Veritas NetBackup™ Security and Encryption Guide
- Increasing NetBackup security
- Security deployment models
- Port security
- About NetBackup daemons, ports, and communication
- Additional port information for products that interoperate with NetBackup
- About configuring ports
- Auditing NetBackup operations
- Configuring Enhanced Auditing
- Access control security
- About AD and LDAP domains
- Security management in NetBackup
- About configuring a third-party certificate for the NetBackup web server
- About the Security Management utilities
- About audit events
- About host management
- Adding shared or cluster mappings
- Allowing or disallowing automatic certificate reissue
- About global security settings
- About host name-based certificates
- About host ID-based certificates
- Using the Certificate Management utility to issue and deploy host ID-based certificates
- About NetBackup certificate deployment security levels
- Setting up trust with the master server (Certificate Authority)
- About reissuing host ID-based certificates
- About Token Management for host ID-based certificates
- About the host ID-based certificate revocation list
- About revoking host ID-based certificates
- Security certificate deployment in a clustered NetBackup setup
- About deployment of a host ID-based certificate on a clustered NetBackup host
- Data at rest encryption security
- About NetBackup client encryption
- Configuring standard encryption on clients
- About configuring standard encryption from the server
- Configuring legacy encryption on clients
- About configuring legacy encryption from the client
- About configuring legacy encryption from the server
- Additional legacy key file security for UNIX clients
- Data at rest key management
- About the Key Management Service (KMS)
- Installing KMS
- Configuring KMS
- About key groups and key records
- Overview of key record states
- Configuring NetBackup to work with KMS
- About using KMS for encryption
- KMS database constituents
- Command line interface (CLI) commands
- About exporting and importing keys from the KMS database
- Troubleshooting KMS
- Regenerating keys and certificates
- NetBackup web services account
- Appendix A. NetBackup Access Control Security (NBAC)
- Configuring NetBackup Access Control (NBAC)
- Configuring Access Control host properties for the master and media server
- Access Control host properties dialog for the client
- Troubleshooting Access Management
- Windows verification points
- UNIX verification points
- Verification points in a mixed environment with a UNIX master server
- Verification points in a mixed environment with a Windows master server
- About determining who can access NetBackup
- Configuring user groups
- About defining a user group and users
- Viewing specific user permissions for NetBackup user groups
About NetBackup auditing
An audit trail is a record of user-initiated actions in a NetBackup environment. Essentially, auditing gathers the information to help answer who changed what and when they changed it. Auditing NetBackup operations can help provide information in the following areas:
Customers can gain insight from audit trails while they investigate unexpected changes in a NetBackup environment. For example, it might be found that the addition of a client or a backup path has caused a significant increase in backup times. The audit report can indicate that an adjustment to a schedule or to a storage unit configuration might be necessary to accommodate the policy change.
Corporate change management
For customers who must adhere to internal change management policies, NetBackup auditing offers a method to adhere to such policies.
The information from NetBackup auditing helps NetBackup Support to troubleshoot problems for customers.
You can view the actions NetBackup audits in the Security events in the NetBackup web user interface or in the NetBackup Administration Console. You can see full audit event details with the nbauditreport command or in NetBackup OpsCenter.
The Audit Manager provides the mechanism to query and report on auditing information. For example, an administrator can search specifically for information based on the following:
When an action occurred
Failed actions in certain situations
The actions that a specific user performed
The actions that were performed in a specific content area
Changes to the audit configuration
The audit manager behaves in the following manner when it creates audit records:
The audit record limits the details of an entry to a maximum of 4096 characters. (For example, the Policy name.) The remaining characters are truncated while stored in the audit database.
The audit record limits the restore image IDs to a maximum of 1024 characters. The remaining characters are truncated while stored in the audit database.
Rollback operations are not audited.
Some operations are carried out as multiple steps. For example, creating an MSDP-based storage server consists of multiple steps. Every successful step is audited. Failure in any of the steps results in a rollback, or rather, the successful steps may need to be undone. The audit record does not contain details about rollback operations.
NetBackup records the following user-initiated actions.
Adding, deleting, or updating policy attributes, clients, schedules, and backup selections lists.
Activity monitor actions
Canceling, suspending, resuming, restarting, or deleting any type of job creates an audit record.
Storage units actions
Adding, deleting, or updating storage units.
Actions that are related to storage lifecycle policies are not audited.
Storage servers actions
Adding, deleting, or updating storage servers.
Disk pools and Volume pools actions
Adding, deleting, or updating disk or volume pools.
This information includes:
Creating, revoking, renewing, and deploying of certificates and specific certificate failures.
Certificate Verification Failures (CVFs)
Any failed connection attempts that involve SSL handshake errors, revoked certificates, or host name validation failures.
Creating, deleting, and cleanup of tokens and specific token issuing failures.
Adding and deleting Enhanced Auditing users in the Enhanced Auditing mode.
Creating, modifying, and deleting hold operations.
NetBackup host database related operations.
Any successful or failed login attempts for the NetBackup Administration Console, the NetBackup web UI or the NetBackup APIs.
Information related to changes made to the security configuration settings.
Starting a restore job
NetBackup does not audit when other types of jobs begin. For example, NetBackup does not audit when a backup job begins.
Starting and stopping of the nbaudit manager is always audited, even if auditing is disabled.
User action that fails to create an audit record
If auditing is enabled but a user action fails to create an audit record, the audit failure is
captured in the
Authorization failure is audited when you use the NetBackup web UI, the NetBackup APIs, or Enhanced Auditing .
Restore and browse image user actions
All the restore and browse image content (bplist) operations that a user performs are audited with the user identity.
Storage lifecycle policy actions
Attempts to create, modify, or delete a storage lifecycle policy (SLP) are audited and logged. However, activating and suspending an SLP using the command nbstlutil are not audited. These operations are audited only when they are initiated from a NetBackup graphical user interface or API.
Deleting an asset, such as a vCenter server or a virtual machine, as part of the POST /asset-cleanup process in the Asset Database API, is audited and logged.
Creating, modifying, or deleting an asset group as well any action on an asset group for which a user is not authorized is audited and logged.
The following actions are not audited and do not display in the audit report:
Any failed actions.
NetBackup logs failed actions in NetBackup error logs. Failed actions do not display in audit reports because a failed attempt does not bring about a change in the NetBackup system state.
The effect of a configuration change
The results of a change to the NetBackup configuration are not audited. For example, the creation of a policy is audited, but the jobs that result from its creation are not.
The completion status of a manually initiated restore job
While the act of initiating a restore job is audited, the completion status of the job is not audited. Nor is the completion status of any other job type, whether initiated manually or not. The completion status is displayed in the Activity Monitor (Administration Console) and in the Jobs (web UI).
Internally initiated actions
NetBackup-initiated internal actions are not audited. For example, the scheduled deletion of expired images, scheduled backups, or periodic image database cleanup is not audited.
NetBackup also does not audit the following actions unless NetBackup Access Control (NBAC) is enabled. Note, however that you cannot use the NetBackup web UI when NBAC is enabled.
Host properties actions.