Data Domain Retention Lock
Data Domain Retention Lock
Abstract
Enterprises continue to see an exponential growth in the
structured and unstructured data that is proliferating across
their primary storage systems. Customers realize that the
majority of this data is seldom accessed; yet they cannot delete
this data given the compliance retention requirements for
business records. As organizations drive formal adoption of
archiving, IT administrators need cost-effective ways for their
fast-growing archive storage needs, including compliance
retention. This white paper introduces the EMC Data Domain
Retention Lock software that provides immutable file locking
and data retention capabilities to meet a broad class of
corporate governance and regulatory compliance (SEC 17a-4(f))
standards of archive data stored on Data Domain systems.
EMC DATA DOMAIN RETENTION LOCK
SOFTWARE
A DETAILED REVIEW
2
EMC Data Domain Retention Lock
A Detailed Review
March 2013
Copyright 2013 EMC Corporation. All Rights Reserved.
EMC believes the information in this publication is accurate as
of its publication date. The information is subject to change
without notice.
The information in this publication is provided as is. EMC
Corporation makes no representations or warranties of any kind
with respect to the information in this publication, and
specifically disclaims implied warranties of merchantability or
fitness for a particular purpose.
Use, copying, and distribution of any EMC software described in
this publication requires an applicable software license.
For the most up-to-date listing of EMC product names, see EMC
Corporation Trademarks on EMC.com.
VMware is a registered trademarks or trademarks of VMware,
Inc. in the United States and/or other jurisdictions. All other
trademarks used herein are the property of their respective
owners.
Part Number h10666
3
EMC Data Domain Retention Lock
A Detailed Review
Tabl e of Contents
Executi ve Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Audience ........................................................................................................................... 5
I ntroducti on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Secure Retenti on of Archi ve Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Governance Archive Data Requirements ............................................................................. 6
Compliance Archive Data Requirements ............................................................................. 6
Typi cal Depl oyment Envi ronments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Data Domai n Retenti on Lock Software Overvi ew . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Consolidate Governance and Compliance Archive Data ...................................................... 8
File Locking Protocol .......................................................................................................... 9
Data Domai n Retenti on Lock Governance Edi ti on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
System Management ....................................................................................................... 12
Data Domai n Retenti on Lock Compl i ance Edi ti on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Dual Sign-On Requirements .......................................................................................... 13
Secure System Clock ........................................................................................................ 15
Audit Logging ................................................................................................................... 15
Regulatory Compliance Standards .................................................................................... 16
Technical Assessment ...................................................................................................... 16
Supported Protocol s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Consi derati ons for Repl i cati ng Archi ve Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
DD Retention Lock Governance and Replication ............................................................... 18
DD Retention Lock Compliance and Replication ............................................................... 19
DD Retention Lock and DD Extended Retention ................................................................ 20
Concl usi on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
4
EMC Data Domain Retention Lock
A Detailed Review
Executi ve Summary
Across the industry, enterprises continue to see an exponential growth in the
structured and unstructured data that is proliferating across their primary storage
systems. Customers realize that the majority of this data (as it ages with time) is not
accessed often, yet they cannot delete this data because corporate governance and
regulatory compliance (SEC17a-4(f)) standards mandate that data for business
records must be securely retained for long periods of time (see Figure 1). As a result,
companies are rapidly adopting formal archiving processes so much so that the
disk-based archiving market is forecasted to grow at a ~35% CAGR
1
from 2010
through 2015.
Fi gure 1: Archi ve appl i cati ons appl y secure retenti on attri butes
Almost all of enterprise data ranging from applications for processing content such as
HR records or insurance document to traditional file/email records fall under strict
retention guidelines. In addition, compliance retention policies continue to expand to
include a broader variety of structured and unstructured data types. For optimal
storage efficiency and data protection, customers require an archive storage system
with:
- Support for both governance and compliance archive data with multiple
retention periods on a single system
- Support for majority of regulatory compliance standards including Security
and Exchange Commission (SEC), Sarbanes-Oxley (SOX), Commodity Futures
Trading Commission (CFTC), Food and Drug Administration (FDA), etc.
- Support for industry standard protocols (such as CIFS, NFS) for seamless
integration with leading archive applications across various archive segments
of file archive, email archive, enterprise content management (ECM) archive,
database archive, etc.
- Next-generation protection storage that
o Reduces the archive storage requirement with native compression and
inline deduplication technology
1
IDC Report #230762, Archive Disk Based Storage Market: IDC WW Archival Storage Solutions 2010 2015 Forecast.
5
EMC Data Domain Retention Lock
A Detailed Review
o Preserves all the data on the platform built of storage of last resort
with the Data Domain Data Invulnerability Architecture
o Enables consolidation of backup and archive data on a single system
o Enables offsite protection via network-efficient replication
EMC Data Domain Retention Lock
Data Domain