ONTAP cyber vault validation with PowerShell
A robust cyber vault should be able to withstand a sophisticated attack, even when the attacker has credentials to access the environment with elevated privileges.
Once the rules are in place, an attempt (assuming somehow the attacker was able to get in) to delete a snapshot on the vault side will fail. Same applies with all hardening settings by placing on the necessary restrictions and safeguarding the system.
PowerShell code example to validate the configuration on a schedule basis.
This screenshot shows there are no connections on the vault controller.
This screenshot shows there is no ability to tamper with the snapshots.
To validate and confirm air-gapping functionality, follow the below steps:
-
Test network isolation capabilities, and the ability to quiesce a connection when data is not being transferred.
-
Verify the management interface cannot be accessed from any entities apart from the allowed IP addresses.
-
Verify Multi-admin verification is in place to provide an additional layer of approval.
-
Validate the ability to access via CLI and REST API
-
From the source, trigger a transfer operation to vault and ensure the vaulted copy cannot be modified.
-
Try to delete the immutable snapshot copies that are transferred to the vault.
-
Try to modify the retention period by tampering the system clock.