General Aspects of Security

The main aspects to STA security are: physical, network, user access, and server access.

Physical

STA must be installed on a standalone server within an organization's data center. Physical access to the server would be dictated by the customer company policy.

Network

It is required that STA be added or configured to a customer internal firewall-protected network. This network needs SSH and SNMPv3 access to libraries for which data will be accessed.

To use the user interface, you need HTTPS access.

To enable optional log bundle forwarding to StorageTek Service Delivery Platform (SDP), a connection to the SDP host is also required within the customer internal firewall-protected network.

User Access

The STA application access is controlled by user name and password authentication. User names and passwords are set up during initial installation by the customer. Passwords must meet Oracle standard requirements.

Server Access

STA requires an OS level Oracle user for installation and runtime access.

You should limit the access to the server, especially super users (root), which could affect the STA application, functionality, and services.