Intelligent Data Centres Issue 14 | Page 37

FEATURE FEATURE power make it a major attack vector for bad actors that are trying to subvert the security of the data centre. Advanced attackers aim low firewalls. At a fundamental level, the attackers use rootkits that sit below the level of the operating system, making them extremely difficult to detect using traditional methods. Unfortunately, hardware problems in the data centre don’t end with IPMI. Advanced attackers, including nation- states, increasingly target physical servers, routers, switches and even These techniques allow attackers to infect the very devices that are trusted and charged with protecting the network, and then use those devices to launch attacks deeper into the network. www.intelligentdatacentres.com Keeping an eye on data The ultimate goal of most attacks is to steal data. Depending on their needs and skill level, attackers can use a variety of approaches to smuggle data out of the data centre. The most obvious approach involves moving data in bulk out of the data centre, either directly to the Internet or to an intermediate staging area in the campus network. Issue 14 37