Security - Fujitsu ETERNUS DX200 S3 Configuration Manual

Disk storage system
Hide thumbs Also See for ETERNUS DX200 S3:
Table of Contents

Advertisement

Chapter 11
Solution Configuration
11.5

Security

11.5
Security
Solution Overview
Unauthorized access can be monitored by using the ETERNUS DX Disk storage system's audit log collection
and transfer function. Use acquired audit log information as audit trail information to monitor and track sus-
picious operations and access.
Centralized administrative control of SED authentication keys in an external server can be performed by link-
ing with the key server. Even if a data drive in the ETERNUS DX Disk storage system is stolen, data leakage
can be prevented by safely storing the authentication key. Automatic updating of the authentication key on
a periodic basis also enhances the security of the entire system.
System administrator
Configuration Procedure
Use the ETERNUS DX Disk storage system to enable the audit log transmission function and to register the
Syslog server as the destination to which audit logs are sent.
When key management server linkage is used, set up SED key management in the operation management
server (ETERNUS SF KM). Use the ETERNUS DX Disk storage system to create a key group and to register the
key server. Keys are created in the operation management server. The ETERNUS DX Disk storage system re-
quests the key to be extracted from the operation management server or requests the key to be updated
when required.
Required Environment
A Syslog sever is required for the destination for the transmission of the audit log that is collected.
Note that ETERNUS SF KM is required when linking with the key management server.
FUJITSU Storage ETERNUS DX100 S3/DX200 S3 Disk storage system Configuration Guide (Basic)
Information such as
Log in
the storage system name,
the user information,
Change settings
the process time,
Log out
the process details,
and the process results
Audit log
ETERNUS DX Disk storage system
Key groups
SED
SED
SED
RAID group #0
SED
SED
SED
RAID group #1
Copyright 2014 FUJITSU LIMITED
Syslog server
SED
SED
184
Audit logs are used
- as audit information when
system audits are performed
- to monitor and report the
storage system status
Auditor
Management LAN
ETERNUS SF KM
Key server
The authentication key is
updated periodically according
to the specified schedule
P3AM-7652-02ENZ0

Advertisement

Table of Contents
loading

This manual is also suitable for:

Eternus dx100 s3

Table of Contents