ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    The High Cost of On Premises Infrastructure

    IT Discussion
    colocation
    10
    42
    3.5k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JaredBuschJ
      JaredBusch @NetworkNerd
      last edited by

      @NetworkNerd said in The High Cost of On Premises Infrastructure:

      @JaredBusch said in The High Cost of On Premises Infrastructure:

      The two biggest arguments that always have to be addressed are

      1. speed of access to file shares
      2. access to the client/server LoB app used now.

      You normally flippant answer of don't use them is not the acceptable answer to the business principles that make the decisions. Yes, times are changing and WAN speeds and new technologies are moving things, but these two points have to be properly addressed to make any kind of realistic move to colocation for the SMB space.

      Couldn't we throw regulatory compliance in there too as a consideration?
      https://www.truevault.com/blog/hipaa-physical-safeguards-explained-part-1.html

      Not IMO. Because colo means the data is never in anyone else's hands.

      scottalanmillerS 1 Reply Last reply Reply Quote 2
      • scottalanmillerS
        scottalanmiller @NetworkNerd
        last edited by

        @NetworkNerd said in The High Cost of On Premises Infrastructure:

        Couldn't we throw regulatory compliance in there too as a consideration?
        https://www.truevault.com/blog/hipaa-physical-safeguards-explained-part-1.html

        Yes, compliance is one of the biggest factors keeping on premises from being a good option. Very few non-enterprises can maintain a secure local environment. So going to colocation is very important for those companies to maintain adequate physical security, that's a good point.

        1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller @JaredBusch
          last edited by

          @JaredBusch said in The High Cost of On Premises Infrastructure:

          @NetworkNerd said in The High Cost of On Premises Infrastructure:

          @JaredBusch said in The High Cost of On Premises Infrastructure:

          The two biggest arguments that always have to be addressed are

          1. speed of access to file shares
          2. access to the client/server LoB app used now.

          You normally flippant answer of don't use them is not the acceptable answer to the business principles that make the decisions. Yes, times are changing and WAN speeds and new technologies are moving things, but these two points have to be properly addressed to make any kind of realistic move to colocation for the SMB space.

          Couldn't we throw regulatory compliance in there too as a consideration?
          https://www.truevault.com/blog/hipaa-physical-safeguards-explained-part-1.html

          Not IMO. Because colo means the data is never in anyone else's hands.

          And you can encrypt the entire colocation platform, so that physical extraction is not a direct concern as well. Someone stealing hard drives or even full arrays would be useless to them.

          DashrenderD 1 Reply Last reply Reply Quote 0
          • DashrenderD
            Dashrender @scottalanmiller
            last edited by

            @scottalanmiller said in The High Cost of On Premises Infrastructure:

            @JaredBusch said in The High Cost of On Premises Infrastructure:

            @NetworkNerd said in The High Cost of On Premises Infrastructure:

            @JaredBusch said in The High Cost of On Premises Infrastructure:

            The two biggest arguments that always have to be addressed are

            1. speed of access to file shares
            2. access to the client/server LoB app used now.

            You normally flippant answer of don't use them is not the acceptable answer to the business principles that make the decisions. Yes, times are changing and WAN speeds and new technologies are moving things, but these two points have to be properly addressed to make any kind of realistic move to colocation for the SMB space.

            Couldn't we throw regulatory compliance in there too as a consideration?
            https://www.truevault.com/blog/hipaa-physical-safeguards-explained-part-1.html

            Not IMO. Because colo means the data is never in anyone else's hands.

            And you can encrypt the entire colocation platform, so that physical extraction is not a direct concern as well. Someone stealing hard drives or even full arrays would be useless to them.

            I'm less worried about physical theft than I am about someone plugging a USB stick in and infecting the host, etc.

            scottalanmillerS coliverC 3 Replies Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller @Dashrender
              last edited by scottalanmiller

              @Dashrender said in The High Cost of On Premises Infrastructure:

              I'm less worried about physical theft than I am about someone plugging a USB stick in and infecting the host, etc.

              Infect it how? Can you describe this attack vector? When you plug a USB stick into a server, assuming that you have been breached in a datacenter to this level which is essentially unthinkable, and assuming that you've not disabled the USB ports, what would cause the files on the USB stick to be executed, or even mounted?

              DashrenderD bigbearB 2 Replies Last reply Reply Quote 1
              • scottalanmillerS
                scottalanmiller @Dashrender
                last edited by

                @Dashrender I've never tried this, but just thinking about it, no matter what is on a USB stick, I don't know that any ESXi, Xen, KVM or Hyper-V environment would react to the USB stick at all, or maybe just acknowledge that it exists. I'm not aware of any situation where they would "see" the files on the device. Obviously you can protect against this by blocking USB access on the hardware, you can stop the disk drives from being used, too.

                But assuming that those things have been missed, I'm interested in where you've seen this threat and what has caused you to be concerned about it.

                DashrenderD Emad RE 2 Replies Last reply Reply Quote 1
                • DashrenderD
                  Dashrender @scottalanmiller
                  last edited by

                  @scottalanmiller said in The High Cost of On Premises Infrastructure:

                  @Dashrender said in The High Cost of On Premises Infrastructure:

                  I'm less worried about physical theft than I am about someone plugging a USB stick in and infecting the host, etc.

                  Infect it how? Can you describe this attack vector? When you plug a USB stick into a server, assuming that you have been breached in a datacenter to this level which is essentially unthinkable, and assuming that you've not disabled the USB ports, what would cause the files on the USB stick to be executed, or even mounted?

                  Yeah I forgot about disabling the USB ports - so this should be a non issue. Never mind nothing to see here.

                  scottalanmillerS 1 Reply Last reply Reply Quote 0
                  • DashrenderD
                    Dashrender @scottalanmiller
                    last edited by

                    @scottalanmiller said in The High Cost of On Premises Infrastructure:

                    @Dashrender I've never tried this, but just thinking about it, no matter what is on a USB stick, I don't know that any ESXi, Xen, KVM or Hyper-V environment would react to the USB stick at all, or maybe just acknowledge that it exists. I'm not aware of any situation where they would "see" the files on the device. Obviously you can protect against this by blocking USB access on the hardware, you can stop the disk drives from being used, too.

                    But assuming that those things have been missed, I'm interested in where you've seen this threat and what has caused you to be concerned about it.

                    As you said, it's not real concern, you're much more likely to be breached like this in a SMB shop. As I said "move along, Move along"

                    1 Reply Last reply Reply Quote 0
                    • coliverC
                      coliver @Dashrender
                      last edited by

                      @Dashrender said in The High Cost of On Premises Infrastructure:

                      @scottalanmiller said in The High Cost of On Premises Infrastructure:

                      @JaredBusch said in The High Cost of On Premises Infrastructure:

                      @NetworkNerd said in The High Cost of On Premises Infrastructure:

                      @JaredBusch said in The High Cost of On Premises Infrastructure:

                      The two biggest arguments that always have to be addressed are

                      1. speed of access to file shares
                      2. access to the client/server LoB app used now.

                      You normally flippant answer of don't use them is not the acceptable answer to the business principles that make the decisions. Yes, times are changing and WAN speeds and new technologies are moving things, but these two points have to be properly addressed to make any kind of realistic move to colocation for the SMB space.

                      Couldn't we throw regulatory compliance in there too as a consideration?
                      https://www.truevault.com/blog/hipaa-physical-safeguards-explained-part-1.html

                      Not IMO. Because colo means the data is never in anyone else's hands.

                      And you can encrypt the entire colocation platform, so that physical extraction is not a direct concern as well. Someone stealing hard drives or even full arrays would be useless to them.

                      I'm less worried about physical theft than I am about someone plugging a USB stick in and infecting the host, etc.

                      How is that any less safe then your office building? You have patients coming in and out all day, contractors, maintenance, etc etc etc. You don't know who is in your building and who could, just as easily, plug a USB stick in to a host.

                      A colo knows exactly who is in their building, many have biometric security and pressure sensitive pads to prevent piggy backing.

                      1 Reply Last reply Reply Quote 2
                      • bigbearB
                        bigbear @scottalanmiller
                        last edited by

                        @scottalanmiller said in The High Cost of On Premises Infrastructure:

                        @Dashrender said in The High Cost of On Premises Infrastructure:

                        I'm less worried about physical theft than I am about someone plugging a USB stick in and infecting the host, etc.

                        Infect it how? Can you describe this attack vector? When you plug a USB stick into a server, assuming that you have been breached in a datacenter to this level which is essentially unthinkable, and assuming that you've not disabled the USB ports, what would cause the files on the USB stick to be executed, or even mounted?

                        Dont you watch House of Cards?

                        0_1489758730679_datacenter.jpg

                        scottalanmillerS 1 Reply Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller @Dashrender
                          last edited by

                          @Dashrender said in The High Cost of On Premises Infrastructure:

                          @scottalanmiller said in The High Cost of On Premises Infrastructure:

                          @Dashrender said in The High Cost of On Premises Infrastructure:

                          I'm less worried about physical theft than I am about someone plugging a USB stick in and infecting the host, etc.

                          Infect it how? Can you describe this attack vector? When you plug a USB stick into a server, assuming that you have been breached in a datacenter to this level which is essentially unthinkable, and assuming that you've not disabled the USB ports, what would cause the files on the USB stick to be executed, or even mounted?

                          Yeah I forgot about disabling the USB ports - so this should be a non issue. Never mind nothing to see here.

                          But even if you didn't, is there an attack vector? How could you get something to execute if the USB was accidentally exposed?

                          1 Reply Last reply Reply Quote 0
                          • scottalanmillerS
                            scottalanmiller @bigbear
                            last edited by

                            @bigbear said in The High Cost of On Premises Infrastructure:

                            @scottalanmiller said in The High Cost of On Premises Infrastructure:

                            @Dashrender said in The High Cost of On Premises Infrastructure:

                            I'm less worried about physical theft than I am about someone plugging a USB stick in and infecting the host, etc.

                            Infect it how? Can you describe this attack vector? When you plug a USB stick into a server, assuming that you have been breached in a datacenter to this level which is essentially unthinkable, and assuming that you've not disabled the USB ports, what would cause the files on the USB stick to be executed, or even mounted?

                            Dont you watch House of Cards?

                            0_1489758730679_datacenter.jpg

                            No and I'm guessing that this would make me want to avoid it?

                            coliverC 1 Reply Last reply Reply Quote 1
                            • coliverC
                              coliver @scottalanmiller
                              last edited by

                              @scottalanmiller said in The High Cost of On Premises Infrastructure:

                              @bigbear said in The High Cost of On Premises Infrastructure:

                              @scottalanmiller said in The High Cost of On Premises Infrastructure:

                              @Dashrender said in The High Cost of On Premises Infrastructure:

                              I'm less worried about physical theft than I am about someone plugging a USB stick in and infecting the host, etc.

                              Infect it how? Can you describe this attack vector? When you plug a USB stick into a server, assuming that you have been breached in a datacenter to this level which is essentially unthinkable, and assuming that you've not disabled the USB ports, what would cause the files on the USB stick to be executed, or even mounted?

                              Dont you watch House of Cards?

                              0_1489758730679_datacenter.jpg

                              No and I'm guessing that this would make me want to avoid it?

                              They do get a lot of silly technical things wrong, but the story is generally pretty good.

                              scottalanmillerS 1 Reply Last reply Reply Quote 1
                              • scottalanmillerS
                                scottalanmiller @coliver
                                last edited by

                                @coliver said in The High Cost of On Premises Infrastructure:

                                They do get a lot of silly technical things wrong, but the story is generally pretty good.

                                To me this always says "the writers didn't take this seriously and don't think that I should."

                                JaredBuschJ 1 Reply Last reply Reply Quote 0
                                • JaredBuschJ
                                  JaredBusch @scottalanmiller
                                  last edited by

                                  @scottalanmiller said in The High Cost of On Premises Infrastructure:

                                  @coliver said in The High Cost of On Premises Infrastructure:

                                  They do get a lot of silly technical things wrong, but the story is generally pretty good.

                                  To me this always says "the writers didn't take this seriously and don't think that I should."

                                  What is the point in paying for a quality technical consultant to assist the writers when the target audience has no idea what anything is anyway?

                                  Too many people get caught up in the weeds and deride things because of minor details and forget to pay attention to the story.

                                  Now, that said, I have no idea how this show is as I have never watched it.

                                  Also, if the tech is too blatantly wrong, then I will lose my suspension of disbelief and thus not like the show. But generally it has to be really bad for that.

                                  coliverC DashrenderD scottalanmillerS 3 Replies Last reply Reply Quote 0
                                  • coliverC
                                    coliver @JaredBusch
                                    last edited by coliver

                                    @JaredBusch said in The High Cost of On Premises Infrastructure:

                                    @scottalanmiller said in The High Cost of On Premises Infrastructure:

                                    @coliver said in The High Cost of On Premises Infrastructure:

                                    They do get a lot of silly technical things wrong, but the story is generally pretty good.

                                    To me this always says "the writers didn't take this seriously and don't think that I should."

                                    What is the point in paying for a quality technical consultant to assist the writers when the target audience has no idea what anything is anyway?

                                    Too many people get caught up in the weeds and deride things because of minor details and forget to pay attention to the story.

                                    Now, that said, I have no idea how this show is as I have never watched it.

                                    Also, if the tech is too blatantly wrong, then I will lose my suspension of disbelief and thus not like the show. But generally it has to be really bad for that.

                                    It's never that bad. They get some of the minutia of US politics much worse then they do the technical aspects in general. The story is actually pretty good, and Kevin Spacey does an excellent job as a sociopath. It's on Netflix highly recommend the first and second season (all I've had time for).

                                    1 Reply Last reply Reply Quote 1
                                    • JaredBuschJ
                                      JaredBusch
                                      last edited by JaredBusch

                                      My servers are in cage with 5 racks. The space my servers is in is part of a half rack rental.

                                      So it is certainly possible that I could attempt something malicious once in. But that is very easily trackable.

                                      1 Reply Last reply Reply Quote 0
                                      • DashrenderD
                                        Dashrender @JaredBusch
                                        last edited by

                                        @JaredBusch said in The High Cost of On Premises Infrastructure:

                                        Also, if the tech is too blatantly wrong, then I will lose my suspension of disbelief and thus not like the show. But generally it has to be really bad for that.

                                        Swordfish anyone?

                                        1 Reply Last reply Reply Quote 1
                                        • scottalanmillerS
                                          scottalanmiller @JaredBusch
                                          last edited by

                                          @JaredBusch said in The High Cost of On Premises Infrastructure:

                                          What is the point in paying for a quality technical consultant to assist the writers when the target audience has no idea what anything is anyway?

                                          I also take "don't take it seriously" as another way to say "I'm not the target audience." I'm not saying it's a bad business decision, just saying that I'm not their target audience.

                                          1 Reply Last reply Reply Quote 0
                                          • bigbearB
                                            bigbear
                                            last edited by

                                            Its actually one of the best shows on.

                                            The data center thing was a setup anyway, some FBI guy wanted him to get caught. As soon as he connect the USB drive he is arrested.

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 1 / 3
                                            • First post
                                              Last post