4 security management strategies for data center consolidation

Let’s take a look at four strategies  can adopt to help circumvent this challenge and make data consolidation efforts a little more secure.

1. Create a clearly defined organizational structure

A tool doesn’t know whether an anomaly is an outlier or a threat, but a person certainly does. That’s why any modernization or consolidation initiative must be approached from a people-first perspective.

Ultimately, everyone in an agency has a hand in data center operations -- not just IT administrators, but also developers, managers and executives.  Accordingly, a clearly defined organizational structure will help ease teams into new processes. Each responsible party should be assigned unique responsibilities and remain in contact with each other. That way, if a breach or outage occurs, the team will be able to work together to address the issue.

2. Follow up with lightweight and flexible procedures

One of the goals behind the federal government’s modernization effort is to become more agile and flexible, but this should not be confined to hardware and software. Once the organizational structure is defined and it’s time to put processes and procedures in place, agencies should ensure they are highly flexible and can adapt to changing conditions.

Agencies with poor processes and procedures may be tempted to ramp up hiring or double down on implementing rigid processes, but these tactics can create more problems than solutions, resulting  in overstaffing and impractical and constantly outdated procedures -- precisely what government is trying to avoid.

3. Encrypt and segment data at rest and in flight

Implementation of the FDCCI was driven by the enormous growth in the amount of government data. In the years leading up to the FDCCI announcement, that growth was so great that agencies were building data centers by the hundreds, which became untenable.

It goes without saying that all data, whether at rest or in flight, must be encrypted, especially as agencies continue their data center transitions. There are simply too many risks involved in the transition process itself -- too many places where data is vulnerable and too many opportunities for increasingly savvy hackers to access information left in the open. Once the data is at rest, there are still areas of concern, including insiders who may or may not have malicious intent.

Data segmentation is also critical, as it can limit the attack damage to a subset of data. Segmenting can reduce the potential for cascading -- and often catastrophic -- network failures. It’s another safety net that can minimize the risk of data leaks and ensure five nines of availability.

4. Automate security and gain complete control

As the amount of data increases and data center management becomes more complex, it’s no longer feasible to manually coordinate security processes. Therefore, all of the aforementioned strategies should be supported by software that automates data center security management.

Regardless of the size of the data center, administrators must implement solutions that can monitor applications and network activity and deliver patches and updates as necessary. These goals can be achieved with modern performance monitoring software that gives data center managers a complete view of the health of every aspect of their data centers, including compute, storage, network and applications.  

Administrators willing to lay the security groundwork now will find their road toward data center consolidation easier to travel. Their efforts will also provide a solid foundation for managing what promises to be a tricky post-consolidation world -- where the amount of data continues to grow even as the number of data centers has shrunk.

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值