NetBackup and Veritas Appliances Hardening Guide
- Top recommendations to improve your NetBackup and Veritas appliances security posture
- Introduction
 - Keeping all systems and software updated
 - Enabling multifactor authentication
 - Increasing the appliance security level
 - Implementing an immutable data vault
 - Securing credentials
 - Reducing network exposure
 - Enabling encryption
 - Enabling catalog protection
 - Enabling malware scanning and anomaly detection
 - Enabling security observability
 - Restricting user access
 - Configuring a sign-in banner
 
 - Steps to protect Flex Appliance
- About Flex Appliance hardening
 - Managing single sign-on (SSO)
 - Managing user authentication with smart cards or digital certificates
 - About lockdown mode
 - Using network access control
 - Using an external certificate
 - Forwarding logs
 - Creating a NetBackup WORM storage server instance
 - Configuring an isolated recovery environment on a WORM storage server
 - Protecting the NetBackup catalog on a WORM storage server
 - Using a sign-in banner
 
 - Steps to protect NetBackup Appliance
- About NetBackup Appliance hardening
 - About single sign-on (SSO) authentication and authorization
 - About authentication using smart cards and digital certificates
 - Disable user access to the NetBackup appliance operating system
 - About Network Access Control
 - About data encryption
 - FIPS 140-2 conformance for NetBackup Appliance
 - About implementing external certificates
 - About forwarding logs to an external server
 - Creating the appliance login banner
 
 - Steps to protect NetBackup
- About NetBackup hardening
 - Configure NetBackup for single sign-on (SSO)
 - Configure user authentication with smart cards or digital certificates
 - Access codes
 - Workflow to configure immutable and indelible data
 - Add a configuration for an external CMS server
 - Configuring an isolated recovery environment on a NetBackup BYO media server
 - About FIPS support in NetBackup
 - Installing KMS
 - Workflow for external KMS configuration
- Validating KMS credentials
 - Configuring KMS credentials
 - Configuring KMS
 - Creating keys in an external KMS
 - Workflow to configure data-in-transit encryption
 
 - Workflow to use external certificates for NetBackup host communication
- About certificate revocation lists for external CA
 - Configuring an external certificate for the NetBackup web server
 - Configuring the primary server to use an external CA-signed certificate
 - Configuring an external certificate for a clustered primary server
 - Configuring a NetBackup host (media server, client, or cluster node) to use an external CA-signed certificate after installation
 - Configuration options for external CA-signed certificates
- ECA_CERT_PATH for NetBackup servers and clients
 - ECA_TRUST_STORE_PATH for NetBackup servers and clients
 - ECA_PRIVATE_KEY_PATH for NetBackup servers and clients
 - ECA_KEY_PASSPHRASEFILE for NetBackup servers and clients
 - ECA_CRL_CHECK for NetBackup servers and clients
 - ECA_CRL_PATH for NetBackup servers and clients
 - ECA_CRL_PATH_SYNC_HOURS for NetBackup servers and clients
 - ECA_CRL_REFRESH_HOURS for NetBackup servers and clients
 - ECA_DISABLE_AUTO_ENROLLMENT for NetBackup servers and clients
 - ECA_DR_BKUP_WIN_CERT_STORE for NetBackup servers and clients
 - MANAGE_WIN_CERT_STORE_PRIVATE_KEY option for NetBackup primary servers
 
 
 - Guidelines for managing the primary server NetBackup catalog
 - About protecting the MSDP catalog
 - How to set up malware scanning
 - About backup anomaly detection
 - Send audit events to system logs
 - Send audit events to log forwarding endpoints
 - Display a banner to users when they sign in
 
 
Workflow to configure data-in-transit encryption
This topic provides the steps to carry out data-in-transit encryption (DTE) in your NetBackup environment. The DTE configuration comprises the following two primary options:
Global DTE mode
Client DTE mode
Table: Workflow of DTE configuration
Step number  | Step  | Reference topic  | 
|---|---|---|
Step 1  | Review the configuration settings of the global DTE mode option and configure the option as per your DTE requirements  | See Configure the global data-in-transit encryption setting.  | 
Step 2  | Review the configuration settings of the client DTE mode option and configure the option as per your DTE requirements  | |
Step 3  | Review how the decision about data encryption is made based on the NetBackup operation that you want to perform and the DTE configuration settings.  | See How DTE configuration settings work in various NetBackup operations. Note: If you plan to modify any existing DTE configuration settings, you must review this topic to understand the impact on the NetBackup operations.  | 
Apart from the primary DTE configuration settings, the following settings are used in certain scenarios:
Media server DTE mode
Backup image DTE mode