3.2 Securing Sentinel Data

Because of the highly sensitive nature of data in Sentinel, you must keep the computer physically secure and in a secure area of the network. To collect data from event sources outside the secure network, use Collector Managers. For more information, see the Sentinel Installation and Configuration Guide.

Sentinel is compatible with disk encryption technologies. These technologies provide a higher level of data privacy when they are used on file systems where Sentinel stores its data. However, software-based encryption technologies, such as dm-crypt, have a significant CPU overhead, and they can dramatically reduce the performance of Sentinel by 50% or more. However, hardware-based encryption technologies have a much lower impact on the performance of the rest of the system and are available from leading hard drive manufacturers.