Veritas NetBackup™ Appliance Security Guide

Last Published:
Product(s): Appliances (4.0)
Platform: NetBackup Appliance OS
  1. About the NetBackup appliance Security Guide
    1.  
      About the NetBackup appliance Security Guide
  2. User authentication
    1. About user authentication on the NetBackup appliance
      1.  
        User types that can authenticate on the NetBackup appliance
    2. About configuring user authentication
      1.  
        Generic user authentication guidelines
    3.  
      About authenticating LDAP users
    4.  
      About authenticating Active Directory users
    5.  
      About authentication using smart cards and digital certificates
    6.  
      About authenticating Kerberos-NIS users
    7.  
      About the appliance login banner
    8. About user name and password specifications
      1.  
        About STIG-compliant password policy rules
  3. User authorization
    1.  
      About user authorization on the NetBackup appliance
    2. About authorizing NetBackup appliance users
      1.  
        NetBackup appliance user role privileges
    3.  
      About the Administrator user role
    4.  
      About the NetBackupCLI user role
    5.  
      About user authorization in NetBackup
  4. Intrusion prevention and intrusion detection systems
    1.  
      About Symantec Data Center Security on the NetBackup appliance
    2.  
      About the NetBackup appliance intrusion prevention system
    3.  
      About the NetBackup appliance intrusion detection system
    4.  
      Reviewing SDCS events on the NetBackup appliance
    5.  
      Running SDCS in unmanaged mode on the NetBackup appliance
    6.  
      Running SDCS in managed mode on the NetBackup appliance
  5. Log files
    1.  
      About NetBackup appliance log files
    2.  
      Viewing log files using the Support command
    3.  
      Where to find NetBackup appliance log files using the Browse command
    4.  
      Gathering device logs on a NetBackup appliance
    5.  
      Log Forwarding feature overview
  6. Operating system security
    1.  
      About NetBackup appliance operating system security
    2.  
      Major components of the NetBackup appliance OS
    3.  
      Vulnerability scanning of the NetBackup appliance
    4.  
      Disable user access to the NetBackup appliance operating system
    5.  
      Manage support access to the maintenance shell
  7. Data security
    1.  
      About data security
    2.  
      About data integrity
    3.  
      About data classification
    4. About data encryption
      1.  
        KMS support
  8. Web security
    1.  
      About SSL usage
    2.  
      Implementing third-party SSL certificates
  9. Network security
    1.  
      About IPsec Channel Configuration
    2.  
      About NetBackup appliance ports
    3.  
      About the NetBackup Appliance firewall
  10. Call Home security
    1. About AutoSupport
      1.  
        Data security standards
    2. About Call Home
      1.  
        Configuring Call Home from the NetBackup Appliance Shell Menu
      2.  
        Enabling and disabling Call Home from the appliance shell menu
      3.  
        Configuring a Call Home proxy server from the NetBackup Appliance Shell Menu
      4.  
        Understanding the Call Home workflow
    3. About SNMP
      1.  
        About the Management Information Base (MIB)
  11. Remote Management Module (RMM) security
    1.  
      Introduction to IPMI configuration
    2.  
      Recommended IPMI settings
    3.  
      RMM ports
    4.  
      Enabling SSH on the Remote Management Module
    5.  
      Replacing the default IPMI SSL certificate
  12. STIG and FIPS conformance
    1.  
      OS STIG hardening for NetBackup appliance
    2.  
      Unenforced STIG hardening rules
    3.  
      FIPS 140-2 conformance for NetBackup appliance
  13. Appendix A. Security release content
    1.  
      NetBackup Appliance security release content
  14.  
    Index

About NetBackup appliance operating system security

NetBackup appliances use the Veritas operating system (VxOS), which is a customized Linux operating system. Each NetBackup appliance software release includes the latest versions of VxOS and NetBackup software. In addition to regular security patches and updates, VxOS includes the following security enhancements and features:

  • An updated and trimmed Red Hat Enterprise Linux (RHEL)-based OS platform that enables the packaging and installation of all the necessary software components on a compatible and a robust hardware platform.

  • Hardening for VxOS based on security standards from the National Institute of Standards and Technology (NIST) and RHEL. Additional security is provided by Symantec Data Center Security (SDCS).

  • Symantec Data Center Security: Server Advanced (SDCS) intrusion prevention and intrusion detection software that hardens VxOS and protects the backup data by isolating and sandboxing each process and all system files.

  • Regular scan of the appliance with industry-recognized vulnerability scanners. Any discovered vulnerabilities are patched in regular releases of the appliance software and with emergency engineering binaries (EEBs). If security threats are identified between release schedules, you can contact Veritas Support for a known resolution.

  • Unused service accounts are removed or disabled.

  • VxOS includes edited kernel parameters that secure the appliance against attacks such as denial of service (DoS). For example, the sysctl setting net.ipv4.tcp_syncookies has been added to /etc/sysctl.conf configuration file to implement TCP SYN cookies.

  • Unnecessary runlevel services are disabled. VxOS uses runlevels to determine the services that should be running and to allow specific work to be done on the system.

  • FTP, telnet, and rlogin (rsh) are disabled. Usage is limited to ssh, scp, and sftp.

    Note:

    Starting with NetBackup Appliance release 3.1.2, the telnet packaged has been removed from VxOS to comply with the STIG feature when it is enabled on NetBackup appliances. The telnet protocol is not secure or encrypted. The use of an unencrypted transmission medium could allow an unauthorized user to steal credentials. The ssh package provides an encrypted session and stronger security, and is included in VxOS.

  • TCP forwarding for SSH is disabled with the addition of AllowTcpForwarding no and X11Forwarding no to /etc/ssh/sshd_config.

  • IP forwarding is disabled in VxOS and does not allow routing on the TCP/IP stack. This feature prevents a host on one subnet from using the appliance as a router to access a host on another subnet.

  • NetBackup appliances do not allow IP aliasing (configuring multiple IP addresses) on the network interface. This feature prevents access to multiple network segments on one NIC port.

  • The UMASK value determines the file permission for newly created files. It specifies the permissions that should not be given by default to the newly created file. Although the default value of UMASK in most UNIX systems is 022, UMASK is set to 077 for the NetBackup appliance.

  • The permissions of all the world-writable files that are found in VxOS are searched and fixed.

  • The permissions of all the orphaned and unowned files and directories that are found in VxOS are searched and fixed.

  • Starting with software version 3.1, SMBv1 protocol has been disabled and replaced with SMBv2 protocol. SMBv1 protocol is vulnerable to ransomware attacks such as WannaCry and Petya, and is no longer considered as secure. SMBv2 is now the minimum supported protocol for NetBackup appliances.