Security Considerations
C
no
vd
ocx (
e
n)
1
1
Decemb
er
2
007
91
C
Security Considerations
This section contains specific instructions on how to configure and maintain a Business Continuity
Cluster in the most secure way possible. It contains the following subsections:
Section C.1, “Security Features,” on page 91
Section C.2, “Security Configuration,” on page 91
Section C.3, “Other Security Considerations,” on page 96
C.1 Security Features
The following table contains a summary of the security features of BCC 1.1:
Table C-1
BCC 1.1 Security Features
C.2 Security Configuration
The following subsections provide a summary of security-related configuration settings for BCC
1.1:
Section C.2.1, “BCC Configuration Settings,” on page 92
Section C.2.2, “Security Information for Other Products,” on page 95
Feature
Yes/No
Details
Users are authenticated
Yes
Administrative users are authenticated via
eDirectory™.
Users are authorized
Yes
Users are authorized via eDirectory trustees.
Access to configuration information is
controlled
Yes
Access to the administrative interface is
restricted to valid users that have write rights
to the configuration files.
Roles are used to control access
Yes
Configurable through iManager
Logging and/or security auditing is done
Yes
Syslog on Linux. Fake syslog on NetWare.
Data on the wire is encrypted by default
Yes
The following data is encrypted on the wire:
Intercluster communications
IDM data can be encrypted
Data stored is encrypted
No
Passwords, keys, and any other
authentication materials are stored
encrypted
Yes
Intercluster communications for usernames
and passwords are encrypted. Cluster
credentials are stored encrypted in eDirectory.
Security is on by default
Yes