{"id":1370,"date":"2009-11-24T04:25:52","date_gmt":"2009-11-23T18:25:52","guid":{"rendered":"http:\/\/nsrd.wordpress.com\/?p=1370"},"modified":"2018-12-12T15:17:16","modified_gmt":"2018-12-12T05:17:16","slug":"storage-tiering-vs-ilm","status":"publish","type":"post","link":"https:\/\/nsrd.info\/blog\/2009\/11\/24\/storage-tiering-vs-ilm\/","title":{"rendered":"Storage Tiering vs ILM"},"content":{"rendered":"<p>Over at <a title=\"StorageNerve\" href=\"http:\/\/storagenerve.com\/\" target=\"_blank\">StorageNerve<\/a>, and on Twitter, Devang Panchigar has been asking <a title=\"Is storage tiering ILM or a subset of ILM, but where is ILM\" href=\"http:\/\/storagenerve.com\/2009\/11\/20\/is-storage-tiering-ilm-or-a-subset-of-ilm-but-where-is-ilm\/\" target=\"_blank\"><em>Is Storage Tiering ILM or a subset of ILM, but where is ILM?<\/em><\/a> I think it&#8217;s an important question with some interesting answers.<\/p>\n<p>Devang starts with defining ILM from a storage perspective:<\/p>\n<blockquote><p>1) A user or an application creates data and possibly over time that data is modified.<br \/>\n2) The data needs to be stored and possibly be protected through RAID, snaps, clones, replication and backups.<br \/>\n3) The data now needs to be archived as it gets old, and retention policies &amp; laws kick in.<br \/>\n4) The data needs to be search-able and retrievable NOW.<br \/>\n5) Finally the data needs to be deleted.<\/p><\/blockquote>\n<p>I agree with items 1, 3, 4 and 5 \u2013 as per previous posts, for what it&#8217;s worth, I believe that 2 <a title=\"Information Lifecycle Protection\" href=\"https:\/\/nsrd.info\/blog\/2009\/09\/12\/think-backup-belongs-in-ilm-think-again\/\" target=\"_blank\">belongs to a sister activity which I define as Information Lifecycle Protection (ILP)<\/a> \u2013 something that Devang acknowledges as an alternative theory. (I liken the logic to separation between ILM and ILP to that between <a title=\"Backup is a production activity\" href=\"https:\/\/nsrd.info\/blog\/2009\/08\/25\/backup-is-a-production-activity\/\" target=\"_blank\">operational production servers and support production servers<\/a>.)<\/p>\n<p>The above list, for what it&#8217;s worth, is actually a fairly astute\/accurate summary of the involvement of the storage industry thus far in ILM. Devang rightly points out that Storage Tiering (migrating data between different speed\/capacity\/cost storage based on usage, etc.), doesn&#8217;t address all of the above points \u2013 in particular, data creation and data deletion. That&#8217;s certainly true.<\/p>\n<p>What&#8217;s missing from ILM from a storage perspective are the components that storage can only peripherally control. Perhaps that&#8217;s not entirely accurate \u2013 the storage industry can certainly participate in the remaining components (indeed, particularly in NAS systems it&#8217;s absolutely necessary, as a prime example) \u2013 but it&#8217;s more than just the storage industry. It&#8217;s operating system vendors. It&#8217;s application vendors. It&#8217;s database vendors. It is, quite frankly, the whole kit and caboodle.<\/p>\n<p>What&#8217;s missing in the storage-centric approach to ILM is <a title=\"Identity Management\" href=\"http:\/\/en.wikipedia.org\/wiki\/Identity_management\" target=\"_blank\"><em>identity management<\/em><\/a> \u2013 or to be more accurate in this context, <a title=\"Identity management systems\" href=\"http:\/\/en.wikipedia.org\/wiki\/Identity_management_systems\" target=\"_blank\">identity management systems<\/a>. The brief outline of identity management is that it&#8217;s about moving access control and content control <em>out<\/em> of the hands of the system, application and database administrators, and into the hands of human resources\/corporate management. So a system administrator could have total systems access over an entire host and all its data <em>but<\/em> not be able to open files that (from a corporate management perspective) they have no right to access. A database administrator can fully control the corporate database, but can&#8217;t access commercially sensitive or staff salary details, etc.<\/p>\n<p>Most typically though, it&#8217;s about corporate roles, as defined in human resources, being reflected <em>from the ground up<\/em> in system access options. That is, human resources, when they setup a new employee as having a particular role within the organisation (e.g., &#8220;personal assistant&#8221;), triggering the appropriate workflows to setup that person&#8217;s accounts and access privileges for IT systems as well.<\/p>\n<p>If you think that&#8217;s insane, you probably don&#8217;t appreciate the purpose of it. System\/app\/database administrators I talk to about identity management frequently raise trust (or the perceived lack thereof) involved in such systems. I.e., they think that if the company they work for wants to implement identity management they don&#8217;t <em>trust<\/em> the people who are tasked with protecting the systems. I won&#8217;t lie, I think in a very small number of instances, this may be the case. Maybe 1%, maybe as high as 2%. But let&#8217;s look at the bigger picture here \u2013 we, as system\/application\/database administrators currently have access to such data not because we <em>should<\/em> have access to such data but because until recently there&#8217;s been very few options in place to limit data access to only those who, from a corporate governance perspective, <em>should<\/em> have access to that data. As such, most system\/app\/database administrators are highly ethical \u2013 they know that being able to access data doesn&#8217;t equate to actually accessing that data. (Case in point: as the engineering manager and sysadmin at my last job, if I&#8217;d been less ethical, I would have seen the writing on the wall long before the company fell down under financial stresses around my ears!)<\/p>\n<p>Trust doesn&#8217;t wash in legal proceedings. Trust doesn&#8217;t wash in financial auditing. Particularly in situations where accurate logs aren&#8217;t maintained in an appropriately secured manner to prove that person A didn&#8217;t access data X. The fact that the system was designed to permit A to access X (even as part of A&#8217;s job) is in some financial, legal and data sensitivity areas, significant cause for concern.<\/p>\n<p>Returning to the primary point though, it&#8217;s about ensuring that the people who have authority over someone&#8217;s role within a company (human resources\/management) having control over the the processes that configure the access permissions that person has. It&#8217;s also about making sure that those work flows are properly configured and automated so there&#8217;s no room for error.<\/p>\n<p>So what&#8217;s missing \u2013 or what&#8217;s only at the barest starting point, is the integration of identity\/access control with ILM (including storage tiering) and ILP. This, as you can imagine, is not an easy task. Hell, it&#8217;s not even a hard task \u2013 it&#8217;s a <em>monumentally difficult<\/em> task. It involves a level of cooperation and coordination between different technical tiers (storage, backup, operating systems, applications) that we rarely, if ever see beyond the basic &#8220;must all work together or else it will just spend all the time crashing&#8221; perspective.<\/p>\n<p><em>That&#8217;s the bit<\/em> that gives the extra components \u2013 control over content creation and destruction. The storage industry on its own does not have the correct levels of exposure to an organisation in order to provide this functionality of ILM. Nor do the operating system vendors. Nor do the database vendors or the application vendors \u2013 they all have to work together to provide a total solution on this front.<\/p>\n<p>I think this answers (indirectly) Devang&#8217;s question\/comment on why storage vendors, and indeed, most of the storage industry, has stopped talking about ILM \u2013 the easy parts are well established, but the hard parts are only in their infancy. We are after all seeing some very early processes around integrating identity management and ILM\/ILP. For instance, key management on backups, if handled correctly, can allow for situations where backup administrators can&#8217;t by themselves perform the recovery of sensitive systems or data \u2013 it requires corporate permissions (e.g., the input of a data access key by someone in HR, etc.) Various operating systems and databases\/applications are now providing hooks for identity management (to name just one, here&#8217;s <a title=\"Oracle Identity Management\" href=\"http:\/\/www.oracle.com\/technology\/products\/id_mgmt\/index.html\" target=\"_blank\">Oracle&#8217;s details on it<\/a>.)<\/p>\n<p>So no, I think we can confidently say that storage tiering in and of itself is not the answer to ILM. As to why the storage industry has for the most part stopped talking about ILM, we&#8217;re left with one of two choices \u2013 it&#8217;s hard enough that they don&#8217;t <em>want<\/em> to progress it further, or it&#8217;s sufficiently commercially sensitive that it&#8217;s not something discussed without the strongest of NDAs.<\/p>\n<p>We&#8217;ve seen in the past that the storage industry can cooperate on shared formats and standards. We wouldn&#8217;t be in the era of pervasive storage we currently are without that cooperation. Fibre-channel, SCSI, iSCSI, FCoE, NDMP, etc., are proof positive that cooperation is possible. What&#8217;s different this time is the cooperation extends over a much larger realm to also encompass operating systems, applications, databases, etc., <em>as well as<\/em> all the storage components in ILM and ILP. (It makes <em>backups<\/em> seem to have a small footprint, and backups are amongst the most pervasive of technologies you can deploy within an enterprise environment.)<\/p>\n<p>So we can <em>hope<\/em> that the reason we&#8217;re not hearing a lot of talk about ILM any more is that all the interested parties are either working on this level of integration, or even making the appropriate preparations themselves in order to start working together on this level of integration.<\/p>\n<p>Fingers crossed people, but don&#8217;t hold your breath \u2013 no matter how closely they&#8217;re talking, it&#8217;s a long way off.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over at StorageNerve, and on Twitter, Devang Panchigar has been asking Is Storage Tiering ILM or a subset of ILM,&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[3,12,13,21],"tags":[91,435,452,454,455,477,571,943,1030],"class_list":["post-1370","post","type-post","status-publish","format-standard","hentry","category-architecture","category-general-technology","category-general-thoughts","category-security","tag-access-management","tag-hierarchical-storage-management","tag-identity-management","tag-ilm","tag-ilp","tag-information-systems-management","tag-management","tag-storage-tiering","tag-trust"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pKpIN-m6","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/1370","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/comments?post=1370"}],"version-history":[{"count":1,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/1370\/revisions"}],"predecessor-version":[{"id":7588,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/1370\/revisions\/7588"}],"wp:attachment":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/media?parent=1370"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/categories?post=1370"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/tags?post=1370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}