NetBackup and Veritas Appliances Hardening Guide
- Top recommendations to improve your NetBackup and Veritas appliances security posture- Introduction
- Keeping all systems and software updated
- Enabling multifactor authentication
- Enabling multiperson authorization
- Increasing the security level
- Implementing an immutable data vault
- Securing credentials
- Reducing network exposure
- Enabling encryption
- Enabling catalog protection
- Enabling malware scanning and anomaly detection
- Enabling security observability
- Restricting user access
- Configuring a sign-in banner
 
- Steps to protect Flex Appliance- About Flex Appliance hardening
- Managing multifactor authentication
- Configuring the multi-factor authentication on NetBackup primary and media server instance
- Configuring the multi-factor authentication on NetBackup WORM storage server instance
- Managing single sign-on (SSO)
- Managing user authentication with smart cards or digital certificates
- About lockdown mode
- Using network access control
- Using an external certificate
- Forwarding logs
- Creating a NetBackup WORM storage server instance
- Configuring an isolated recovery environment using the web UI
- Protecting the NetBackup catalog on a WORM storage server
- Using a sign-in banner
 
- Steps to protect NetBackup Appliance- About NetBackup Appliance hardening
- About multifactor authentication
- About single sign-on (SSO) authentication and authorization
- About authentication using smart cards and digital certificates
- Disable user access to the NetBackup appliance operating system
- About Network Access Control
- About data encryption
- FIPS 140-2 conformance for NetBackup Appliance
- About implementing external certificates
- About antimalware protection
- About forwarding logs to an external server
- Creating the appliance login banner
 
- Steps to protect NetBackup- About NetBackup hardening
- About multifactor authentication
- Configure NetBackup for single sign-on (SSO)
- Configure user authentication with smart cards or digital certificates
- Workflow to configure multi-person authorization for NetBackup operations
- Access codes
- Workflow to configure immutable and indelible data
- Add a configuration for an external CMS server
- Configuring an isolated recovery environment on a NetBackup BYO media server
- About FIPS support in NetBackup
- Installing KMS
- Workflow for external KMS configuration- Validating KMS credentials
- Configuring KMS credentials
- Configuring KMS
- Creating keys in an external KMS
- Workflow to configure data-in-transit encryption
 
- Workflow to use external certificates for NetBackup host communication- About certificate revocation lists for external CA
- Configure an external certificate for the NetBackup web server
- Configuring the primary server to use an external CA-signed certificate
- Configuring an external certificate for a clustered primary server
- Configuring a NetBackup host (media server, client, or cluster node) to use an external CA-signed certificate after installation
- Configuration options for external CA-signed certificates- ECA_CERT_PATH for NetBackup servers and clients
- ECA_TRUST_STORE_PATH for NetBackup servers and clients
- ECA_PRIVATE_KEY_PATH for NetBackup servers and clients
- ECA_KEY_PASSPHRASEFILE for NetBackup servers and clients
- ECA_CRL_CHECK for NetBackup servers and clients
- ECA_CRL_PATH for NetBackup servers and clients
- ECA_CRL_PATH_SYNC_HOURS for NetBackup servers and clients
- ECA_CRL_REFRESH_HOURS for NetBackup servers and clients
- ECA_DISABLE_AUTO_ENROLLMENT for NetBackup servers and clients
- ECA_DR_BKUP_WIN_CERT_STORE for NetBackup servers and clients
- MANAGE_WIN_CERT_STORE_PRIVATE_KEY option for NetBackup primary servers
 
 
- Guidelines for managing the primary server NetBackup catalog
- About protecting the MSDP catalog
- How to set up malware scanning
- About backup anomaly detection
- Send audit events to system logs
- Send audit events to log forwarding endpoints
- Display a banner to users when they sign in
 
Replication
If the MSDP storage server is used for replication, the following considerations need to be reviewed:
- The Data-in-transit (DTE) encryption feature is not integrated with MSDP storage for replication workflows and it is controlled by the OPTDUP_ENCRYPTION flag in pd.conf. 
- The job DTE mode depends on the image DTE mode or the global DTE setting of the source domain. 
- The correct values must be set for the DTE configuration settings and the OPTDUP_ENCRYPTION flag for the source and target domains. 
For details on enabling encryption using MSDP, see the NetBackup Deduplication Guide.
Table: The image DTE mode is Off
| Global DTE mode | Media server 9.1 or later with DTE mode | Media server earlier than 9.1 | |
|---|---|---|---|
| On | Off | ||
| Preferred Off | Data is not encrypted | Data is not encrypted | Data is not encrypted | 
| Preferred On | Data is encrypted | Data is not encrypted | Data is encrypted | 
| Enforced | Data is encrypted | Operation fails | Data is encrypted | 
Table: When the image DTE mode is On and media server DTE setting is On
| Global DTE mode | Host | Value of the DTE_IGNORE_IMAGE_MODE configuration option | ||
|---|---|---|---|---|
| NEVER (default) | WHERE_UNSUPPORTED | ALWAYS | ||
| Preferred Off | NetBackup media server 9.1 or later | Data is encrypted | Data is encrypted | Data is not encrypted | 
| NetBackup media server earlier than 9.1 | Data is encrypted | Data is encrypted | Data is not encrypted | |
| Preferred On | NetBackup media server 9.1 or later | Data is encrypted | Data is encrypted | Data is encrypted | 
| NetBackup media server earlier than 9.1 | Data is encrypted | Data is encrypted | Data is encrypted | |
| Enforced | NetBackup media server 9.1 or later | Data is encrypted | Data is encrypted | Data is encrypted | 
| NetBackup media server earlier than 9.1 | Data is encrypted | Data is encrypted | Data is encrypted | |
Note:
If DTE_IGNORE_IMAGE_MODE is set to ALWAYS, the DTE decision is as per the table - Table: The image DTE mode is Off.
Table: When the image DTE mode is On and the media server DTE setting on 10.0 or later is Off
| Global DTE mode | Value of the DTE_IGNORE_IMAGE_MODE configuration option | ||
|---|---|---|---|
| NEVER (default) | WHERE_UNSUPPORTED | ALWAYS | |
| Preferred Off | Operation fails | Operation fails | Data is not encrypted | 
| Preferred On | Operation fails | Operation fails | Data is not encrypted | 
| Enforced | Operation fails | Operation fails | Operation fails | 
Note:
If DTE_IGNORE_IMAGE_MODE is set to ALWAYS, the DTE decision is as per the table - Table: The image DTE mode is Off.