NetBackup and Veritas Appliances Hardening Guide
- Top recommendations to improve your NetBackup and Veritas appliances security posture
- Introduction
 - Keeping all systems and software updated
 - Enabling multifactor authentication
 - Increasing the appliance security level
 - Implementing an immutable data vault
 - Securing credentials
 - Reducing network exposure
 - Enabling encryption
 - Enabling catalog protection
 - Enabling malware scanning and anomaly detection
 - Enabling security observability
 - Restricting user access
 - Configuring a sign-in banner
 
 - Steps to protect Flex Appliance
- About Flex Appliance hardening
 - Managing single sign-on (SSO)
 - Managing user authentication with smart cards or digital certificates
 - About lockdown mode
 - Using network access control
 - Using an external certificate
 - Forwarding logs
 - Creating a NetBackup WORM storage server instance
 - Configuring an isolated recovery environment on a WORM storage server
 - Protecting the NetBackup catalog on a WORM storage server
 - Using a sign-in banner
 
 - Steps to protect NetBackup Appliance
- About NetBackup Appliance hardening
 - About single sign-on (SSO) authentication and authorization
 - About authentication using smart cards and digital certificates
 - Disable user access to the NetBackup appliance operating system
 - About Network Access Control
 - About data encryption
 - FIPS 140-2 conformance for NetBackup Appliance
 - About implementing external certificates
 - About forwarding logs to an external server
 - Creating the appliance login banner
 
 - Steps to protect NetBackup
- About NetBackup hardening
 - Configure NetBackup for single sign-on (SSO)
 - Configure user authentication with smart cards or digital certificates
 - Access codes
 - Workflow to configure immutable and indelible data
 - Add a configuration for an external CMS server
 - Configuring an isolated recovery environment on a NetBackup BYO media server
 - About FIPS support in NetBackup
 - Installing KMS
 - Workflow for external KMS configuration
- Validating KMS credentials
 - Configuring KMS credentials
 - Configuring KMS
 - Creating keys in an external KMS
 - Workflow to configure data-in-transit encryption
 
 - Workflow to use external certificates for NetBackup host communication
- About certificate revocation lists for external CA
 - Configuring an external certificate for the NetBackup web server
 - Configuring the primary server to use an external CA-signed certificate
 - Configuring an external certificate for a clustered primary server
 - Configuring a NetBackup host (media server, client, or cluster node) to use an external CA-signed certificate after installation
 - Configuration options for external CA-signed certificates
- ECA_CERT_PATH for NetBackup servers and clients
 - ECA_TRUST_STORE_PATH for NetBackup servers and clients
 - ECA_PRIVATE_KEY_PATH for NetBackup servers and clients
 - ECA_KEY_PASSPHRASEFILE for NetBackup servers and clients
 - ECA_CRL_CHECK for NetBackup servers and clients
 - ECA_CRL_PATH for NetBackup servers and clients
 - ECA_CRL_PATH_SYNC_HOURS for NetBackup servers and clients
 - ECA_CRL_REFRESH_HOURS for NetBackup servers and clients
 - ECA_DISABLE_AUTO_ENROLLMENT for NetBackup servers and clients
 - ECA_DR_BKUP_WIN_CERT_STORE for NetBackup servers and clients
 - MANAGE_WIN_CERT_STORE_PRIVATE_KEY option for NetBackup primary servers
 
 
 - Guidelines for managing the primary server NetBackup catalog
 - About protecting the MSDP catalog
 - How to set up malware scanning
 - About backup anomaly detection
 - Send audit events to system logs
 - Send audit events to log forwarding endpoints
 - Display a banner to users when they sign in
 
 
Configuration options for external CA-signed certificates
To configure a NetBackup primary server, media server, or client to use external CA-signed certificate for host communication, you must define certain configuration options in the  NetBackup configuration file (bp.conf on UNIX platform or Windows registry).
For external certificate configuration, for file-based certificates, the following configuration options are mandatory:
ECA_CERT_PATH
ECA_TRUST_STORE_PATH
ECA_PRIVATE_KEY_PATH
If the private key of the external certificate is encrypted, ECA_KEY_PASSPHRASEFILE is also mandatory:
For Windows certificate store, the following configuration options are mandatory:
ECA_CERT_PATH
The following options are optional:
ECA_CRL_CHECK
If the option is set to DISABLE (or 0) the ECA_CRL_PATH option is ignored and revocation status of a peer host's certificate is not verified.
If the option is set to a value other than DISABLE and 0, revocation status of a peer host's certificate is verified based on ECA_CRL_PATH.
ECA_DR_BKUP_WIN_CERT_STORE
For Windows certificate store, specify this option if you want to backup the external certificates during catalog backup.
ECA_CRL_PATH_SYNC_HOURS
This option is used when ECA_CRL_CHECK is enabled and ECA_CRL_PATH is defined.
ECA_CRL_REFRESH_HOURS
This option is used when ECA_CRL_CHECK is enabled, but ECA_CRL_PATH is not defined (when CDP is used as a CRL source).