The following table describes the recommendations Quest offers for specific security scenarios.
Table 10: Security recommendations
Sr. No. |
Asset |
Recommendation | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 |
Secure connect certificates |
Use third-party signing certificates like DigiCert, SSL.com, etc. Refer to the QoreStor User Guide for instructions on using third party certificates. | ||||||||||||||||
2 |
Object Container Certificate |
Use third-party signing certificate. Currently Object Container and QS UI use the same certificate. We recommend using different certificates for each service. | ||||||||||||||||
3 |
QS UI Certificate |
Use third-party signing certificate that can be uploaded via UI Dashboard. Refer to the QoreStor User Guide for instructions on using third party certificates. | ||||||||||||||||
4 |
QoreStor default passwords |
The user should change the passwords immediately after installation. Minimum strength policies must be enforced at the time of changing passwords. Passwords to change:
In addition, Cloud Tier and Archive Tier need passphrases at the time of creation of the storage groups. These passphrases must be treated like passwords from security and strength standpoint. | ||||||||||||||||
5 |
Default port settings and firewall settings |
Quest recommends disabling the network ports that are not needed for customer use cases.
| ||||||||||||||||
6 |
AWS least privileges |
As a general rule, enable only the least set of permissions needed to perform operations on cloud objects.
| ||||||||||||||||
7 |
Azure and other SPs least privileges and |
As a general rule, enable only the least set of permissions needed to perform operations on cloud objects. For storage buckets, Quest recommends setting RW permissions to users within the account and not give permissions to users outside the account | ||||||||||||||||
8 |
Network Security Group (NSG) port settings for Azure market place images |
Please refer to Azure market pace deployment guide for recommended NSG settings | ||||||||||||||||
9 |
UI log-in attempts |
Quest recommends monitoring login attempts from UI using events. This will be useful to detect unauthorized login attempts to QoreStor via the UI. Refer to user guide for instructions on event monitoring. | ||||||||||||||||
10 |
Users logged intoQoreStor |
Monitor local users logged into the QoreStor server. Super users can check /var/log/secure for shell logins. | ||||||||||||||||
11 |
Access to external CIFS/NFS shares |
Quest recommends restricting access to CIFS/NFS shares based on IP white-listing. Check QoreStor events for mount access to the shares. | ||||||||||||||||
12 |
Encryption at rest and replication channel encryption |
Quest recommends encryption at rest and encryption of in-flight data (replication channel) using internal keys and SHA256 to secure the backup data. Please refer to the user guide for instructions on how to enable them | ||||||||||||||||
13 |
RDA immutability |
QoreStor version 7.1 and later offers enhanced security using RDA Immutability, which is under integration by DMAs. Please refer to user guide for details on the feature and instructions to enable it. | ||||||||||||||||
14 |
Recycle Bin |
QoreStor version 7.1 and later offers protection against ransomware attacks with Recycle Bin. Please refer to user guide for details on the feature and instructions to enable it. |