Intelligent Data Centres Issue 46 | Page 25

INFOGRAPHIC

How to secure high-performance data

R ansomware and cyberattacks are taking place more and more frequently .

High-performance environments are rich in high-value data , often containing personal , business , financial , IP , or even nationally significant data , meaning that they are at increased risk and must be protected . Yet , traditionally , data protection has not been top of mind for High-Performance Computing ( HPC ) users .
Historically , as long as their systems were separated from the corporate LAN and the Internet , HPC users didn ’ t worry about security . This meant that they could avoid the accompanying overhead of security solutions and drive as much performance into their HPC installations as possible .
However , this is no longer the case due to two key trends : first , with the expansion of HPC use cases into manufacturing , Big Data analytics , AI and ML , organisations need to integrate their high-performance appliances into the rest of their infrastructures . Second , hackers are looking for more data-rich targets . Government labs , manufacturers and other high-performance environments are prime targets .
So how can end-users fully protect their high-performance datasets ? A multi-layer or ‘ defence in depth ’ approach , built with trusted partners , is needed .
This should include a policy layer , for example mandatory access controls that confine user programmes and system services to the minimum level of file and data access that they require , a perimeter layer , such as filesystem and network ACLs to manage access permissions across the filesystem or network and the data layer . At the data layer , modern self-encrypting drives , which include hardware-based encryption algorithms built into the drives , are designed in a way that does not impact performance .
The Key Management Interoperability Protocol ( KMIP ) enables customers to centralise and simplify encryption key management including key generation , escrow and recovery . IT teams should look for fully proven and validated high-performance solutions from expert partners that can be tested . �

How to secure highperformance data

21 %

of organizations experienced a ransomware attack in the last year

29 %

of businesses experienced a data breach in the past 12 months

62 % of system intrusion

incidents came through an
2 organization ’ s partner
Today high-performance appliances are connected to the rest of the IT infrastructure – hackers have taken notice of these new data-rich targets
HIGH- PERFORMANCE DATA
PERSONAL
RESEARCH
To protect these high performance datasets , a multi-layered approach is vital
1 . Policy layer Security measures include certifications , compliances , audits , rules and procedures , and data handling policies such as those based on file attributes
1 1
FINANCIAL
IP
2 . Perimeter layer Here , security should focus on protecting the network boundary , for example with trusted and untrusted zones , firewalls , and network and filesystem ACLs
3 . Data layer At this layer , security measures include encryption with hardwarebased disk encryption , ACLs , and content-based security such as SELinux security labels
Go here to learn how Panasas can protect your highperformance datasets
Panasas builds a portfolio of data solutions that deliver exceptional performance , unlimited scalability , and unparalleled reliability – all at the best total cost of ownership and lowest administrative overhead . The Panasas data engine accelerates AI / ML and high performance applications in manufacturing , life sciences , energy , media , financial services , and government . The company ’ s flagship PanFS ® data engine and ActiveStor ® storage solutions uniquely combine extreme performance , scalability , and security with the reliability and simplicity of a self-managed , self-healing architecture . The Panasas data engine solves the world ’ s most challenging problems : curing diseases , designing the next jetliner , creating mind-blowing visual effects , and using AI to predict new possibilities .
1 2022 Thales Data Threats Report
2 2022 Verizon Data Breach Investigations Report www . intelligentdatacentres . com
25