S 2.357 Setting up an administration network for storage systems

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator

The administration and monitoring of resources such as SAN or NAS components on which high security requirements are placed must be implemented appropriately. The design of a separate LAN used solely for administrative purposes is often the clearest, most effective, and most economical way to meet these requirements. PCs are stationed in this administration network that can only be used to administer the critical components.

In general, only secure protocols (ssh instead of telnet, https instead of http) should be used for administration in this network. However, the logical separation, or even the physical separation, of this administration network from production network makes the use of insecure protocols, especially of the SNMP Version 1 protocol still almost unavoidable in many production environments, tolerable.

Conception/planning

Private addresses (as described in RFC Standard 1918) should be used in the administration network. Such addresses are not routed through "official" networks, which means that a connection to an official network, if such a connection should become necessary, always requires NAT (Network Address Translation) and additional safeguards implemented by a firewall.

In the administration network, the time should be synchronised on all IT components using an NTP server. This makes assessing logs easier and allows you to assess incidents affecting several components at once.

The resources available for the complete installation of a storage system must be determined. This includes both the personnel resources necessary to create and implement a concept and to operate the network, and the financial resources required to accomplish this.

The results must be documented accordingly.

It must also be examined if additional monitoring measures need to be implemented in the administration network. For example, the use of network IDs additionally allows you to monitor the network for unauthorised activities.

Likewise, a central logging instance could be established in such a network so that the central instance, operating as a protocol server, manages the log data from all servers and storage systems. It must be noted that such special measures may need to be coordinated with the personnel representative.

If the design of the administration network is complex, then module S 4.1 Heterogeneous networks should be consulted for the design and testing.

Implementation

It must first be examined how a productive network and the servers and other devices stationed in the network (active network components, storage systems) can be expanded adding an administration network.

You must first go through the safeguards S 2.139 Survey of the existing network environment and S 2.140 Analysis of the existing network environment. After that, the network communication requirements placed on the administration network to be installed must be determined, and the protection requirements of the new network must be defined.

The protection requirements of the administration network are to be derived from the existing IT procedures to be administered over this network.

Operation

When test operations are initiated, a test must be performed which tests the security precautions and which becomes the basis of the operational documentation for this network. Typical questions to be answered by such a test include:

Productive operations can be started after that.

Disposal

If PCs or other hardware are removed from the network or just taken off the network for a while for repairs, then it must be ensured that no internal information (passwords, log files, internal documents etc.) is stored on the hardware.

Contingency planning

A contingency plan must be available so that the operation of the productive network is guaranteed even when the administration network fails.

Review questions: