matt_prigge
Contributing Editor

The impossible enterprise data security challenge

analysis
Mar 25, 20138 mins

Securely deleting data in a personal context is hard enough, but it's far more complicated when enterprise storage is involved

In my post last week, I described some of the basic challenges in ensuring that data you delete actually stays deleted. In the context of personal computers and removable drives, these concepts can be confusing for users but are usually fairly well understood by IT pros. But IT pros are often confused when deleting data in the context of storage virtualization in their data centers.

Virtualizing storage has been enormously popular for several years. It’s no wonder, either: By abstracting the underlying storage medium from how it’s presented to storage users, you can pull off really cool tricks. Thin provisioning, snapshots, SSD wear-leveling, and automated storage tiering are all possible thanks to storage virtualization.

However, all this progress has come at a cost to data security. You can no longer simply overwrite a disk with random garbage and assume that anything that had been on that disk has been effectively obscured, as you can on your PC. Instead, there are almost certainly leftover bits and pieces of that data floating around on your storage device.

If you want to be reasonably sure that someone won’t come across sensitive data by accident, you can succeed without too much difficulty. But if you’re looking for an iron-clad guarantee that sensitive data will never see the light of day, you’ll find it can get substantially more complicated and in fact almost impossible without committing to a mammoth undertaking.

Imagine you’re in IT at a medium-size accounting firm. Your data center infrastructure consists of a few VMware vSphere virtualization hosts coupled with a Dell EqualLogic SAN. You use Veeam’s Backup and Replication to back all that up daily to an ExaGrid NAS and monthly onto tape monthly archives. Maybe you use products from Citrix Systems, Hewlett-Packard, Microsoft, and/or NetApp — it doesn’t matter, as the issues are the same in this common storage scenario no matter what products you use.

A particularly security-sensitive client has asked the partner he works with to provide assurance that all the work product associated with a project  has been completely and securely erased from the firm’s systems. Without completely realizing what he’s promising, the partner agrees. Minutes later, you have an email in your inbox asking you to ensure that the files in a given folder on the network are completely deleted and to ensure that all copies have been destroyed with 100 percent certainty.

Why 100 percent deletion is impossible in virtualized storage Let’s look at what this commitment really means to IT.

The file server. Starting with my advice from last week, the simplest thing to do is to get on the virtualized file server where the files are stored and securely delete them using a tool like Eraser. You could also use Eraser to securely wipe all the unused space on the disk. Those two steps would ensure that the disk blocks where the file used to reside have been completely overwritten with garbage and any other blocks that might have contained older versions of the work product are unrecoverable.

The hypervisor. However, you can’t stop there. Because this file server is virtualized, you need to be concerned with what might exist on the VMFS file system that the file server’s disks are stored on. If you’ve ever taken a VMware snapshot of the VM (you have, because Veeam takes one every time it performs a backup), some of the data in question might have been written into a snapshot “delta” (a file containing changes written to the disk while the snapshot was active). When the VMware snapshot is deleted later, the data in that delta file is copied back into the main disk file, and the delta itself is deleted. However, as with deleting normal files, the data isn’t securely scrubbed — it still exists on the disk, though it no longer has a file descriptor pointing at it.

If you want to delete that delta data, you have to securely wipe the free space on the entire VMFS partition as well — largely a DIY procedure as few tools are designed to do this. For example, you might use the DD utility from a vSphere host’s console to write zeros into a file on the VMFS volume until it’s full, then delete it. That’s dangerous because it will temporarily fill the volume, which could affect production, but it will do the job.

The SAN. You’re still not done. Now you have the SAN to worry about. In this case, the EqualLogic SAN is charged with storing the VMFS volume that you just painstakingly cleaned. Because you’re concerned with maintaining uptime and being able to support the partners with fast restores when something is deleted by mistake, you’ve configured periodic snapshots to be taken of the volumes. As with VMware snapshots, the EqualLogic SAN uses free pool space to store blocks of data as they are changed — marking the old blocks as part of the most recent snapshot.

Overwriting the active disk with zeroes has only obfuscated one version of the disk. There are still many versions of that disk (and your target files) sitting on the SAN in perfectly good shape, ready to be restored at a moment’s notice. As with the VMware snapshots, you can’t just delete the snapshots because doing so won’t actually overwrite the blocks on the disk. Plus, if you did overwrite those blocks, you might break your disaster-recovery SLAs by hobbling your ability to restore quickly.

It gets even worse. Even if you find a way to delete the snapshots and clean all the free space on the SAN, you’re still not done. Now you have to track down all the backups you’ve made since that data was completed and securely delete them too. That could mean destroying tapes and trying to securely delete data from the ExaGrid appliance.

Even assuming you could find ways to do all this, you’d be left having spent countless hours performing secure deletions in the file server’s file system, the hypervisor’s file system, and the SAN’s file system. You also would have to delete every SAN snapshot you’ve ever taken of that volume (which might encompass a large number of other VMs) and destroyed nearly every backup you’ve ever made — all just to ensure a handful of files were well and truly deleted beyond a shadow of a doubt.

There is one method that works if you start with it Of course, people very, very rarely go through this kind of trouble to delete data. However, that doesn’t keep them from promising they’ve done so — a promise usually made out of simple ignorance. The cold, hard truth is that it is nearly impossible (and certainly impractical) to securely delete unencrypted data from an environment that uses multiple layers of storage virtualization without physically destroying the environment — that is, physically shredding drives.

The reality is that product vendors have, at IT’s request, done substantial innovation in making our storage and computing systems faster and more resilient — two attributes that happen to be diametrically opposed to making it impossible to access data.

If you want the ability to securely delete data on systems like this, you must encrypt that data at the point of creation and never copy it to an unencrypted medium. If the partner knew that the client was this sensitive to digital security, he could have stored his work product in an encrypted file system (such as by using a TrueCrypt volume stored on the file server). Once he received the client’s request, he could delete the volume and simply forget the passphrase he had used. All those potential copies in my example scenario would still exist, but they’d be useless to anyone without that passphrase and thus effectively deleted by its loss.

The best thing we in IT can do about this problem is to educate our stakeholders and user base about it. They need to assume that once data is generated that it can never be deleted with 100 percent certainty — only made substantially less likely to be recovered. Never promise anyone that you have completely deleted their files (in a contract or otherwise).

And if security is important to you, always engage the services of a data-destruction firm (either audit-ready software or someone with a mechanical drive shredder) to take care of equipment you’re decommissioning.

This article, “The impossible enterprise data security challenge,” originally appeared at InfoWorld.com. Read more of Matt Prigge’s Information Overload blog and follow the latest developments in storage at InfoWorld.com. For the latest business technology news, follow InfoWorld.com on Twitter.