l
Attempts blocked by security controls (Access Controls)
The Audit Log is secure and tamper-proof. Event contents cannot be altered. Users
with the Auditor access can view, but not modify, the log.
Data erasure
EMC Data Erasure uses specialized software to erase information on arrays. Data
erasure mitigates the risk of information dissemination, and helps secure information
at the end of the information lifecycle. Data erasure:
l
Protects data from unauthorized access
l
Ensures secure data migration by making data on the source array unreadable
l
Supports compliance with internal policies and regulatory requirements
Data Erasure overwrites data at the lowest application-addressable level to drives. The
number of overwrites is configurable from 3x (the default) to 7x with a combination of
random patterns on the selected arrays.
Overwrite is supported on both SAS and Flash drives. An optional certification service
is available to provide a certificate of erasure. Drives that fail erasure are delivered to
customers for final disposition.
For individual Flash drives, Secure Erase operations erase all physical flash areas on
the drive which may contain user data.
EMC offers the following data erasure services:
l
EMC Data Erasure for Full Arrays — Overwrites data on all drives in the system
when replacing, retiring or re-purposing an array.
l
EMC Data Erasure/Single Drives — Overwrites data on individual SAS and Flash
drives.
l
EMC Disk Retention — Enables organizations that must retain all media to retain
failed drives.
l
EMC Assessment Service for Storage Security — Assesses your information
protection policies and suggests a comprehensive security strategy.
All erasure services are performed on-site in the security of the customer’s data
center and include a Data Erasure Certificate and report of erasure results.
Block CRC error checks
HYPERMAX OS supports and provide:
l
Industry standard T10 Data Integrity Field (DIF) block cyclic redundancy code
(CRC) for track formats.
For open systems, this enables host-generated DIF CRCs to be stored with user
data by the arrays and used for end-to-end data integrity validation.
l
Additional protections for address/control fault modes for increased levels of
protection against faults. These protections are defined in user-definable blocks
supported by the T10 standard.
l
Address and write status information in the extra bytes in the application tag and
reference tag portion of the block CRC.
Data integrity checks
HYPERMAX OS validates the integrity of data they hold at every possible point during
the lifetime of the data. From the point at which data enters an array, the data is
continuously protected by error detection metadata. This protection metadata is
checked by hardware and software mechanisms any time data is moved within the
VMAX3 with HYPERMAX OS
Data protection and integrity
43
Содержание VMAX 100K
Страница 1: ...EMC VMAX3 Family Product Guide VMAX 100K VMAX 200K VMAX 400K with HYPERMAX OS REVISION 6 5 ...
Страница 20: ...Preface 20 Product Guide VMAX 100K VMAX 200K VMAX 400K with HYPERMAX OS ...
Страница 46: ...VMAX3 with HYPERMAX OS 46 Product Guide VMAX 100K VMAX 200K VMAX 400K with HYPERMAX OS ...
Страница 72: ...Open systems features 72 Product Guide VMAX 100K VMAX 200K VMAX 400K with HYPERMAX OS ...
Страница 82: ...Provisioning 82 Product Guide VMAX 100K VMAX 200K VMAX 400K with HYPERMAX OS ...
Страница 100: ...Native local replication with TimeFinder 100 Product Guide VMAX 100K VMAX 200K VMAX 400K with HYPERMAX OS ...
Страница 158: ...Remote replication solutions 158 Product Guide VMAX 100K VMAX 200K VMAX 400K with HYPERMAX OS ...
Страница 186: ...Mainframe Error Reporting 186 Product Guide VMAX 100K VMAX 200K VMAX 400K with HYPERMAX OS ...
Страница 200: ...Licensing 200 Product Guide VMAX 100K VMAX 200K VMAX 400K with HYPERMAX OS ...