Ssd Rules; Ssd Management - Cisco 300 Series Administration Manual

Managed switch
Hide thumbs Also See for 300 Series:
Table of Contents

Advertisement

Security: Secure Sensitive Data Management

SSD Rules

SSD Rules
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)
SSD grants read permission to sensitive data only to authenticated and authorized users, and
according to SSD rules. A device authenticates and authorizes management access to users
through the user authentication process.
Whether or not SSD is used, it is recommended that the administrator secure the
authentication process by using the local authentication database, and/or secure
the communication to the external authentication servers used in the user
authentication process.
In summary, SSD protects sensitive data on a device with SSD rules, SSD properties, and user
authentication. And SSD rules, SSD properties, and user authentication configurations of the
device are themselves sensitive data protected by SSD

SSD Management

SSD management includes a collection of configuration parameters that define
the handling and security of sensitive data. The SSD configuration parameters
themselves are sensitive data and are protected under SSD.
All configuration of SSD is performed through the SSD pages that are only
available to users with the correct permissions (see
SSD rules define the read permissions and default read mode given to a user
session on a management channel.
An SSD rule is uniquely identified by its user and SSD management channel.
Different SSD rules might exist for the same user but for different channels, and
conversely, different rules might exist for the same channel but for different users.
Read permissions determine how sensitive data can be viewed: in only encrypted
form, in only plaintext form, in both encrypted or plaintext, or no permission to view
sensitive data. The SSD rules themselves are protected as sensitive data.
A device can support a total of 32 SSD rules.
A device grants a user the SSD read permission of the SSD rule that best matches
the user identity/credential and the type of management channel from which the
user is/will access the sensitive data.
A device comes with a set of default SSD rules. An administrator can add, delete,
and change SSD rules as desired.
.
SSD
Rules).
21
439

Advertisement

Table of Contents
loading

Table of Contents