2 Secure Installation

This section outlines the planning process for a secure installation and describes several recommended deployment topologies for the systems. The VSM GUI User Guide 1.0 covers installation, configuration, and administration in detail.

Understand Your Environment

To better understand security needs, the following questions must be asked:

Which resources need to be protected?

For VSM GUI the host server and the associated network must be protected from unauthorized access

From whom are the resources being protected?

VSM GUI must be protected from everyone on the Internet, external users, and unauthorized internal users.

What will happen if the protections on strategic resources fail?

As VSM GUI is a virtual storage resource monitoring and usage application, unauthorized access to VSM GUI can affect VSM resources availability. The state of a resource can be affected, but the data residing on the storage resources will not be affected.

Installing StorageTek VSM GUI

VSM GUI should only be installed on systems that are within the same protected (firewalled) network infrastructure as the monitored virtual resources (that is, VTCS and HSC). Customer access controls should be enforced on the systems where VSM GUI is installed to assure restricted access to the application.

Refer to the VSM GUI User Guide for installation instructions.

Post Installation Configuration

There are no post-installation configuration security changes. The configuration is set by the customer during installation.

Assign the user (admin) password

The customer administration account password is set by the customer during the installation.

Enforce password management

Customer Corporate password management rules such as password length, history, and complexity must be applied to the administrator password.