ONTAP tools for VMware vSphere
Software engineering with ONTAP Tools for VMware vSphere employs the following secure development activities:
-
Threat modeling. The purpose of threat modelling is to discover security flaws in a feature, component, or product early in the software development life cycle. A threat model is a structured representation of all the information that affects the security of an application. In essence, it is a view of the application and its environment through the lens of security.
-
Dynamic Application Security Testing (DAST). This technology is designed to detect vulnerable conditions on applications in their running state. DAST tests the exposed HTTP and HTML interfaces of web-enable applications.
-
Third-party code currency. As part of software development with open-source software (OSS), you must address security vulnerabilities that might be associated with any OSS incorporated into your product. This is a continuing effort because a new OSS version might have a newly discovered vulnerability reported at any time.
-
Vulnerability scanning. The purpose of vulnerability scanning is to detect common and known security vulnerabilities in NetApp products before they are released to customers.
-
Penetration testing. Penetration testing is the process of evaluating a system, web application, or network to find security vulnerabilities that could be exploited by an attacker. Penetration tests (pen tests) at NetApp are conducted by a group of approved and trusted third-party companies. Their testing scope includes the launching of attacks against an application or software similar to hostile intruders or hackers using sophisticated exploitation methods or tools.
Product security features
ONTAP tools for VMware vSphere includes the following security features in each release.
-
Login banner. SSH is disabled by default and only allows one-time logins if enabled from the VM console. The following login banner is shown after the user enters a username in the login prompt:
WARNING: Unauthorized access to this system is forbidden and will be prosecuted by law. By accessing this system, you agree that your actions may be monitored if unauthorized usage is suspected.
After the user completes login through the SSH channel, the following text is displayed:
Linux vsc1 4.19.0-12-amd64 #1 SMP Debian 4.19.152-1 (2020-10-18) x86_64 The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law.
-
Role-based access control (RBAC). Two kinds of RBAC controls are associated with ONTAP tools:
-
Native vCenter Server privileges
-
vCenter plug-in specific privileges. For details, see this link.
-
-
Encrypted communications channels. All external communication happens over HTTPS using version 1.2 of TLS.
-
Minimal port exposure. Only the necessary ports are open on the firewall.
The following table describes the open port details.
TCP v4/v6 port # | Direction | Function |
---|---|---|
8143 |
inbound |
HTTPS connections for REST API |
8043 |
inbound |
HTTPS connections |
9060 |
inbound |
HTTPS connections |
22 |
inbound |
SSH (Disabled by default) |
9080 |
inbound |
HTTPS connections - VP and SRA - Internal connections from loopback only |
9083 |
inbound |
HTTPS connections - VP and SRA |
1162 |
inbound |
VP SNMP trap packets |
1527 |
internal only |
Derby database port, only between this computer and itself, external connections not accepted — Internal connections only |
443 |
bi-directional |
Used for connections to ONTAP clusters |
-
Support for certificate authority (CA) signed certificates. ONTAP tools for VMware vSphere supports CA signed certificates. See this kb article for more information.
-
Audit logging. Support bundles can be downloaded and are extremely detailed. ONTAP tools logs all user login and logout activity in a separate log file. VASA API calls are logged in a dedicated VASA audit log (local cxf.log).
-
Password policies. The following password policies are followed:
-
Passwords are not logged in any log files.
-
Passwords are not communicated in plain text.
-
Passwords are configured during the installation process itself.
-
Password history is a configurable parameter.
-
Minimum password age is set to 24 hours.
-
Auto complete for the password fields are disabled.
-
ONTAP tools encrypts all stored credential information using SHA256 hashing.
-