250 likes | 269 Views
STORAGE MANAGEMENT/ EXECUTIVE: Managing a Compliant Infrastructure. Processes and Procedures. Mike Casey Principal Analyst Contoural Inc. Agenda. Anticipate the impact of future compliance requirements Get agreement on policies & processes Leverage best practices & standards
E N D
STORAGE MANAGEMENT/EXECUTIVE:Managing a Compliant Infrastructure Processes and Procedures Mike Casey Principal Analyst Contoural Inc.
Agenda • Anticipate the impact of future compliance requirements • Get agreement on policies & processes • Leverage best practices & standards • Link compliance with ILM to minimize risks & costs
Anticipate the impact of future compliance requirements • Policy drivers: regulatory compliance, litigation readiness, stakeholder expectations • Anticipate changes and new requirements, by understanding these drivers • Strategy: Understand the common policy goals that drive regulatory activity – and the common technical capabilities that enable organizations to comply
Policy goals drive archiving goals • Litigation readiness • Liabilities and risks • Discovery costs Archivinggoals • Regulatory compliance • Laws • Regulations • Standards • Guidelines • Retention • Security • Efficiency • Operational needs • End-user productivity • Customer service levels • Corporate IPprotection
Foundations of compliance & ILM Archiving Records management • Retention • Retrieval • Disposition • Storagemanagement • Media • Migration • Cost • Recorddefinition • Identification • Classification • Index & search • Security • Integrity • Confidentiality • Accessibility What to save How to save it
Archiving goals and capabilities • Retention goals • Scope (completeness) • Duration Admin. retention Technical retention Physical retention • Security goals • Integrity • Confidentiality (privacy) • Availability (transparency) Technical security Physical security Admin. security Technical efficiency • Efficiency goals • Service levels • Cost reduction Physical efficiency Admin. efficiency
Example: Technical security capabilities HIPAA security rule • 45 CFR 164 -- Subpart C • Security Standards for the Protection ofElectronic Protected Health Information • 164.312 Technical safeguards • (a) Access control. Implement technical policies and procedures... to allow access only to those persons or software programs … • (b) Audit controls. … • (d) Person or entity authentication.. • (e) Transmission security. ... • (e)(2)(ii) Encryption …
Get agreement on policies & processes Compliance initiative: Process steps 1 2 3 Assess Policy Architect Deploy Manage Response to change Ongoing operation
Step one: Assessment 1 • Regulatory compliance • Litigation readiness • Stakeholder expectations
Sarbanes-Oxley Act HIPAA 21 CFR 11, GxP Gramm-Leach-Bliley Act Regulatory compliance Financial services Health services Life sciences Health insurance Health care Drugs Medical devices Insurance Securities Banking United States: Europe: Data Protection Act (UK) and similar laws implementing EU Directives GMP Directive (EU) Basel II Global: ISO 9000
Issue internal retention hold Litigation readiness Court order issued Discovery requested by one party First internal awareness Search, Query Deliver response To the court Result review Discovery request Archive DB User directory Discovery depends on effective archiving
Enterprise views toward e-mail and IM archiving Preserving all e-mail and IM content for long periods is least risky: 29% Not sure42% Deleting all e-mail and IM content on a regular basis is least risky: 21% Other8% Source: Osterman Research
Stakeholder expectations Application perspectives Operational perspectives • CEO • CFO • Records mgr • Compliance Officer • End user • Application admin • Storage admin • System admin • CIO • Legal counsel Legal perspectives Technology perspectives
Example – Retention scope Step two: Policy development 2 POLICY CHOICE IMPACTS Regulatory compliance Litigationreadiness Stakeholderexpectations Save almost nothing Selective deletion Selective retention Save nearly everything
Step two: Policy development (2) Example – Retention periods POLICY CHOICE IMPACTS Regulatory compliance Litigationreadiness Stakeholderexpectations Many, content-based Few, organization-based One for all
Step three: Define architecture and processes 3 • Provide required and recommended capabilities for retention and security • Use technology to enable cost-effective retention, storage and migration over lifecycle • Start with point solutions and information silos if needed, but move toward an integrated ILM architecture as technology evolves
Leverage best practices & standards • Example 1: HIPAA Security Rule • Example 2: Sarbanes-Oxley Act • Example 3: DoD 5015.2 Standard
Example 2: Sarbanes-Oxley Act • SEC refers to the COSO framework • Auditors endorse IT control frameworks • COBIT • ISO/IEC 17799 IT Control Objectives for Sarbanes-Oxley IT Governance Institute www.itgi.org and www.isaca.org
Example 3: DoD 5015.2-STD Records Management Applications • C2.2.3.23. RMAs shall enforce data integrity … • C2.2.5.2. The RMA shall prevent unauthorizedaccess to the repository. • C2.2.7.1. The RMA … shall use identification and authentication … • C2.2.7.4. If the RMA provides a web user interface, it shall provide 128-bit encryption • C2.2.6.6.3. RMAs shall delete electronic records … in a manner such that the records cannot be … reconstructed. • C2.2.8.1. The RMA … shall provide an auditcapability to log the actions, date, time, unique object identifier(s) and user…
Link compliance with ILM to minimize risks and costs • Compliance initiatives can minimize risk by establishing policies and processes for response to new regulations – and for anticipating future regulations and standards • Best policy response is commonly to retain more data, for longer retention periods • ILM processes and architecture can help reduce storage and management costs, making increased data retention feasible and affordable
TCO example for e-mail archiving Average costs per e-mail user per year Hard Soft Potential Total POLICY CHOICE Save nothing (delete at 30 days) $3 $19 $80 $102 Hard IT costs • Storage hardware • Archiving software • Operations/IT staff • Maintenance Soft costs • User productivity • Operational costs Potential costs • Litigation discovery • Increased liability • Regulatory discovery • Potential penalties Save nearly everything (primary disk) $204 $0 $6 $210 Save nearly everything intelligently $40 $4 $9 $53
Conclusions • Understand common compliance goals and technical capabilities • Start with business needs assessment: compliance, litigation and stakeholder requirements • Use standards and best practices to guide policies, processes and architecture • Define ILM policies and strategies to enable cost-effective implementation
Questions? • Ask the Expert • Resources • www.searchstorage.com • www.contoural.com • www.graycary.com • www.ostermanresearch.com searchstorage.techtarget.com/ateQuestion/0,289624,sid5_tax295552,00.html