous data movement |
86 | Annex€A (informative) Storage security controls summary |
94 | Bibliography |
98 | Index |