ADSM-L

Re: [ADSM-L] TSM architecture

2009-09-18 14:45:48
Subject: Re: [ADSM-L] TSM architecture
From: Richard Sims <rbs AT BU DOT EDU>
To: ADSM-L AT VM.MARIST DOT EDU
Date: Fri, 18 Sep 2009 14:43:23 -0400
We technicians tend to think about this issue in terms of processing
capacity.  Others in the organization may consider it in different
terms, and indeed perhaps should be reviewed on that larger scale.

If I were a technology-savvy expert in your Security Department and
was made aware of this question of placement, I would immediately
think that the corporation's data gravitates toward this central data
preservation point, and that the application software or the
administrators who log on to that system to manage their application
could bend toward the dark side to gain control of one or more tape
drives to gain surreptitious access to the data, in a physical manner
or - even more conveniently - if there were a TSM client running co-
resident with the TSM server, simply recall it.

This is a traditionally compelling reason for isolating servers
performing distinctly different tasks.  One wonders how aware your new
architect is of more global considerations.

   Richard Sims

<Prev in Thread] Current Thread [Next in Thread>