NetBackup and Veritas Appliances Hardening Guide
- Top recommendations to improve your NetBackup and Veritas appliances security posture
- Introduction
 - Keeping all systems and software updated
 - Enabling multifactor authentication
 - Increasing the appliance security level
 - Implementing an immutable data vault
 - Securing credentials
 - Reducing network exposure
 - Enabling encryption
 - Enabling catalog protection
 - Enabling malware scanning and anomaly detection
 - Enabling security observability
 - Restricting user access
 - Configuring a sign-in banner
 
 - Steps to protect Flex Appliance
- About Flex Appliance hardening
 - Managing single sign-on (SSO)
 - Managing user authentication with smart cards or digital certificates
 - About lockdown mode
 - Using network access control
 - Using an external certificate
 - Forwarding logs
 - Creating a NetBackup WORM storage server instance
 - Configuring an isolated recovery environment on a WORM storage server
 - Protecting the NetBackup catalog on a WORM storage server
 - Using a sign-in banner
 
 - Steps to protect NetBackup Appliance
- About NetBackup Appliance hardening
 - About single sign-on (SSO) authentication and authorization
 - About authentication using smart cards and digital certificates
 - Disable user access to the NetBackup appliance operating system
 - About Network Access Control
 - About data encryption
 - FIPS 140-2 conformance for NetBackup Appliance
 - About implementing external certificates
 - About forwarding logs to an external server
 - Creating the appliance login banner
 
 - Steps to protect NetBackup
- About NetBackup hardening
 - Configure NetBackup for single sign-on (SSO)
 - Configure user authentication with smart cards or digital certificates
 - Access codes
 - Workflow to configure immutable and indelible data
 - Add a configuration for an external CMS server
 - Configuring an isolated recovery environment on a NetBackup BYO media server
 - About FIPS support in NetBackup
 - Installing KMS
 - Workflow for external KMS configuration
- Validating KMS credentials
 - Configuring KMS credentials
 - Configuring KMS
 - Creating keys in an external KMS
 - Workflow to configure data-in-transit encryption
 
 - Workflow to use external certificates for NetBackup host communication
- About certificate revocation lists for external CA
 - Configuring an external certificate for the NetBackup web server
 - Configuring the primary server to use an external CA-signed certificate
 - Configuring an external certificate for a clustered primary server
 - Configuring a NetBackup host (media server, client, or cluster node) to use an external CA-signed certificate after installation
 - Configuration options for external CA-signed certificates
- ECA_CERT_PATH for NetBackup servers and clients
 - ECA_TRUST_STORE_PATH for NetBackup servers and clients
 - ECA_PRIVATE_KEY_PATH for NetBackup servers and clients
 - ECA_KEY_PASSPHRASEFILE for NetBackup servers and clients
 - ECA_CRL_CHECK for NetBackup servers and clients
 - ECA_CRL_PATH for NetBackup servers and clients
 - ECA_CRL_PATH_SYNC_HOURS for NetBackup servers and clients
 - ECA_CRL_REFRESH_HOURS for NetBackup servers and clients
 - ECA_DISABLE_AUTO_ENROLLMENT for NetBackup servers and clients
 - ECA_DR_BKUP_WIN_CERT_STORE for NetBackup servers and clients
 - MANAGE_WIN_CERT_STORE_PRIVATE_KEY option for NetBackup primary servers
 
 
 - Guidelines for managing the primary server NetBackup catalog
 - About protecting the MSDP catalog
 - How to set up malware scanning
 - About backup anomaly detection
 - Send audit events to system logs
 - Send audit events to log forwarding endpoints
 - Display a banner to users when they sign in
 
 
Synthetic backup
A synthetic backup can be a synthetic full or a synthetic cumulative backup. The images that are used to create the synthetic image are known as component images. For instance, the component images in a synthetic full backup are the previous full image and the subsequent incremental images. A typical NetBackup backup process accesses the client to create a backup. A synthetic backup is a backup image created without using the client. Instead, a synthetic backup process creates a full or a cumulative incremental image by using previously created backup images called component images. In the synthetic backup workflow, images are fetched from different source storage units, synthesized, and copied to a target storage unit.
The hosts that come into the picture are source media servers and target media server from the same domain.
Table: DTE mode is OFF in the image
Global DTE mode  | All NetBackup media server 9.1 and later with DTE mode  | Any NetBackup media server earlier than 9.1  | |
|---|---|---|---|
On  | Off  | ||
Preferred Off  | Data is not encrypted  | Data is not encrypted  | Data is not encrypted  | 
Preferred On  | Data is encrypted  | Data is not encrypted  | Data is not encrypted  | 
Enforced  | Data is encrypted  | Operation fails  | Operation fails  | 
Table: When DTE mode is On for any one of the images and media server DTE setting is On
Global DTE mode  | Host  | Value of the DTE_IGNORE_IMAGE_MODE configuration option  | ||
|---|---|---|---|---|
NEVER (default)  | WHERE_UNSUPPORTED  | ALWAYS  | ||
Preferred Off  | All NetBackup media server 9.1 or later  | Data is encrypted  | Data is encrypted  | Data is not encrypted  | 
Any NetBackup media server earlier than 9.1  | Operation fails  | Data is not encrypted  | Data is not encrypted  | |
Preferred On  | All NetBackup media server 9.1 or later  | Data is encrypted  | Data is encrypted  | Data is encrypted  | 
Any NetBackup media server earlier than 9.1  | Operation fails  | Data is not encrypted  | Data is not encrypted  | |
Enforced  | All NetBackup media server 9.1 or later  | Data is encrypted  | Data is encrypted  | Data is encrypted  | 
Any NetBackup media server earlier than 9.1  | Operation fails  | Operation fails  | Operation fails  | |
Note:
If DTE_IGNORE_IMAGE_MODE is set to ALWAYS, the DTE decision is as per the table - Table: DTE mode is OFF in the image.
Table: When the image DTE mode is On and the media server DTE setting on 10.0 or later is Off
Global DTE mode  | Value of the DTE_IGNORE_IMAGE_MODE configuration option  | ||
|---|---|---|---|
NEVER (default)  | WHERE_UNSUPPORTED  | ALWAYS  | |
Preferred Off  | Operation fails  | Operation fails  | Data is not encrypted  | 
Preferred On  | Operation fails  | Operation fails  | Data is not encrypted  | 
Enforced  | Operation fails  | Operation fails  | Operation fails  | 
Note:
If DTE_IGNORE_IMAGE_MODE is set to ALWAYS, the DTE decision is as per the table - Table: DTE mode is OFF in the image.
Note: