Currently, Recovery Manager for Active Directory does not allow granular permission delegation for product settings and operations. Any locally logged-on accounts with local administrative rights will be able to gain control over the entire Recovery Manager functionality.
This requires ensuring that the security level for access to the machine with the Recovery Manager console is no lower than the security level for access to other parts of the Active Directory infrastructure.
RMAD allows backups to be encrypted and protected with a password, to prevent unauthorized access.
For Active Directory backup encryption, the product uses FIPS 140-2 validated AES-256 algorithms.
Table 1: Encryption of Backup Files
Cryptographic usage | Cryptographic algorithm | Cryptographic parameters | Third-Party libraries | FIPS 140-2 Certificates Windows Server 2016 |
---|---|---|---|---|
Symmetric encryption of bulk data |
AES256 | Key Encryption Key: CryptDeriveKey - CALG_AES_256 AES256 Mode: CRYPT_MODE_CBC Salt: CryptGenRandom - 16 |
CryptoAPI (crypt32.lib) WMI: Win32_EncryptableVolume class |
AES: #4064, #5295 and #C2046 |
Asymmetric encryption of bulk data | RSA | RSA Key Pair: CryptAcquireContext - PROV_RSA_AES CryptGenKey - CALG_RSA_KEYX |
CryptoAPI (crypt32.lib) | RSA: #2192, #2193, #2195, #2833, #2834, #2847, #C2046 and #C2065 |
Key Derivation | PDKDF2 | Key Size = SHA512 ::BCryptOpenAlgorithm Provider - BCRYPT_SHA512_ALGORITHM, BCRYPT_ALG_HANDLE_HMAC_FLAG BCryptDeriveKeyPBKDF2 – iterations used meet 600,000 minimum requirement |
Cryptography Next Generation API (bcrypt.lib) | PBKDF: Vendor affirmed |
Table 2: Encryption of Forest Recovery Project Files
Cryptographic usage | Cryptographic algorithm | Cryptographic parameters | Third-Party libraries | FIPS 140-2 Certificates Windows Server 2016 |
---|---|---|---|---|
Symmetric encryption of bulk data |
AES256 | Key Encryption Key: CryptDeriveKey - CALG_AES_256 AES256 Mode: CRYPT_MODE_CBC Salt: CryptGenRandom - 32 |
System.Security.Cryptography.Algorithms.dll System.Security.Cryptography.Csp.dll System.Security.Cryptography.Primitives.dll mscorlib.dll netstandard.dll |
AES: #4064, #5295 and #C2046 |
Key Derivation | PDKDF2 | Key Size = SHA512 PaddingMode.PKCS7 Rfc2898DeriveBytes - iterations used meet 600,000 minimum requirement |
System.Security.Cryptography.Algorithms.dll System.Security.Cryptography.Csp.dll System.Security.Cryptography.Primitives.dll mscorlib.dll netstandard.dll |
PBKDF: Vendor affirmed |
Table 3: Encryption of Credentials
Cryptographic usage | Cryptographic algorithm | Cryptographic parameters | Third-Party libraries | FIPS 140-2 Certificates Windows Server 2016 |
---|---|---|---|---|
Symmetric encryption of secrets |
AES256 | DPAPI using CRYPTPROTECT_LOCAL_MACHINE flag, AES256-CBC algorithm Hash – SHA512 Random password - 16 bytes |
CryptoAPI (crypt32.lib) DPAPI (crypt32.lib) |
AES: #4064, #5295 and #C2046 |
Table 4: Communication
Cryptographic usage | Cryptographic algorithm | Cryptographic parameters | Third-Party libraries | FIPS 140-2 Certificates Windows Server 2016 |
---|---|---|---|---|
Communication | WCF TCP Transport Security,RPC over Schannel | System.Net.Security. ProtectionLevel. EncryptAndSign; RPC_C_AUTHN_LEVEL_PKT_PRIVACY |
bcrypt.dll or bcryptprimitives.dll |
#2937 |
Communication | SSL TLS 1.2 | Negotiated by GSS (RPC over Schannel) | Microsoft.Bcryptprimitives.dll or Bcrypt.dll | #2937 |
Recovery Manager for Active Directory has undergone a Quest internal Self-Affirmation process to confirm that all cryptographic usage relies exclusively on Third-Party FIPS 140-2 validated modules.
More information:
The Recovery Manager for Active Directory team follows a strict Quality Assurance cycle.
In addition, the Recovery Manager for Active Directory team follows a managed Security Development Lifecycle (SDL) which includes:
Recovery Manager for Active Directory developers go through the same set of hiring processes and background checks as other Quest employees.
Recovery Manager for Active Directory security features are only one part of a secure environment. Customers should follow their own security best practices when deploying Recovery Manager for Active Directory within their environment.
© ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center