WAN Acceleration: Best Practices for Preserving Security

The centralization of branch office servers and storage enables enterprises to more effectively manage and secure critical business information. By moving servers out of branch offices and consolidating IT infrastructure to fewer, purpose-built data centers, enterprises can protect vital business resources through tight physical security and well-defined access procedures. In addition, server centralization reduces sensitive user credential stores, helping to ensure that this information remains protected from unauthorized access.

Server centralization also facilitates adherence to corporate and regulatory compliance policies, which mitigates a company’s overall risk of exposure. It enables IT staff to easily, and more cost effectively, identify deviations from established guidelines, such as Sarbanes Oxley, Basel II, and the Health Insurance Portability and Accountability Act (HIPAA), and take appropriate remediation steps when necessary.

However, because of limitations in existing WAN technology, server centralization can compromise application performance across a distributed enterprise. As a result, WAN acceleration becomes a necessary component to any centralization project as a way to maintain adequate performance. In fact, recent surveys indicate that as many as 90% of respondents are expecting to invest in new application acceleration solutions to address this challenge in the coming years.

While WAN acceleration is a great way to improve application performance, many of these types of solutions can have an adverse impact on security if not implemented properly. For example, many approaches are based on a concept called data reduction, which means they employ local hard drives to store information in real-time and deliver duplicate data locally whenever possible. While data reduction dramatically improves performance, it can make a company more vulnerable to security threats and risks because of lack of encryption on the local appliance.

Below are several basic measures that can ensure that new acceleration products are secure enough to protect vital business resources.

Security precautions
Regardless of the technology used, when new appliances are inserted into a network infrastructure to accelerate application performance, some basic security guidelines can be observed to ensure that they do not compromise data security. These include:

Local data encryption: Whenever business critical information is stored on a local hard drive, as is the case with WAN acceleration devices that employ data reduction techniques, encryption should be implemented to protect this information from unauthorized access. Even if proprietary methods are used to store this information, and the data has a tendency to be “scrambled” over time as new information is stored, it’s still quite possible that large pieces of information will be stored on the appliance as contiguous blocks. These blocks can contain sensitive information, such as social security numbers, which can be extracted by someone who has access to the appliance’s partition. By encrypting the local data store, this risk is avoided. Typically, encryption should take place in hardware so as not to adversely impact the performance and scalability of the appliance.

VPN across the WAN: IPsec is often used between appliances to secure data transfer over the WAN. Once again, performing encryption in hardware can ensure that security does not come at the expense of performance. Industry best practices recommend that a 128-bit encoding scheme, such as AES, be used when performing encryption. Older methods, such as 56-bit DES, are easily broken, which is why industry leaders such as Microsoft have moved away from that technology.

IPsec can be performed outside of the acceleration appliance, but it typically must occur downstream of this device. Otherwise, the appliance will not have visibility into traffic traversing the WAN, limiting its ability to provide significant performance gains.

Secure access: TACACS+ and/or RADIUS can be used to prevent unauthorized users from accessing network acceleration appliances. In addition, secure interfaces can be provided on all management consoles, including SNMPv3 and HTTPs. User credentials should be stored in as few places as possible, preferably in a secure environment, such as a purpose-built data center.

As more and more enterprises undergo server centralization projects, new products will be introduced to improve network and application performance. By following basic security precautions, enterprises can ensure that these performance improvements do not come at the expense of data security. In fact, by enabling the centralization of key resources, enterprises are actually increasing their ability to secure business information, which ultimately ensures better compliance with the key regulatory measures that are having an increasingly complicated effect on the way that everyone does business.

Don't miss