Questions tagged [storage]
Details on how data is being kept in memory/on disks, most frequently being applied to databases, media banks and backup-recovery solutions.
258 questions
3
votes
1
answer
165
views
Is a write-cache in my Synology NAS exposing unencrypted data?
I have encrypted mounts in my Synology DS 918+ and I'm using an additional SSD leftover as a write-cache.
When I have an encrypted directory mounted, are there unencrypted bits stored on the SSD?
Do ...
0
votes
1
answer
194
views
Reasonable model for Storing credentials for use in scripts
I was reading question 180243 which states that using a password vault is the best option for credential storage.
However this is rather cumbersome to setup. For a lower security use case (so no PII ...
0
votes
1
answer
260
views
Is encrypt a private key using the user password and store it into the server a bad idea?
I'm building a SaaS where some data needs to be stored in an encrypted format.
You should be able to access this data from any device, as long as you remember your account credentials.
Also, if you ...
1
vote
1
answer
124
views
Is it safe to store harmful files to storage like AWS S3?
I am new to security topics, please don't assume knowledge and spare no details if you're able to answer my questions.
I am trying to design a system that performs the basic functionality of ...
2
votes
1
answer
223
views
TLS certificates on a network drive/storage
For educational purposes, I am assembling a private network to act as a small sized company using BIND9 and OpenLDAP on FreeBSD 14.1 machines.
The private networks' DNS servers, NS1 on 172.21.0.20 and ...
2
votes
0
answers
424
views
User token in command line tool
I'm trying to build a cli tool for an application that provides a web-based API. The use-case is to allow performing common tasks through a command-line client, and perform quick admin actions from a ...
0
votes
2
answers
277
views
Clean wipe of USB stick of any hidden codes
If I purchase a supposedly brand new USB stick (or micros SD, or similar portable storage devices) online, and I don't quite know the origin where they are produced, and I am a bit paranoid, is there ...
2
votes
2
answers
238
views
Reliably destroy all information on magnetic disk through digital medium
In a scenario where a person wants to give away their device (magnetic disk included), leaving the disk usable for the receiver, how might that person go about destroying ALL data (except firmware) on ...
1
vote
1
answer
177
views
Do I need to protect my Azure Blobstorage with a WAF if all the contents inside are for public consumption?
Company policy states that all internet-facing components must be protected with a WAF. However, I have an Azure Blobstorage that stores public web assets. I don't think putting it behind a WAF makes ...
1
vote
1
answer
2k
views
What are the best practices to safely store OAuth2 tokens in a database?
I'm building a website with Patreon integration and I have identified the need to store Patreon user's OAuth2 token in the database. I'm wondering what's the best way to do that, security-wise. Some ...
0
votes
1
answer
394
views
Security considerations and differences between Bare metal and Virtualization
I'm currently working on a server. This server is meant to be converged, as in be my storage server and the place publicly accessible services run on. Services like some API's in docker or k8s and ...
2
votes
2
answers
1k
views
Where or how to persist a decryption key in a React app?
I'm making a web application on the MERN stack which stores sensitive user data, in the form of a big block of text.
The encryption method I am using is that when a user registers, a random key is ...
0
votes
2
answers
1k
views
Strategy for storing private keys used in an embedded device
I am developing an embedded device using a bootloader. This means that the device will store in its flash an encryption key for decrypting update packages and an ECC public key for verifying update ...
0
votes
1
answer
2k
views
Size overhead of encryption approximation
Is there some rough analysis or estimation of how much overhead in bytes an encryption using a public key could add to the final object?
3
votes
1
answer
253
views
Storage options would give the organization the best chance of recovering data
I am studying information security, I have a question that I need help with.
Which of the following storage options would give the organization the
best chance of recovering data?
A. Encrypted ...