T
T
Terehoff2012-03-29 20:21:25
Computer networks
Terehoff, 2012-03-29 20:21:25

Where to store a small company file server?

I was puzzled by the issue of safe storage of information on the server (so that in the event of a search, the server would not be taken away). On the one hand, you need to drive a lot of information, on the other hand, away from the office. The internet in the office is not very fast. There was an idea - to hang the server under a false ceiling, but there is still a chance of detection during a search. I welcome any ideas)

Answer the question

In order to leave comments, you need to log in

15 answer(s)
A
Antelle, 2012-03-29
@Antelle

IMHO, it is better not to hide from a search in a “physical” way. Make backups, store them in the cloud, put them on a TrueCrypt server and keep it calmly in the office.

N
Naps, 2012-03-29
@Naps

What is the budget for solving the problem?

M
Monnoroch, 2012-03-29
@Monnoroch

Brick into the wall!
But seriously, the cloud will not work?

D
da0c, 2012-03-29
@da0c

I join the above - TrueCrypt + backups in the cloud. The server is hidden and accessible only via radio. Pgp container TrueCrypt can be placed on the virtual disk of the server, so turning off the power erases the information.
Some nuances.
Backups can be stored not in the cloud, but at home with a trusted person.
Power off can be arranged like this. We put a big but fake server - something like Dual PII / PIII on a fullsized motherboard, booted from a live media. During the search, it is seized first. As soon as the real server stops pinging the fake server, it also turns off/encrypts... By the
way, thermite secrets on the screw that are triggered when the case is opened can also be considered as an option, it seems that there is something Chinese-serial on this topic on dilekstreme.

N
Naps, 2012-03-29
@Naps

Real life examples:
1) Business center in the center of Moscow. Agreed (through acquaintances) with the regional provider that we host a server with them, and a radio channel from a neighboring building to the office.
2) 3) Rented premises for warehouses on another floor (in the basement). For complete secrecy, rent them at Horns and Hooves.
4) Powerful laptop. In which case, it is placed in a briefcase and yells that this is personal property and they do not have the right to inspect.
As for the termite (if I understand correctly), I do not recommend it - this is an obstacle to the investigation . Explicit.

M
moderatorh, 2012-03-30
@moderatorh

Trucrypt for partitioning and backups in the clouds is a very sound idea, but do not forget that thermorectal cryptanalysis truly works wonders! And alas, every second, if not more, of experienced analysts in the police. Therefore, the main protection for you as an employee of this company and the director will be the creation of protection from the application of this very analysis to you and other employees, and perhaps this is when you create such a scheme in which you can convince analysts on your fingers that it is completely impossible to get access to information.

A
alexeyanikanov, 2012-03-29
@alexeyanikanov

If possible, you can try to find a small room in the same building where the main office is located. If the building was built in Soviet times, there is a high probability that there will be semi-basement and (or) utility rooms. Communication via WIFI.

D
da0c, 2012-03-30
@da0c

Continuation about secrets - after all, these are not termites, but electromagnetic boxes for magnetically erasing information from hard on command. By the way, domestic production, they cost $ 1,500, but they fit into the indicated budget - Roll . The secret, including, can be triggered by the opening date.

N
Nikolai Turnaviotov, 2012-03-31
@foxmuldercp

and not a single comment with a general meaning:
a) either it’s not good to work in such a dark office
b) work in such a way as not to violate the laws.

A
Alexander Kunin, 2012-04-01
@skyksandr

It's been a long time since I read the idea, I don't remember where. Comes from "the most hidden place is the most visible place."
So - take a motherboard without LEDs, a PSU without a cooler, percent + passive cooling, a couple of hard ones.
All this is put on a table without a case, a soldering iron, solder and rosin are very close. A working mess is induced, you can print a couple of schemes and also throw them nearby.

Y
yadenisenko, 2012-03-29
@yadenisenko

I heard about the idea of ​​placing a data center in the earth's orbit, no one will get it there. :)

R
rPman, 2012-03-30
@rPman

The problem as I understand it is only with the data? Calculations will be carried out by the server itself (let virtaulets run on it)
Gigabit network and distributed file system in containers encrypted with multiple duplication - files on all user machines (lvm raid / distributed system using drbd / access to smb containers), files should be formatted as custom pron.avi, it is also more reliable to work with supposedly system files (for example, pagefile.sys and hiberfil.sys are always on the system disk, they contain garbage, it is not necessary to use, people will not even be aware of it).
Starting processes on the server only manually using a trusted person's flash drive
ps Also, in 90% of cases it is enough to cram more RAM into the server and keep working images there (with on-the-fly backup to the network).

N
netwatcher, 2012-03-30
@netwatcher

In one office where I once worked, it was done like this: a certain room was rented in another part of the city, where all the secret servers were transported, which were given a range of addresses from the 10.0.0.0 subnet, and which did not ping from any office, while this terminal people could connect to them. The Sapsan systems were also used , and as soon as the security guard pressed the button during the visit of uninvited guests to the office in one part of the city, the servers themselves turned off in another part of the city.

Z
Zloy1, 2012-03-30
@Zloy1

The task is divided into parts:
1. place the server nearby, where it is difficult to find it and from where it cannot be taken quickly, so that there is time to perform the cleaning procedure
2. make a backup of the server to where it cannot be physically taken away in principle (cloud)
3 . organize daily access to the server and backup using a separate working key for employees
4. implement an automatic cleaning procedure at the touch of a panic button, including compromising the working key (passwords) of employees, cleaning the server and preparing it for safe transfer to analysts, which will be required if it is detected .
5. give a separate spare key for accessing backups to someone who is not available for rectal cryptanalysts (put in a cell in Cyprus)
ps
And no secrets, so that there is not even a hint of your disloyalty.
Panic buttons can be distributed to the system administrator, director, accountant, security officer. The button can simply be a call to a friend.

N
Nikolai Turnaviotov, 2012-03-30
@foxmuldercp

I remember how under the rack of servers in some office there was a shaft along which magnets went.
in which case a button is pressed and the storage rack passes inside powerful magnets.
In general, if serious show masks arrive, the first thing is to block the connection with a gsm / 3g network / wifi jammer and cut off the channels to the Internet. The guys I knew told me that a car with such a good antenna came to the neighboring office, after which the mobile connection said “Oh!” and ended before the end of the promotion.
and the problems of the Internet ended with a power outage.
God knows, but if it's that serious...

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question