Dell PowerMax Cybersecurity November 2022 H19070.2 White Paper Abstract This document outlines enhanced safety and security features used in Dell PowerMax arrays for cyber detection, protection, and resiliency. Dell Technologies Copyright The information in this publication is provided as is. Dell Inc. makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any software described in this publication requires an applicable software license. Copyright © 2022 Dell Inc. or its subsidiaries. All Rights Reserved. Dell Technologies, Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Intel, the Intel logo, the Intel Inside logo and Xeon are trademarks of Intel Corporation in the U.S. and/or other countries. Other trademarks may be trademarks of their respective owners. Published in the USA November 2022 H19070.2. Dell Inc. believes the information in this document is accurate as of its publication date. The information is subject to change without notice. 2 Dell PowerMax Cybersecurity Contents Contents Executive summary ........................................................................................................................ 4 Cybersecurity with PowerMax ....................................................................................................... 6 Hardware Root of Trust .................................................................................................................. 6 Multi-factor authentication for SecurID ......................................................................................... 8 CloudIQ ............................................................................................................................................ 8 Data at Rest Encryption ................................................................................................................ 10 End-to-end efficient encryption ................................................................................................... 12 Role Based Access Control ......................................................................................................... 13 Tamper-proof audit logs ............................................................................................................... 14 Secure snaps ................................................................................................................................. 15 Snapshot policies ......................................................................................................................... 16 Cloud Mobility ............................................................................................................................... 18 PowerMax cyber vault .................................................................................................................. 19 References ..................................................................................................................................... 22 Dell PowerMax Cybersecurity 3 Executive summary Executive summary Introduction Cybersecurity is a growing priority for organizations. With growing concerns, demands, and regulations, along with evidence of increasing attacks from local and global forces, the need to address evolving security requirements is obvious. Attackers are continually finding new creative techniques to infiltrate IT infrastructures to penetrate existing security measures. In addition to external threats, there is also the potential of insider threats where there is already access to infrastructure. These threats to organizations have negative economic consequences: • A cyber or ransomware attack occurs every 11 seconds.1 • 84 percent of IT leaders report data loss prevention is more challenging with a remote workforce.2 • More than 60 percent of companies have experienced a data compromise due to an exploited vulnerability.3 • The average cost of a cyber crime for an organization is $13M.4 • The total global impact of cyber crime is $6T.5 Financial cost is not the only loss incurred if a breach occurs. Loss of organizational reputation can be even more costly because its impact can extend over many years. The cost of a data breach can have lasting effects for organizations of all sizes and across all industries. Dell Technologies takes a comprehensive approach to cyber resiliency with a framework that is designed to help organizations achieve their security objectives and requirements. -------------------------------------------------1 Estimated for 2021, Cybersecurity Ventures: https://cybersecurityventures.com/cybercrimedamage-costs-10-trillion-by-2025/. 2 Tessian, The State of DLP - Why DLP Has Failed and What the Future Looks Like, May 2020. Forrester Consulting Thought Leadership Paper Commissioned by Dell, BIOS Security – The Next Frontier for Endpoint Protection, June 2019. 3 4 Accenture Insights, Ninth Annual Cost of Cybercrime Study, March 2019: https://www.accenture.com/us-en/insights/security/cost-cybercrime-study. 5 Estimated for 2021, Cybersecurity Ventures: https://cybersecurityventures.com/cybercrimedamage-costs-10-trillion-by-2025/. 4 Dell PowerMax Cybersecurity Executive summary The Dell cybersecurity framework aligns with the National Institute of Standards and Technologies (NIST) cybersecurity framework and consists of the following: • Identify • Protect • Detect • Respond • Recover Dell PowerMax offers various data services and solutions to safeguard sensitive and mission-critical data. Revisions Date Description February 2022 Initial release August 2022 Added: November 2022 We value your feedback • Hardware Root of Trust • Multi-factor authentication for SecurID • Data reduction anomaly detection • Data at Rest Encryption for PowerMax 2500 and 8500 • Mitigating ransomware attacks using snapshot policies Added: PowerMax cyber vault Dell Technologies and the authors of this document welcome your feedback on this document. Contact the Dell Technologies team by email. Author: Richard Pace Note: For links to other documentation for this topic, see the PowerMax and VMAX Info Hub. Dell PowerMax Cybersecurity 5 Cybersecurity with PowerMax Cybersecurity with PowerMax Dell follows a “shift-left” approach to security that ensures that security is baked into every process in the development life cycle. The Dell Secure Development Lifecycle (SDL) defines security controls based on industry standards that Dell product teams adopt while developing new features and functionality. Dell SDL includes both analysis activities and prescriptive proactive controls around key risk areas. Dell strives to help our customers minimize risk associated with security vulnerabilities in our products. Our goal is to provide customers with timely information, guidance, and mitigation options to address vulnerabilities. The Dell Product Security Incident Response Team (Dell PSIRT) is chartered and responsible for coordinating the response and disclosure for all product vulnerabilities that are reported to Dell. Dell employs a rigorous process to continually evaluate and improve our vulnerability response practices and regularly benchmarks those practices against the rest of the industry. Dell has an ingrained culture of security. The following sections describe the various data services and solutions offered for Dell PowerMax arrays to provide robust security if a cyber attack occurs. Note: For more information about each topic, see References. Hardware Root of Trust Overview PowerMax 2500/8500 arrays use an immutable, silicon-based Hardware Root of Trust (HWRoT) to cryptographically affirm the integrity of BIOS and BMC firmware. This HWRoT is based on one-time programmable, read-only public keys provisioned by Dell in the factory to provide protection against malware tampering. The BIOS boot process uses Intel Boot Guard technology, which verifies that the digital signature of the cryptographic hash of the boot image matches the signature stored in silicon by Dell in the factory. If Boot Guard successfully validates the signature, a chain of trust procedure validates the rest of the BIOS firmware modules until control is handed off to the operating system or hypervisor. Each BIOS module contains a hash of the next module in the chain. The key modules in the BIOS are the Initial Boot Block (IBB), Security (SEC), Pre-EFI Initialization (PEI), Memory Reference Code (MRC), Driver Execution Environment (DXE), and Boot Device Selection (BDS). If Intel Boot Guard authenticates the IBB, the IBB validates SEC+PEI before handing control to it. SEC+PEI then validates PEI+MRC, which further validates the DXE+BDS modules. Validation of the DXE+BDS modules results in control being handed over to Unified Extensible Firmware Interface (UEFI) Secure Boot. Rapid recovery to a trusted image is implemented on the PowerMax platform when authentication fails. The rapid recovery is essential within the HWRoT implementation and is automatically initiated by the BMC to guarantee maximum security and maintained uptime. 6 Dell PowerMax Cybersecurity Hardware Root of Trust Secure Boot and Measured Boot Secure Boot Secure Boot represents an industry-wide standard for security in the preboot environment. Computer system vendors, expansion card vendors, and operating system providers collaborate on the specification to promote interoperability. Secure Boot is the process of verification that the image to be booted is exactly the image that is expected. It is used during Hardware Root of Trust, firmware load, and firmware upgrade. Secure Boot also extends through all the various images that need to be booted all the way, through the execution of the operating system image, such as bootloaders, to firmware to Initial BIOS to UEFI. PowerMaxOS for PowerMax 2500/8500 supports industry standard UEFI Secure Boot, which checks the cryptographic signatures of UEFI drivers, kernels and other code loaded prior to the operating system running. UEFI Secure Boot prevents unsigned (untrusted) UEFI device drivers or operating system kernels from being loaded, displays error messages, and does not allow the device to function. Measured Boot Measured Boot is the process of storing hash values used for authentication during a Secure Boot sequence. Values are stored in the boot log within a Trusted Computing Group (TCG)-defined trusted platform module (TPM), public keys, and the various signatures. The TPM values can be used through a token process by an upstream operating system or applications to validate the expected execution of a Secure Boot process. PowerMaxOS for PowerMax 2500/8500 supports two versions of TPM: • TPM 2.0 FIPS + Common Criteria + TCG certified • TPM 2.0 China certified The TPM can be used to perform public key cryptographic functions and compute hash functions, and can generate, manage, and securely store keys. Secure firmware upgrade PowerMax uses digital signatures on firmware updates for all components and subcomponents to assure that only authentic firmware is running on the platform. Secure firmware upgrade uses cryptographic authentication of digital signatures applied to the firmware bootloader and images of the running firmware before running any update process. Enhanced firmware authentication is embedded within many third-party devices that provide signature validation using their own Root of Trust mechanisms. This prevents the possible use of a compromised third-party update tool from being used to load malicious firmware into, for example, a NIC or storage drive (and bypassing the use of signed Dell update packages). Many of the third-party PCIe and storage devices shipped with PowerMax use a hardware Root of Trust to validate their respective firmware updates. If any firmware in any device is suspected of malicious tampering, administrators can roll back the platform firmware images to an earlier trusted version stored in PowerMax. Dell PowerMax Cybersecurity 7 Multi-factor authentication for SecurID Multi-factor authentication for SecurID Dell Unisphere for PowerMax uses authentication authority for multi-factor authentication (MFA) with Dell SecurID. SecurID provides time-sensitive tokens that are combined with a user password to verify identity during the authentication process. Unisphere for PowerMax authenticates SecurID Authentication Manager with the SecurID token. If SecurID Authentication Manager validates the token, Unisphere for PowerMax then authenticates against Local Directory, Windows Active Directory, or LDAP for twofactor authentication. MFA with SecurID is supported on all PowerMax arrays using external management with the following versions: • SecurID Authentication Manager 8.5.0 OVA • Unisphere 10 • Solutions Enabler 10 The following figure shows the settings for enabling MFA with SecurID. Figure 1. Enabling MFA with SecurID CloudIQ 8 Introduction Dell CloudIQ is a cloud-based application that provides monitoring and troubleshooting for PowerMax arrays. Each customer is provided with an independent, secure portal in which users can register their PowerMax arrays and monitor their storage from a single portal. This secure portal ensures that each customer will only be able to see arrays in their environment. Cybersecurity in CloudIQ Cybersecurity in CloudIQ constantly compares the configuration of the PowerMax system to a set of user-selected, security-related evaluation tests. Upon identifying a deviation between the actual and desired configuration setting, CloudIQ proactively notifies users of Dell PowerMax Cybersecurity CloudIQ the violation and provides remediation steps to correct the issue. Based on NIST 800-53 R5 standards and Dell best practices, Cybersecurity in CloudIQ quickly and automatically ensures that the storage infrastructure is secure, to comply with the industry’s best practices. Cybersecurity in CloudIQ can be set to provide proactive notifications to the user in the event of an infrastructure security risk. The Security Advisories section of the Cybersecurity feature in CloudIQ notifies users of relevant Dell and VMware Security Advisories. Users quickly see a summary of vulnerabilities specific to their systems and versions along with links to remediation details. The following figure shows the Cybersecurity feature in CloudIQ. Figure 2. Anomaly detection Cybersecurity in CloudIQ Latency anomaly CloudIQ uses machine learning and predictive analytics to identify any anomalies. • Performance metrics are compared with historical values to determine any deviation outside of normal ranges. • Performance impacts are also analyzed to identify any increases in latency against other metrics, such as IOPS and bandwidth. The analysis is designed to determine if the latency increase is caused by workload characteristics or any other competing resource, and to identify the origin of the impact. • Capacity anomaly detection uses hourly analysis of usage to identify any surges of capacity utilization. The following figure shows an example of CloudIQ latency anomaly detection. Dell PowerMax Cybersecurity 9 Data at Rest Encryption Figure 3. CloudIQ latency anomaly Data reduction anomaly Ransomware attacks are typically encoded user data using asymmetrical encryption. Since encrypted data is nonreducible, PowerMax systems can use CloudIQ to monitor and analyze data reduction data in near real time. Increases in the amount of unreducible data can represent suspicious activity or a potential ransomware threat. Proactive alerts can be set to notify users of the increased unreducible data that could represent data being encrypted, which would provide early detection that could minimize exposure. The following figure shows an example of CloudIQ data reduction anomaly detection. Figure 4. CloudIQ data reduction anomaly detection Data at Rest Encryption PowerMax 2000, PowerMax 8000, and VMAX Dell Data at Rest Encryption (D@RE) provides hardware-based, on-array, back-end encryption for PowerMax arrays. D@RE provides back-end encryption using IO modules that incorporate 256 AES-XTS data encryption and is FIPS 140-2 validated. The IO modules encrypt data as it is being written to the drives and decrypt the data as it is being read. All configured drives in the array are encrypted, including data and spare drives, using a unique Data Encryption Key (DEK). D@RE can be deployed with either an embedded, set-it-and-forget-it key manager or with external key management. With embedded key management, D@RE is integrated with Dell Key Trust Platform (KTP). Dell KTP establishes a pervasive and secure infrastructure for all key generation, distribution, and management capabilities required for D@RE. The following figure shows the embedded key management architecture. 10 Dell PowerMax Cybersecurity Data at Rest Encryption Figure 5. Embedded key manager External key management uses OASIS Key Management Interoperability Protocol (KMIP). KMIP allows for separation of key management from PowerMax arrays. An external key manager provides external centralized and consolidated key storage and management and allows integration between PowerMax arrays and the existing key management infrastructure. The following figure shows the external key management architecture. Figure 6. PowerMax 2500 and 8500 External key manager D@RE for PowerMax 2500 and 8500 provides full on-array, back-end encryption using Dell qualified, industry-standard self-encrypting drives (SEDs). SEDs are FIPS 140-2 validated and NVMe/TCG standard compliant. SEDs contain their own data encryption keys (DEKs) that are managed internally within the drives. Because the keys on the SED are self-managed, D@RE key management infrastructure generates and manages authentication keys (AKs), which are used to unlock the drives for reads and writes. D@RE incorporates Dell Key Trust Platform (KTP) for integrated, set-and-forget embedded key management. Dell KTP establishes a pervasive and secure infrastructure for all key generation, distribution, and management capabilities required for D@RE. The following figure shows PowerMax 2500/8500 embedded key manager architecture. Dell PowerMax Cybersecurity 11 End-to-end efficient encryption Figure 7. Embedded D@RE architecture D@RE can also be deployed with an external key manager using OASIS Key Management Interoperability Protocol (KMIP). This provides external centralized key storage and management that simplifies key generation and recovery management for PowerMax and other KMIP-compatible encryption solutions. The following figure shows PowerMax 2500/8500 external key manager architecture. Figure 8. External key manager architecture End-to-end efficient encryption PowerMax 2000 and 8000 12 End-to-end efficient encryption combines Thales host encryption with PowerMax 2000/8000 back-end Data at Rest Encryption (D@RE) using industry-standard AES encryption technology. End-to-end efficient encryption protects data while taking advantage of PowerMax space-saving data reduction technology. Thales software encrypts and decrypts data that is written from the application host to the PowerMax array. PowerMax decrypts the data to process through the data reduction engine, and Dell PowerMax Cybersecurity Role Based Access Control D@RE re-encrypts the data. Encryption from the host is set on a volume level. Not all volumes are required to participate. Encryption on the back end with D@RE encrypts all data, regardless of whether it is set for efficient encryption. PowerMax and Thales are integrated to provide an end-to-end encryption solution. PowerMax uses its existing D@RE solution to provide back-end encryption. Thales provides two external components for encryption at the application host: • • Data Security Manager (DSM) ▪ Provides centralized management of policies and keys ▪ Communicates with the KMIP communication protocol that resides on the PowerMax MMCS ▪ Is deployed either as a virtual or hardware-based appliance Vormetric Transparent Encryption (VTE) ▪ Host-based agent that encrypts user data before sending it to the array ▪ Coordinates with DSM for management of encryption keys The following is a summary of the encryption process: 1. Thales VTE software encrypts data when written from the host application. 2. Encrypted data arrives at the PowerMax in system cache. 3. Data is decrypted using an additional installed I/O module. 4. The PowerMax array applies the data reduction process to the data. 5. The data is re-encrypted using back-end D@RE encryption before it is written to storage. The following figure shows the end-to-end encryption architecture. Figure 9. End-to-end efficient encryption Role Based Access Control Role Based Access Control (RBAC) gives administrators the ability to restrict management operations that users or groups of users can perform on PowerMax arrays. RBAC consists of various roles that define the operations that can be performed. Users can be assigned their own login and password with a single role or a combination of roles. Each role can further be restricted to specific storage groups. Dell PowerMax Cybersecurity 13 Tamper-proof audit logs RBAC is a hierarchy of roles, and each role has specific privileges. For example: • Administrator—Performs all operations. • Storage Administrator—Performs all management operations. Cannot perform security operations. • Security Administrator—Performs all security operations. • Local Replication—Performs local replication operations involving snapshot creation. Device Manager is also required to restore a snapshot and only needed to link target devices. Secure snaps require Storage Administrator rights. • Remote Replication—Performs SRDF operations involving device pairs. Create, modify, or deletion of SRDF groups requires Storage Administrator rights. • Device Manager—Performs control and configuration operations on devices. Storage Administrator rights are required to create, expand, or delete devices. • Performance Monitor—Can set performance alerts and thresholds. • Auditor—Grants the ability to view, but not modify, security settings. Minimum role to view audit logs. • Monitor—Performs read-only operations excluding access to audit logs. • None—Has no permissions. The following figure shows the hierarchy of RBAC. Figure 10. RBAC role hierarchy Tamper-proof audit logs Tamper-proof audit logs are secure historical system records of all actions and operations performed on a PowerMax array. The secure logs are internal to the array itself and include information such as configuration changes, service operations, and securityrelevant actions. The logs cannot be tampered with, modified, edited, or deleted by any user with any level of access. 14 Dell PowerMax Cybersecurity Secure snaps Relevant information recorded in the audit logs includes: • Time and date of operation • Operation type and category • User and user type • Hostname • Application The audit logs have advanced filtering and search capabilities. Filtering and searching can be done by specific timeframe as well as by the foregoing parameters to help determine what operation was performed, where the operation came from, and by whom the operation was performed. Records can be expanded to show more detailed information and can be exported as .log file. The following figure shows an example of an audit log filtered by username and a searched action code of delete. Figure 11. Tamper-proof audit log Secure snaps Dell TimeFinder SnapVX provides space-saving and efficient local replication in PowerMax arrays. SnapVX snapshots are a pointer-based structure that preserves a point-in-time view of a source volume. Snapshots provide the ability to manage consistent point-in-time copies for storage groups and are created with a user-defined name and optional expiration date (time-to-live), and without the use of a target volume. Hostaccessible target volumes can be linked if a point-in-time snapshot needs to be accessed. Writing to a linked target does not affect the point-in-time of the snapshot. SnapVX snapshots can be set as secure snaps. Secure snaps are snapshots that cannot be deleted, accidentally or intentionally. They are retained in resource-limited situations in which conventional snapshots are placed in a failed state to release resources. Secure snaps must be created with a time-to-live retention period. The snapshot cannot be terminated before the retention time, and all termination attempts are rejected. When the retention time is reached, the snapshot is terminated. The retention period on a secure snap can be extended in situations where the snapshot is needed longer than originally planned; however, reducing the retention time is not Dell PowerMax Cybersecurity 15 Snapshot policies allowed. A traditional snapshot can be converted to a secure snap, but a secure snap cannot be converted to a traditional snapshot. All other SnapVX operations and rules apply to secure snaps. When implementing secure snaps, a user should determine how many snapshots on an array must be secure. Users should consider using secure snaps only on certain critical volumes, or only on a subset of the snapshots to capture points-in-time that are critical to the business and for how long the secure snaps should be retained. As always, proper planning and system sizing is crucial, no matter the types or number of snapshots that will exist in an environment. The following figure shows an example of creating secure snaps with a retention time of five days. Figure 12. Secure snap creation Snapshot policies Overview Snapshot policies provide automated scheduling of SnapVX snapshots on PowerMax arrays. Policies are customizable with rules that specify when to take snapshots, how many to take, and how long to keep them. Compliance requirements can also be specified to send alerts if the rules of a policy are not being met. Snapshot policies create and retain snapshots according to the rules of each policy. Snapshot policies support up to 1,024 snapshots per source device and 65 million snapshots per PowerMax array. Snapshot policies are applied to storage groups (SGs) to protect applications with consistent regularly scheduled snapshots. Applications can be protected by multiple policies with differing schedules and retention parameters, according to requirements. A single policy can protect multiple applications. Manual snapshots are supported along with snapshot policies to satisfy any on-demand requirements. Parameters defined within each policy are as follows: 16 • Policy Name—One to 32 characters containing letters, numbers, dashes, and underscores • Policy Type—Local or cloud • Snapshot Type—Traditional or secure Dell PowerMax Cybersecurity Snapshot policies • Recovery Point Objective—Interval or offset • Snapshots to Keep—Timeframe or snapshot count • Compliance Alerting—Based on snapshot count and scheduled interval Note: All parameters are defined during creation and can be changed on active policies except for Policy Type and Secure Snaps options. The following figure shows an example of creating a snapshot policy. Figure 13. Snapshot policy Mitigating ransomware attacks using snapshot policies SnapVX snapshots with snapshot policies allow for 1,024 snapshots per source device and 65 million per PowerMax array. Users can take advantage of the frequency and large snapshot scale in policy-driven snapshots to provide enhanced data resiliency. Because secure snaps cannot be maliciously or accidentally deleted before any planned expiration date, they can be used to preserve multiple point-in-time copies from which data can be recovered if a malware or ransomware attack occurs. Snapshot policies can be automated to take secure snaps with a high frequency and a short retention duration for fine granularity, with a lower frequency and longer retention for added security, or a mixture of both. If an attack occurs, the user can review the secure snaps to determine which point in time has the most relevant and up-to-date copy of data without malware impact. When the precise point in time is identified, restoring critical data can be done almost instantaneously by bringing application data back to the original state before any attack. Dell PowerMax Cybersecurity 17 Cloud Mobility Secure snaps also provide an additional layer of security in the case of multiple attacks and can be used for forensic work to help determine what happened during the attack and when it originally occurred. With the lower frequency and longer retention period, secure snaps can be used to validate data and data change rate to help identify any suspicious activity. Traditional snapshots can be set with a scheduling frequency rate and retention policy that works best for the organization. These snapshots can be used for daily business continuity, such as development, operations, and data analytics. They can also assist in any forensic analysis and can be compared against secure snaps to help determine what changed and when the change began. Unlike secure snaps, traditional snapshots can be deleted or fail in array resource constraint situations. However, the data on an existing snapshot cannot be changed and could be used for additional recovery options. Both secure and traditional snaps are a powerful tool that can be used to help protect and restore data rapidly, to minimize any impact of a malware or ransomware attack. The large scalability of snapshots can be easily managed using snapshot policies for scheduling frequency and retention time duration to fit any size organization. The following list is an operational example of the frequency, retention, and scale out of the value of SnapVX secure snaps. The numbers are based on an average of 5,000 production volumes in a PowerMax array. • • Secure snaps every 10 minutes with a 48-hour retention ▪ 288 per volume point-in-time copies ▪ Fine-grain protection and recovery Secure snaps every 60 minutes with a 7-day retention ▪ 168 per volume point-in-time copies ▪ Extended protection and data validation Total = 2,040,000 secure point-in-time copies Figure 14. Frequency, retention, and scale out of secure snaps Cloud Mobility Cloud Mobility for Dell PowerMax offers secure, seamless, and transparent movement of application data from on-premises to the cloud. Data movement uses SnapVX snapshots for snapshot shipping to a public or private cloud. Cloud snapshots can be taken ondemand or with automated scheduling using snapshot policies. 18 Dell PowerMax Cybersecurity PowerMax cyber vault Supported public and private cloud providers are: • Dell ECS • Dell PowerScale OneFS S3 • Amazon S3 (AWS) • Microsoft Azure Data that is moved to the cloud can be recovered back to the source PowerMax array. Cloud data can be made available to an AWS system for secondary processing, analytics, reporting, or test/development. Cloud Mobility offers the following benefits: • Array capacity usage reduction • Data repurposing: Data analytics, reporting • Space-efficient snapshot shipping: Full initial copy and differential updates • Cloud-system-independent compression and encryption • Separation from PowerMax data services • In-flight and Data at Rest Encryption (on cloud provider) The following figure shows an example of the Cloud Mobility Dashboard. Figure 15. Cloud Mobility dashboard PowerMax cyber vault PowerMax cyber vault (cyber-vault) offers a simplified orchestrated cyber recovery solution that is built using SRDF and snapshot technologies. The basic cyber-vault operating model connects production and secondary PowerMax arrays. The secondary array, which is an isolated PowerMax storage array, is known as Dell PowerMax Cybersecurity 19 PowerMax cyber vault the vault. The connection between the arrays is closed, creating an operational air gap, and removing access to the vault array devices. PowerMax cyber vault provides a secure copy of production data in the vault based on a policy. The air gap is opened periodically to push production snapshots to the vault using SRDF's adaptive copy mode. An immutable secure copy with a retention lock is created. The air gap is closed when the secure snapshot copy is taken on the vault. The snapshot pushes from the production system to the vault are incremental. If there is a cyberattack at the production site, secure copies at the vault site are used to recover the data or can be used directly from the vault. The vault maintains multiple copies of the production data based on the policy. The cyber vault solution features include: • Automated setup and provisioning • Support for up to 16 storage groups • Support for two to eight vault copies per storage group • Vault copies that are secured using retention locks ▪ The retention lock period is based on the maximum number of vault copies. If the maximum number of vault copies is set to 5 and the frequency is set to 1, the retention lock period is five days. • An easy to install Python software package • Autopilot mode ▪ • Runs after the first replication, or sync, of data. Based on time of day, autopilot mode opens the air gap, creates the vault copy, then closes the air gap. Alerting using email messages The cyber-vault suite is installed and configured on an external vault host, which can be a server or virtual machine (VM). It has access to Dell Unisphere on the vault site and the production site. The cyber-vault suite uses a REST API to communicate with Unisphere for all automation by using a policy managed by the cyber-vault configuration file. Unisphere can be configured as either embedded Unisphere or as external Unisphere. Note: The cyber-vault solution is for FBA devices only. The following figure shows the PowerMax cyber vault solution architecture. 20 Dell PowerMax Cybersecurity PowerMax cyber vault Figure 16. PowerMax cyber vault architecture Dell PowerMax Cybersecurity 21 References References The following Dell Technologies documentation provides information related to this document. Access to these resources depends on your login credentials. If you do not have access to a document, contact your Dell Technologies representative. 22 • PowerMax and VMAX Info Hub • Dell PowerMax: Family Overview • Dell PowerMax: Reliability, Availability, and Serviceability • Dell PowerMax Security Configuration Guide • Dell CloudIQ: A Detailed Review • Dell PowerMax and VMAX All Flash: Data at Rest Encryption • Dell PowerMax: End-to-End Efficient Encryption • Dell PowerMax and VMAX All Flash: TimeFinder SnapVX Local Replication • Dell PowerMax 2500 and 8500: TimeFinder SnapVX Snapshots and Clones • Dell PowerMax and VMAX All Flash: Snapshot Policies • Cloud Mobility for Dell PowerMax Dell PowerMax Cybersecurity