Active IQ Unified Manager 9.13

What security criteria are being evaluated

In general, security criteria for your ONTAP clusters, storage virtual machines (SVMs), and volumes are being evaluated against the recommendations defined in the ETERNUS Software Security Hardening Guide for ONTAP 9 Guidelines for Secure Deployment of ONTAP 9.

Some of the security checks include:

  • whether a cluster is using a secure authentication method, such as SAML

  • whether peered clusters have their communication encrypted

  • whether a storage VM has its audit log enabled

  • whether your volumes have software or hardware encryption enabled

See the topics on compliance categories and the ETERNUS Software Security Hardening Guide for ONTAP 9 Guidelines for Secure Deployment of ONTAP 9 for detailed information.

Upgrade events that are reported from the Active IQ platform are also considered security events. These events identify issues where the resolution requires you to upgrade ONTAP software, node firmware, or operating system software (for security advisories). These events are not displayed in the Security panel, but they are available from the Event Management inventory page.

For more information, see Managing cluster security objectives.

Top of Page