Cyber vault hardening
These are the additional recommendations to harden an ONTAP cyber vault. Please consult the ONTAP hardening guide below for more recommendations and procedures.
Cyber vault hardening recommendations
- 
Isolate the cyber vault's management planes 
- 
Do not enable data LIFs on the destination cluster as they are an additional attack vector 
- 
On the destination cluster, limit intercluster LIF access to the source cluster with a service policy 
- 
Segment the management LIF on the destination cluster for limited access with a service policy and a bastion host 
- 
Restrict all data traffic from the source cluster to the cyber vault to allow only the ports required for SnapMirror traffic 
- 
Where possible, disable any unneeded management access methods within ONTAP to decrease the attack surface 
- 
Enable audit logging and remote log storage 
- 
Enable multi-admin verification and require verification from an admin outside your regular storage administrators (e.g. CISO staff) 
- 
Implement role-based access controls 
- 
Require administrative multifactor authentication for System Manager and ssh 
- 
Use token based authentication for scripts and REST API calls 
Please refer to the ONTAP hardening guide, Multi-admin verification overview and ONTAP multifactor authentication guide for how to accomplish these hardening steps.
 PDFs
PDFs