Why Use Immutable Storage?

A group of people standing in front of a large screen.

2018 AT&T Business Summit: Security “in” and “of” the Cloud

By G C Network | November 10, 2018

While public cloud is undoubtedly an outsized piece of the conversation, news headlines of the latest data breach can make this move a very frightening proposition. The question of how…

A group of people standing in front of a display.

My Brush with Royalty: Queen Latifah

By G C Network | November 9, 2018

Queen Latifah! Hip Hop Icon. Movie Star. Television Star. Fashion Model. Songwriter. Producer. Entrepreneurial Genius!? YES! Dana Elaine Owens, her given name, is co-owner of Flavor Unit Entertainment, a firm that includes…

What’s New in Puppet 5?

By G C Network | November 9, 2018

Puppet 5 is released and comes with several exciting enhancements and features that promise to make configuration management much more streamlined. This article will take a comprehensive look at these…

5 Reasons Why Ansible is the Best CM Tool Out There?

By G C Network | November 9, 2018

Amidst volatile markets, dynamic technology shifts, and ever-increasing customer demands, it is imperative for IT organizations to develop flexible, scalable and high-quality applications that exceed expectations and enhance productivity. A…

Machine learning APIs for Google Cloud Platform

By G C Network | November 9, 2018

Google Cloud Platform (GCP) is considered to be one of the Big 3 cloud platforms among Microsoft Azure and AWS. GCP is widely used cloud solutions supporting AI capabilities to design and…

What Is The Most Important Part of Architecture?

By G C Network | November 9, 2018

I always find it interesting to hear what people view architecture as. A lot of people think it’s just about the design aspect, where you get to put pen to…

Cloud migration best practice Part 4: Executing the migration

By G C Network | September 16, 2018

This series has stepped through cloud migration best practices. After providing an overview, we discussed: Classifying business-critical data. Updating organizational IT governance policies. Application screening and cloud workload selection. How to…

Cloud Migration Best Practice Part 3: Application Portfolio Analysis

By G C Network | September 16, 2018

In part three of this series on cloud migration best practice, I will focus on migrating the application itself. If you haven’t had the opportunity to read our recommendations from part…

Why Use Immutable Storage?

By G C Network | September 11, 2018

Data has become a global currency, and its value has nowhere to go but up.  According to The Economist online, the world’s most valuable resource is no longer oil, but…

CLOUD ACT: What Does That Mean for Your Cloud Storage

By G C Network | August 31, 2018

When Congress names a law after you, it’s getting serious.  That is where we are now with cloud computing.  The Clarifying Lawful Overseas Use of Data Act or CLOUD Act (H.R. 4943) is…

Data has become a global currency, and its value has nowhere to go but up.  According to The Economist online, the world’s most valuable resource is no longer oil, but data. The volume and velocity of data creation are astounding, and some estimates say that something like a self-driving car can generate 100 gigabytes per second. In response, industrial companies like GE and Siemens have positioned themselves as data firms.

To maintain, and even grow this value, data pedigree must be beyond reproach. Protecting this pedigree is generally refer to as immutability and describes a property of being unchanging or unable to be changed over time.  Immutability is especially essential in law enforcement where prosecutors rely on data to prove their case. This property may also be one reason why The Justice Department is changing its approach to collecting data stored in the cloud. After taking a closer look at this growing trend, guidance from the DOJ’s Computer Crime and Intellectual Property Section of the Criminal Division directs prosecutors to go directly to agencies and organizations when seeking access to their data rather than to the cloud service provider storing the information. Preparing for these increasingly inevitable inquiries, government agencies should now closely review their current cloud data storage vendor’s data immutability service level agreement.

The new guidance advises prosecutors to seek data from the agency when doing so would not compromise the investigation. This is because some providers may not have the capability to preserve and disclose information or have full access to an enterprise’s data. Under 18 U.S.C. § 2703(f), however, the Government could approach a cloud-service provider directly to preserve data without agency prior knowledge.

Agencies must also be able to identify a legal contact within the organization that is knowledgeable of cloud-based storage and able to assist law enforcement with contacting the appropriate CSP point of contact. This is crucial to any requirement associated with interposing privilege or other objections to the collection of data. Failure to have such a contact in the organization could also be a reason for the DoJ to seek data directly from the cloud-service provider without agency participation.

Threats to the immutability of data put into the cloud include:

  • Data deterioration caused by the use of inappropriate storage technology
  • Intrusion by an external agent which could lead to data breach or loss
  • A malicious employee programmer changing production code to allow intrusion
  • Physical removal or destruction of data
  • Random disk failures could result in data loss if there isn’t sufficient redundancy
  • Data could suffer from “bit rot” and deteriorate if it is not checked and refreshed on a regular basis

When reviewing a cloud service provider’s SLA, ensure that none of the provider’s employees can change application code on a production system without first undergoing thorough review and testing. The data centers themselves must also contain appropriate physical security using things like biometric access control and man-traps. The data should also be extremely durable guaranteeing at least 11 nines. The provider should also periodically read every data object every 90 days to detect and automatically correct any random errors.

Wasabi is one of the few cloud service providers capable of meeting these minimum data immutability standards. Management of its data storage service is built around two simple rules:

  • No one person should be able to destroy data that is in an immutable bucket; and
  • Nobody should be able to touch a production system anonymously.

This means when using Wasabi immutable buckets, no one can delete or alter your data–not even a systems administrator.

Posted in

G C Network