ONTAP cyber vault hardening with PowerShell
The ONTAP cyber vault provides better resilience against cyber-attacks compared to traditional solutions. When designing an architecture to enhance security, it is crucial to consider measures to reduce the surface area of attack. This can be achieved through various methods such as implementing hardened password policies, enabling RBAC, locking default user accounts, configuring firewalls, and utilizing approval flows for any changes to the vault system. Furthermore, restricting network access protocols from specific IP address can help to limit potential vulnerabilities.
ONTAP provides a set of controls that allow to harden the ONTAP storage. Use the guidance and configuration settings for ONTAP to help organization meet prescribed security objectives for information system confidentiality, integrity, and availability.
Hardening best practices
Manual steps
-
Create a designated user with pre-defined and custom administrative role.
-
Create a new IPspace to isolate network traffic.
-
Create a new SVM residing in the new IPspace.
-
Ensure firewall routing policies are properly configured and that all rules are regularly audited and updated as needed.
ONTAP CLI or via automation script
-
Protect administration with Multi-Admin Verification (MFA)
-
Enable encryption for standard data "in-flight" between clusters.
-
Secure SSH with strong encryption cipher and enforce secure passwords.
-
Enable global FIPS.
-
Telnet and Remote Shell (RSH) should be disabled.
-
Lock default admin account.
-
Disable data LIFs and secure remote access points.
-
Disable and remove unused or extraneous protocols and services.
-
Encrypt network traffic.
-
Use the principle of least privilege when setting up superuser and administrative roles.
-
Restrict HTTPS and SSH from specific IP address using allowed IP option.
-
Quiesce and resume the replication based on the transfer schedule.
Bullets 1-4 needs manual intervention like designating an isolated network, segregating the IPspace and so on and needs to be performed beforehand. Detailed information to configure the hardening can be found in the ONTAP security hardening guide. The rest can be easily automated for easy deployment and monitoring purposes. The objective of this orchestrated approach is to provide a mechanism to automate the hardening steps to future proof the vault controller. The time frame the cyber vault air-gap is open is as short as possible. SnapVault leverages incremental forever technology, which will only move the changes since the last update into the cyber vault, thereby minimizing the amount of time the cyber vault must stay open. To further optimize the workflow, the cyber vault opening is coordinated with the replication schedule to ensure the smallest connection window.
Here is a PowerShell code example to harden a ONTAP controller.