Security
IBM Storage Virtualize
based storage systems are secure storage platforms that implement various security-related features
for both system-level security and data-level security.
Security overview
IBM Storage Virtualize based storage systems are secure storage platforms that implement various security-related features for both system-level security and data-level security.
Managing security
The system supports several security-related features that can help protect system data and resources from unauthorized access.
System Certificates
To ensure secure communication between systems, applications, and browsers, IBM Storage FlashSystem allows you to manage system certificates using either the command-line interface (CLI) or the management GUI.
Multifactor authentication
Multifactor authentication requires users to provide multiple pieces of information when they log in to the system to prove their identity. Multifactor authentication uses any combination of two or more methods, called factors , to authenticate users to your resources and protect those resources from unauthorized access.
User authentication
You can configure authentication and authorization for users of the system. The system supports multifactor authentication, single sign-on, local user authentication and LDAP authentication for remote users.
Remote Authentication
Remote authentication allows users to authenticate to the system using credentials that are stored on an external authentication service. When you configure remote authentication, you do not need to configure users on the system or assign more passwords. Instead, you can use your existing passwords and user groups that are defined on the remote service to simplify user management and access to enforce password policies more efficiently, and to separate user management from storage management.
Single Sign-on
Single Sign-on (SSO) authentication requires users to register their credentials only once when the user signs on to the application for the first time. The user information is stored at the Identity Provider (IdP) that manages the user credentials and determines whether the user is required to authenticate again or not.
Encryption
To use encryption on the system you must purchase and activate encryption licenses, set up your method of key management, and then create encrypted objects.
Secure data deletion
The system provides methods to securely erase data from a drive or boot drive when a node or node canister is decommissioned.
Password policy
With password policy support, system administrators can set security requirements that are related to password creation and expiration, timeout for inactivity, and actions after failed logon attempts.
Two person integrity
Use two person integrity (TPI) to prohibit critical and risky tasks in the system from being executed by a single security administrator and by requiring the involvement of two security administrators.
Host authentication
Host authentication allows user to configure host authentication mode for iSCSI hosts.