There is no golden rule on what a typical implementation and deployment process for data protection and specifically for Bloombase StoreSafe. Nevertheless there are some major milestones and checkpoints below which can serve for customer's reference:
Preparation
- Classify the data: secret, sensitive, unclassified, etc
- Evaluate data protection requirements and decide on the type of encryption, cipher algorithms, bit length, access control policies, etc
- Evaluate sizing of hardware appliance or resource allocation for virtual appliance deployment
- Evaluate service level of the system being protected and decide whether the need on a high availability (HA) configuration and the need for Bloombase Quorum setting
- Evaluate key management requirements and decide whether a hardware security module (HSM), standalone Bloombase KeyCastle or simply the built-in KeyCastle
- Carry out proof-of-concept test on a testing environment to evaluate feasibility and actual sizing
- System functional, integration and stress testing
Deployment
- Install and configure Bloombase StoreSafe
- Build Bloombase StoreSafe HA cluster if needed
- Install and configure Bloombase KeyCastle cluster
- Build Bloombase KeyCastle HA cluster if needed
- Integrate StoreSafe and key management tool (KeyCastle or third party HSM)
- Key generation
- StoreSafe storage encryption resource provisioning
- Access control provisioning
- Data backup
- Data migration and initial encryption
- System functional, integration and QA testing