T-Systems Solutions for Research. Data Management and Security. T-Systems Solutions for Research GmbH

Similar documents
Data Sharing with Storage Resource Broker Enabling Collaboration in Complex Distributed Environments. White Paper

A Simple Mass Storage System for the SRB Data Grid

Introduction to The Storage Resource Broker

Distributed Data Management with Storage Resource Broker in the UK

GlobalSearch Security Definition Guide

Mitigating Risk of Data Loss in Preservation Environments

Troubleshooting and Monitoring ARX v6.1.1

IBM Spectrum NAS, IBM Spectrum Scale and IBM Cloud Object Storage

Hybrid Cloud NAS for On-Premise and In-Cloud File Services with Panzura and Google Cloud Storage

Distributing BaBar Data using the Storage Resource Broker (SRB)

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.

Guide: HIPPA Compliance. Corporate HIPAA Compliance Guide. Privacy, productivity and remote access. gotomypc.com

Distributed Computing Environment (DCE)

Data Grid Services: The Storage Resource Broker. Andrew A. Chien CSE 225, Spring 2004 May 26, Administrivia

Microsoft MB Microsoft Dynamics CRM 2016 Installation. Download Full version :

XtreemFS a case for object-based storage in Grid data management. Jan Stender, Zuse Institute Berlin

Designing Windows Server 2008 Network and Applications Infrastructure

Knowledge-based Grids

WHY DO I NEED FALCONSTOR OPTIMIZED BACKUP & DEDUPLICATION?

The Nasuni Security Model

Securing Your Most Sensitive Data

Storage Made Easy. SoftLayer

Copyright 2011, TeraMedica, Inc.

Lotus Domino Security NSL, Web SSO, Notes ID vault. Collin Murray Program Director, Lotus Domino Product Management

NET EXPERT SOLUTIONS PVT LTD

GSI Online Credential Retrieval Requirements. Jim Basney

Scalable, Reliable Marshalling and Organization of Distributed Large Scale Data Onto Enterprise Storage Environments *

Digital Curation and Preservation: Defining the Research Agenda for the Next Decade

IBM Storage Software Strategy

HIPAA Compliance Checklist

Discover CephFS TECHNICAL REPORT SPONSORED BY. image vlastas, 123RF.com

Open Text Notice. Deployment Guidance Solutions for Microsoft Office SharePoint Server 2007 and Open Text Services A Joint White Paper

Optimizing and Managing File Storage in Windows Environments

GlusterFS Architecture & Roadmap

HIPAA Compliance. with O365 Manager Plus.

Integration of Agilent OpenLAB CDS EZChrom Edition with OpenLAB ECM Compliance with 21 CFR Part 11

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM

Agilent ICP-MS ChemStation Complying with 21 CFR Part 11. Application Note. Overview

Axway Validation Authority Suite

IBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM

An Introduction to GPFS

MCSA Windows Server 2012

Virtual Machine Encryption Security & Compliance in the Cloud

iscsi Technology: A Convergence of Networking and Storage

SAML-Based SSO Solution

SRB Logical Structure

Oracle NoSQL Database Overview Marie-Anne Neimat, VP Development

Alliance Key Manager A Solution Brief for Technical Implementers

COURSE OUTLINE MOC : PLANNING AND ADMINISTERING SHAREPOINT 2016

INTEGRATING EMC XTENDER AND DISKXTENDER FOR ELECTRONIC MESSAGING ARCHIVAL WITH NETAPP NEARSTORE

Tintri Cloud Connector

Box Competitive Sheet January 2014

VMware AirWatch Content Gateway Guide for Windows

SDS: A Scalable Data Services System in Data Grid

Integration of Agilent UV-Visible ChemStation with OpenLAB ECM

OpenLAB ELN Supporting 21 CFR Part 11 Compliance

Architecting Microsoft Azure Solutions (proposed exam 535)

A GPFS Primer October 2005

The International Journal of Digital Curation Issue 1, Volume

Administration and Data Retention. Best Practices for Systems Management

HIPAA Compliance & Privacy What You Need to Know Now

HIPAA AND SECURITY. For Healthcare Organizations

AWS Solution Architect Associate

This section discusses the protocols available for volumes on Nasuni Filers.

Cloud object storage : the right way. Orit Wasserman Open Source Summit 2018

VMware AirWatch Content Gateway Guide for Windows

VMware AirWatch Content Gateway Guide for Windows

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification:

Cisco Storage Media Encryption for Tape

IT 341: Introduction to System Administration. Notes for Project #8: Backing Up Files with rsync

Copyright 2010 EMC Corporation. Do not Copy - All Rights Reserved.

The Fastest Scale-Out NAS

SMD149 - Operating Systems - File systems

VMware AirWatch Content Gateway Guide for Windows

irods for Data Management and Archiving UGM 2018 Masilamani Subramanyam

Tableau Server - 101

IBM SmartCloud Notes Security

NFS: What s Next. David L. Black, Ph.D. Senior Technologist EMC Corporation NAS Industry Conference. October 12-14, 2004

Who s Protecting Your Keys? August 2018

Rocket UniData. Deliver Fast, Flexible, and Secure Applications with Low Overhead

Building Storage-as-a-Service Businesses

Microsoft Certified Solutions Associate (MCSA)

NETWRIX ACTIVE DIRECTORY CHANGE REPORTER

DATA MANAGEMENT SYSTEMS FOR SCIENTIFIC APPLICATIONS

Exam : Implementing Microsoft Azure Infrastructure Solutions

Providing an Enterprise File Share and Sync Solution for

SEVENMENTOR TRAINING PVT.LTD

SnapCenter Software 4.0 Concepts Guide

Oracle Database Mobile Server, Version 12.2

StorageGRID Webscale 10.0

Storage Made Easy. Mirantis

Providing an Enterprise File Share and Sync Solution for

Trusted Optical Disc March 2008

Dell EMC Surveillance for IndigoVision Body-Worn Cameras

XenApp 5 Security Standards and Deployment Scenarios

CDMI Support to Object Storage in Cloud K.M. Padmavathy Wipro Technologies

Microsoft Dynamics CRM Installation (MB2-708)

Alliance Key Manager A Solution Brief for Partners & Integrators

Nasuni UniFS a True Global File System

WHITEPAPER. Security overview. podio.com

Transcription:

T-Systems Solutions for Research. Data Management and Security Andreas Landhäußer Andreas.Landhaeusser@t-systems-sfr.com T-Systems Solutions for Research GmbH 12.09.2008 1

Content Nirvana SRB (SRB2008) Security features inside SRB2008 Security Enhancements according to federal data protection act (BDSG) Summary T-Systems Solutions for Research GmbH 12.09.2008 2

Nirvana SRB (SRB2008) Storage Resource Broker offers a global Namespace, an extension of a standard file system hierarchy containing files and other data residing on dispersed and usually disparate data sources. The global Namespace is used to access, manage, search, and organize data across the entire SRB Federation. Samatha Kottha presented an overview of SDSC SRB at 2. D-Grid Security Workshop http://www.medigrid.de/u_veranst/070327security-ws/v27_ogsa-dai_srb_security_ws.pdf T-Systems Solutions for Research GmbH 12.09.2008 3

T-Systems Solutions for Research GmbH 12.09.2008 4

T-Systems Solutions for Research GmbH 12.09.2008 5

T-Systems Solutions for Research GmbH 12.09.2008 6

T-Systems Solutions for Research GmbH 12.09.2008 7

T-Systems Solutions for Research GmbH 12.09.2008 8

T-Systems Solutions for Research GmbH 12.09.2008 9

T-Systems Solutions for Research GmbH 12.09.2008 10

Features of SRB2008 1of 2 support for virtually all major storage systems, file systems, OS, RDBs. interfaces for CIFS (Windows, Mac OS X) NFS (Unix, Linux), Web Services, and leading storage and archival systems (i.e. Centera) with SRB Gateways. sophisticated metadata management for unstructured data. complete and advanced automation for Information Lifecycle Management (ILM Daemon) and data synchronization (Sync Daemon). Full suite of security mechanisms including authentication, access control, audit trails, integrity check, etc. High availability and disaster recovery with definable number of data replicas in distributed locations. T-Systems Solutions for Research GmbH 12.09.2008 11

Features of SRB2008 2of 2 Intelligent handling of MCAT queries and data traffic for optimal performance with load balancing, data caching, parallel streams and bulk operations throughout the system. High performance for both large and small files with patented technologies. Transparent background migration/maintenance of data without affecting users and applications. Enabling data repository, publication, archiving, and virtual organization in a "grid" environment (i.e., data and storage as a utility). federated MCAT, hence no single point of failure T-Systems Solutions for Research GmbH 12.09.2008 12

SRB2008 built in Security Features SRB is offering Security and data protection against unauthorized access Authentication Access Control Lists Authorization Tickets Encryption Users/Groups/Domains Audit Trails T-Systems Solutions for Research GmbH 12.09.2008 13

SRB2008 Most of Nirvana SRB is closed source and not accessible to non-us Government entities. Quote from Nirvana, if we need more detailed information about the SRB protocol, we could put that together as part of a Nirvana SRB deployment in Germany. SRB2007 compliant to HIPAA Regulations in Healthcare IT T-Systems Solutions for Research GmbH 12.09.2008 14

Federal Data Protection Act (BDSG) work on personal data is requiring processes being defined and audited Authentication Access Control Lists Authorization Encryption Audit Trails Introduction of pseudonymity and separation of specific metadata all have to be enabled and supervised T-Systems Solutions for Research GmbH 12.09.2008 15

Encryption end-to-end Encryption of all stored Data, Data will be accessible only by authorized users Data en-/decryption by personal and physical tokens auditable more difficult sharing tokens Key Management/Infrastructure is required T-Systems Solutions for Research GmbH 12.09.2008 16

Summary Nirvana SRB (SRB2008) Security features inside SRB2008 Security Enhancements Security Enhancements according to federal data protection act (BDSG) Summary T-Systems Solutions for Research GmbH 12.09.2008 17

Thank you T-Systems Solutions for Research GmbH 12.09.2008 18