2 Secure Installation

This chapter outlines the planning process for a secure installation and describes several recommended deployment topologies for the systems.

Understand Your Environment

To better understand security needs, the following questions must be asked:

Which resources need to be protected?

You can protect many of the resources in the production environment. Consider the type of resources that you want to protect when determining the level of security to provide.

When using DIVArchive, protect the following resources:

Primary Data Disk

There are Data disk and Cache Disk resources used to build DIVArchive systems. They are typically local or remote disks connected to the DIVArchive systems. Independent access to these disks (other than by DIVArchive) presents a security risk. This type of external access might be from a rogue system that reads or writes to these disks, or from an internal system that accidentally provides access to these disk devices.

Database Disk, Metadata Disk, and Backup Disks

There are Database Disk, Metadata Disk and Backup Disk resources used to build DIVArchive systems with complex objects. They are typically local or remote disks connected to the DIVArchive systems. Independent access to these disks (other than by DIVArchive) presents a security risk. This type of external access might be from a rogue system that reads or writes to these disks, or from an internal system that accidentally provides access to these disk devices.

DIVArchive Tapes

It is a security risk to allow independent access to tapes, typically in a tape library controlled by DIVArchive systems, where data is written.

Export Tape Metadata

Tape Metadata dumps that are created from export operation contain data and metadata. This data and metadata permissions must be restricted to only the Administrator (or Root) operating system account, or the DIVA operating system user (or group) during a routine export or import activity.

Configuration Files and Settings

DIVArchive system configuration settings must be protected from operating system level non-administrator users. Making the configuration files writable to non-administrative operating system users presents a security risk, therefore, these file permissions must be restricted to only the Administrator (or Root) operating system account, or the DIVA operating system user (or group).

From whom are the resources being protected?

In general, the resources described in the previous section must be protected from all non-administrator access on a configured system, or from a rogue external system that can access these resources through the WAN or FC fabric.

What will happen if the protections on strategic resources fail?

Protection failures against strategic resources can range from inappropriate access (that is, access to data outside of normal DIVArchive operations) to data corruption (writing to disk or tape outside of normal permissions).

Recommended Deployment Topologies

This section describes how to install and configure an infrastructure component securely.For information about installing DIVArchive, refer to DIVArchive 7.4 Customer Documentation Library at:

https://docs.oracle.com/en/storage/#csm

Consider the following points when installing and configuring DIVArchive:

Separate Metadata Network

For connection between DIVArchive services components with one another, Connection to Metadata Database and the connection from its clients, provide a separate TCP/IP network and switch hardware that is not connected to any WAN. Because the metadata traffic is implemented by using TCP/IP, an external attack on this traffic is theoretically possible. Configuring a separate metadata network mitigates this risk and also provides enhanced performance. If a separate network is infeasible, at least deny traffic to the DIVArchive ports from the external WAN and any untrusted hosts on the network. See Restrict Network Access to Critical Services.

FC Zoning

Use FC zoning to deny access to the DIVArchive disks connected through fibre channel from any server that does not require access to the disks. Preferably, use a separate FC switch to physically connect only to the servers that require access.

Safeguard SAN Disks Configuration Access

SAN RAID disks can usually be accessed for administrative purposes through TCP/IP or more typically HTTP. You must protect the disks from external access by limiting the administrative access to SAN RAID disks to systems only within a trusted domain. Also, change the default password on the disk arrays.

Install the DIVArchive Package

First, install only those DIVArchive services that you require. For example, if you do not plan to run the GUI or Configuration Utility from a system uncheck them in the list of components to be installed during installation. The default DIVArchive installation directory permissions and owners must be restricted to only the Administrator (or Root) account, or the DIVA operating system user (or group).

DIVArchive Tape Security

Prevent external access to DIVArchive tapes inside a Tape library controlled by the DIVArchive system. Unauthorized access to DIVArchive tapes can compromise or destroy user data.

Backups

Set up and perform database backups using the DIVArchive Backup service. Permissions for the Backup dump must be restricted to only the Administrator (or Root) operating system account, or the DIVA operating system user (or group).

Postinstallation Configuration

After installing any of the DIVArchive, go through the security checklist in Appendix A.