Let’s take a look at four strategies  can adopt to help circumvent this challenge and make data consolidation efforts a little more secure.

1. Create a clearly defined organizational structure

A tool doesn’t know whether an anomaly is an outlier or a threat, but a person certainly does. That’s why any modernization or consolidation initiative must be approached from a people-first perspective.

Ultimately, everyone in an agency has a hand in data center operations -- not just IT administrators, but also developers, managers and executives.  Accordingly, a clearly defined organizational structure will help ease teams into new processes. Each responsible party should be assigned unique responsibilities and remain in contact with each other. That way, if a breach or outage occurs, the team will be able to work together to address the issue.

2. Follow up with lightweight and flexible procedures

One of the goals behind the federal government’s modernization effort is to become more agile and flexible, but this should not be confined to hardware and software. Once the organizational structure is defined and it’s time to put processes and procedures in place, agencies should ensure they are highly flexible and can adapt to changing conditions.

Agencies with poor processes and procedures may be tempted to ramp up hiring or double down on implementing rigid processes, but these tactics can create more problems than solutions, resulting  in overstaffing and impractical and constantly outdated procedures -- precisely what government is trying to avoid.

3. Encrypt and segment data at rest and in flight

Implementation of the FDCCI was driven by the enormous growth in the amount of government data. In the years leading up to the FDCCI announcement, that growth was so great that agencies were building data centers by the hundreds, which became untenable.

It goes without saying that all data, whether at rest or in flight, must be encrypted, especially as agencies continue their data center transitions. There are simply too many risks involved in the transition process itself -- too many places where data is vulnerable and too many opportunities for increasingly savvy hackers to access information left in the open. Once the data is at rest, there are still areas of concern, including insiders who may or may not have malicious intent.

Data segmentation is also critical, as it can limit the attack damage to a subset of data. Segmenting can reduce the potential for cascading -- and often catastrophic -- network failures. It’s another safety net that can minimize the risk of data leaks and ensure five nines of availability.

4. Automate security and gain complete control

As the amount of data increases and data center management becomes more complex, it’s no longer feasible to manually coordinate security processes. Therefore, all of the aforementioned strategies should be supported by software that automates data center security management.

Regardless of the size of the data center, administrators must implement solutions that can monitor applications and network activity and deliver patches and updates as necessary. These goals can be achieved with modern performance monitoring software that gives data center managers a complete view of the health of every aspect of their data centers, including compute, storage, network and applications.

Administrators willing to lay the security groundwork now will find their road toward data center consolidation easier to travel. Their efforts will also provide a solid foundation for managing what promises to be a tricky post-consolidation world -- where the amount of data continues to grow even as the number of data centers has shrunk.

4 security management strategies for data center consolidation相关推荐

  1. Data Center手册(4):设计

    基础架构 拓扑图 Switching Path L3 routing at aggregation layer L2 switching at access layer L3 switch融合了三种功 ...

  2. Management of your data

    Management of your data 文章目录 Management of your data Intro Session data Data lifecycle Why Areas of ...

  3. EDC(Enterprise Data Center 企业数据中心)

    EDC(Enterprise Data Center 企业数据中心) 参考:http://www.docin.com/p-247936120.html ERP (企业资源计划) 参考:http://b ...

  4. VMware NSX Data Center for vSphere (NSX-V) 6.4.10 - 数据中心网络虚拟化

    VMware NSX Data Center for vSphere 6.4.10 | 2021 年 2 月 18 日发行 | 内部版本 17626462 **重要信息:**您将无法从以下先前发行版本 ...

  5. Atlassian Data Center 如何优化企业中新员工的远程入职流程

    过去的一年为我们的工作方式带来了翻天覆地的变化,而且毫无疑问的是,这个变化将是持久的.无论是由于疫情影响还是企业规模扩展,企业都面临着如何实现地理位置上的分布式团队进行高效协作的挑战. 我们知道,远程 ...

  6. 最新发布| Jira官宣中国区本地部署特殊政策,公布Data Center价格

    ​Atlassian官方发布Jira Server版停售消息至今已3个月,面对中国区用户的抗议,官方终于于2021年2月2日推出针对性政策,即将DC版准入门槛从500人下调至25人,并于2月5日召开发 ...

  7. 在Jira停售后,你决定赌Atlassian Data Center?

    随着Atlassian Server产品做出服务调整(停止销售新的本地化部署服务许可证,并停止对本地化部署产品的新功能开发),可能有大批国内Server的用户就要被逼着去选择Atlassians Da ...

  8. J0ker的CISSP之路:复习-Information Security Management(4)

    文章同时发表在:[url]http://netsecurity.51cto.com/art/200710/57991.htm[/url] 在<J0ker的CISSP之路>系列的上一篇文章里 ...

  9. DotNetNuke: System.Security.Cryptography.CryptographicException: Bad Data

    这几天在弄DNN,可是不知道为什么是不是出现 DotNetNuke: System.Security.Cryptography.CryptographicException: Bad Data 这样的 ...

  10. CF-527E(Data Center Drama) 欧拉图+构造

    CF-527E(Data Center Drama) 欧拉图+构造 题目链接 题意 nnn个电脑mmm个网线(存在环和重边),你可以添加最少数量的网线并规定他们的方向,使每个点的出度都为偶数并且每个计 ...

最新文章

  1. python考证书-python能考证么
  2. QML基础类型之rect
  3. mysql+control+user_mysql的基本使用
  4. 小学计算机课教学设计,小学信息技术教学设计三篇
  5. HDMI高清光端机产品特点及应用场合介绍
  6. 使Android 自带SDK 完美支持HTML5 之 html5webview
  7. Linux DNS服务详解——DNS基础知识
  8. 数据驱动型企业的海外服务器管理实践
  9. SQL文件切割工具、大文件操作工具
  10. 取火柴 c语言程序,取火柴游戏||Nim博弈
  11. 广告行业中富媒体的概念
  12. 字节码插桩(javassist)之插入代码块|IOC框架(Hilt)之对象注入~研究
  13. 一键调用API,聚合数据API服务助力企业应用创新
  14. 钉钉自动打卡上下班微信自动打卡(原理及源码)
  15. Spring+Netty+Vue 网页版聊天应用,仿微信网页版聊天
  16. formData上传Excel文件[object object ]数据库接收不到数据
  17. 问渠那得清如许?为有源头活水来。——java面向对象的思想
  18. relpos函数解读
  19. Vmware vSphere 5.0安装
  20. 家庭健身赛道闯入新选手,一面智能镜撑起一座健身房

热门文章

  1. 超算优化重在存储,DAOS助力瑞金打造先进的生信大数据平台
  2. 深度拆解:体验好、满意度高,客户为什么不复购的内在逻辑
  3. F5 微信银行解决方案
  4. 网易云音乐 linux x32,网易云音乐 Win10 UWP 正式变为 Win32 转制版
  5. 这一次,彻底拿下操作系统!!!
  6. 1.5 极限的存在准则和两个重要极限
  7. 失眠的岁月,我们都交了哪些科技智商税?
  8. java小游戏大鱼吃小鱼入门(音乐添加+鱼头转向+背景移动+背景泡泡效果)
  9. 天行健,君子以自强不息
  10. 使用antd-design-vue配合vue框架搭建项目使用组件显示英文的解决办法