h19084 Powerstore Cybersecurity
h19084 Powerstore Cybersecurity
h19084 Powerstore Cybersecurity
May 2023
H19084.3
White Paper
Abstract
This document provides an overview of cybersecurity-related features
and solutions for Dell PowerStore.
Copyright
The information in this publication is provided as is. Dell Inc. makes no representations or warranties of any kind with respect
to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular
purpose.
Use, copying, and distribution of any software described in this publication requires an applicable software license.
Copyright © 2022–2023 Dell Inc. or its subsidiaries. All Rights Reserved. Published in the USA May 2023 H19084.3.
Dell Inc. believes the information in this document is accurate as of its publication date. The information is subject to change
without notice.
Contents
Executive summary ........................................................................................................................ 4
Auditing .......................................................................................................................................... 15
CloudIQ .......................................................................................................................................... 16
References ..................................................................................................................................... 18
Executive summary
Overview Cybersecurity is a growing priority for organizations. With growing concerns, demands,
and regulations, the need to address the evolving security requirements is vital. Attackers
are continually finding new creative techniques to infiltrate IT infrastructures to penetrate
existing security measures. In addition to external threats, there is also the potential of
internal threats from disgruntled or compromised employees or contractors. These threats
to organizations have negative economic consequences:
• A ransomware attack occurred every 11 seconds in 2021. 1
• 84% of IT leaders report that data loss prevention is more challenging with a
remote workforce. 2
• More than 60% of companies have experienced a data compromise due to an
exploited vulnerability. 3
• The average cost of a cybercrime for an organization is $13 million USD. 4
• The total global impact of cybercrime is $6 trillion USD. 5
Dell takes a comprehensive approach to cyber resiliency with a framework that helps
organizations achieve their security objectives and requirements.
The Dell cybersecurity framework aligns with the National Institute of Standards and
Technologies (NIST) Cybersecurity framework and consists of the following functions:
• Identify
• Protect
• Detect
• Respond
• Recover
1
Estimated for 2021, Cybersecurity Ventures: https://cybersecurityventures.com/cybercrime-
damage-costs-10-trillion-by-2025/.
2
Tessian, The State of DLP - Why DLP Has Failed and What the Future Looks Like, May 2020.
3
Forrester Consulting Thought Leadership Paper Commissioned by Dell, BIOS Security – The Next
Frontier for Endpoint Protection, June 2019.
4
Accenture Insights, Ninth Annual Cost of Cybercrime Study March 2019
https://www.accenture.com/us-en/insights/security/cost-cybercrime-study.
5
Estimated for 2021, Cybersecurity Ventures: https://cybersecurityventures.com/cybercrime-
damage-costs-10-trillion-by-2025/.
This paper discusses data services and solutions that are related to Dell PowerStore that
safeguard sensitive and mission-critical data. It is divided into the following five sections:
Authentication and Access, Data Security, Communications Security, Auditing, and
CloudIQ.
August 2022 H19084.2 Updated with CEPA support, FLR, and HWRoT
We value your Dell Technologies and the authors of this document welcome your feedback on this
feedback document. Contact the Dell Technologies team by email.
Note: For links to other documentation on this topic, see the PowerStore Info Hub.
Overview Dell Technologies follows a shift-left approach to security that ensures that security is
baked into every process in the development life cycle. The Dell Secure Development
Lifecycle (SDL) defines security controls that are based on industry standards that Dell
product teams adopt while developing new features and functionality. The Dell SDL
includes both analysis activities and prescriptive proactive controls around key risk areas.
Dell Technologies strives to help customers minimize the risk associated with security
vulnerabilities in our products. Our goal is to provide customers with timely information,
guidance, and mitigation options to address vulnerabilities. The Dell Product Security
Incident Response Team (Dell PSIRT) is chartered and responsible for coordinating the
response and disclosure for all product vulnerabilities that are reported to Dell
Technologies. We employ a rigorous process to continually evaluate and improve our
vulnerability response practices and regularly benchmark these responses against the
rest of the industry. Dell Technologies has an ingrained culture of security.
Dell Technologies solutions for PowerStore are providing modern data protection around
cyber data protection and resiliency.
HWRoT The PowerStore 500, 1200, 3200, 5200, and 9200 models are based on the new Intel
CPU chipsets that provide Hardware Root of Trust (HWRoT). HWRoT provides an
immutable, silicon-based Root of Trust to cryptographically attest to the integrity of the
BIOS and firmware, and it ensures that there have been no malicious modifications
throughout the supply chain or after installation. These PowerStore models provide the
following security features for firmware images and the operating system through the
Secure Boot and x86 Secure Boot technologies that are provided through the enclosure
management software on the system:
• Authentication and root of trust, which provide the capability to authenticate boot
loader and firmware
• Verified and measured boot
• Authentication of firmware images and operating system boot loader at boot time
• Digitally signed firmware upgrades to ensure that root of trust authenticates all
signed upgrade firmware images
RBAC Role-Based Access Control (RBAC) allows for users to have different privileges, which
provides a means to separate administration roles to better align with skill sets and
responsibilities. The following table shows the various roles and responsibilities available
in PowerStore Manager, REST API, or PowerStore CLI.
Lightweight Authentication to PowerStore Manager can be performed either locally or using LDAP.
Directory Access Configuring authentication using LDAP allows for central management of authentication to
Protocol (LDAP) PowerStore Manager, REST API, or CLI. The PowerStore Manager roles can be assigned
to LDAP users or groups to manage the level of authorization that a user or group will
have in administering the storage system. For more information, see the Dell PowerStore
Manager Overview white paper and the Dell PowerStore Security Configuration Guide.
Multi-Factor PowerStoreOS 3.5 and later allows users to implement Multi-Factor Authentication (MFA)
Authentication through RSA SecurID. MFA, which is also known as advanced or two-factor
through RSA authentication, provides an additional layer of security when logging in or performing
SecurID transactions on the PowerStore system. MFA provides many advantages including:
increasing the security of accounts and data against hackers, mitigating the risk of poor
password practices, and helping users stay compliant with regulations. It can be used with
both local and LDAP user accounts for PowerStore.
SSH Each appliance can optionally enable external SSH access to the SSH port of the
appliance IP address, which takes the user to the service feature on the primary node of
an appliance. The appliance IP address floats between the two nodes of the appliance as
the primary designation changes. If external SSH is disabled, SSH access is disallowed.
When an appliance first comes up and is not configured, SSH is enabled by default so
that the appliance can be serviced if issues are encountered before it is added to a
cluster. When a new cluster is created or for a join cluster operation, all appliances have
SSH initially set to a disabled status.
Network File PowerStore supports NFSv3 through NFSv4.1. Secure NFS uses Kerberos to secure data
System (NFS) transmissions through user authentication and data signing through encryption. Kerberos
provides integrity (signing) and privacy (encryption). Integrity and privacy are not required
to be enabled: they are NFS mount options.
Without Kerberos, the server relies entirely on the client to authenticate users: the server
trusts the client. With Kerberos, this is not the case. The server trusts the Key Distribution
Center (KDC). It is the KDC that handles the authentication and manages accounts
(principals) and passwords. Moreover, no password in any form is sent over the wire.
Without Kerberos, the credential of the user is sent on the wire unencrypted and thus can
easily be recorded and spoofed. With Kerberos, the identity (principal) of the user is in the
encrypted Kerberos ticket, which can only be read by the target server and KDC. They are
the only ones to know the encryption key.
With NFS secure, encryption is supported using the Advanced Encryption Standard
(AES). Both AES128 and AES256 encryption in Kerberos is supported. Along with secure
NFS, this also impacts Server Message Block (SMB) and LDAP. These encryptions are
now supported by default by Windows and Linux. Although these new encryption methods
are more secure, it is up to the client whether they are used. From that User Principal
Name (UPN), the server builds the credential of that user by querying the active UNIX
Directory Service (UDS). Since Networked Information Service (NIS) is not secure, it is
not recommended to use it with secure NFS. We recommend using Kerberos with LDAP
or LDAP over SSL (LDAPS).
Secure NFS can be configured through PowerStore Manager. For more information, see
the Dell PowerStore: File Capabilities white paper.
File Level File Level Retention (FLR), also known as Write-Once, Read-Many (WORM), is available
Retention starting with PowerStoreOS 3.0. FLR prevents modification or deletion of locked files until
a specific retention date. PowerStore supports both FLR Enterprise (FLR-E) and FLR
Compliance (FLR-C) modes, which enable different degrees of file locking controls. FLR-
C is designed for companies that need to comply with federal regulations and meets the
requirements of SEC Rule 17a-4(f). For more information, see the Dell PowerStore: File
Capabilities white paper.
• Single CHAP authentication allows for the iSCSI target to authenticate the
initiator. When an initiator tries to connect to a target (Normal mode or through
Discovery mode), it provides a username and password to the target.
• Mutual CHAP allows for the iSCSI target and the initiator to authenticate each
other. The iSCSI initiator authenticates each iSCSI target that the group presents.
When an initiator tries to connect to a target, the target provides a username and
password to the initiator. The initiator compares the supplied username and
password to information that it holds. If they match, the initiator can connect to the
target.
CHAP is disabled by default. The user can enable it on the CHAP settings page in
PowerStore Manager or through the REST API.
Banner Starting in PowerStoreOS 2.1, storage administrators can create a customizable login
banner. The message appears when users access the PowerStore Manager login page. It
can be used to set a security warning for users.
HTTP Redirect With PowerStoreOS 3.0, users can be automatically redirected from http to https when
browsing to the PowerStore Manager. Users can turn this feature on or off from
PowerStore Manager and from the Initial Configuration Wizard (ICW). For more
information, see the Dell PowerStore Manager Overview white paper.
CEPA The Common Event Publishing Agent (CEPA) is supported starting with PowerStoreOS
3.0. CEPA delivers SMB and NFS file and directory event notifications to a server,
allowing third-party applications to take event-driven actions on PowerStore. These
actions can be used to detect ransomware, manage user access, configure quotas, and
provide storage analytics. Event data monitoring also helps customers recover quickly
from ransomware attacks by identifying how far back to restore their storage. CEPA
provides integration points for leading monitoring vendors such as Varonis, Stealthbits,
and DefendX. For more information, see the Dell PowerStore: File Capabilities white
paper and the Dell PowerStore Security Configuration Guide. For information about
configuring CEPA, see Configuring SMB and Configuring NFS on
Dell.com/powerstoredocs.
Data security
D@RE Data at Rest Encryption (D@RE) in PowerStore uses FIPS 140-2 validated Self-
Encrypting Drives (SEDs) by respective drive vendors for primary storage (NVMe SSD,
NVMe SCM, and SAS SSD). Starting with PowerStoreOS 2.1, the PowerStore 500 model
is fully FIPS 140-2 compliant. Starting with PowerStoreOS 3.0, all newly shipped models
above PowerStore 500 are also FIPS 140-2 compliant. For existing systems that are
upgraded to PowerStoreOS 3.0, a procedure to upgrade the system to be FIPS 140-2
compliant is available.
Encryption is performed within each drive before the data is written to the media. This
protects the data on the drive against theft or loss and attempts to read the drive directly
by physically deconstructing the drive. The encryption also provides a means to erase
information quickly and securely on a drive to ensure that the information is not
recoverable.
Reading encrypted data requires the authentication key for the SED to unlock the drive.
Only authenticated SEDs are unlocked and accessible. Once the drive is unlocked, the
SED decrypts the encrypted data back to its original form. The lockbox keeps the keys to
each drive in the appliance, which are each encrypted to keep sensitive data safe. We
recommend that you download the generated keystore archive file to an external, secure
location. The PowerStore appliance must contain all SEDs.
PowerStoreOS 3.0 supports the usage of external key management applications using
the Key Management Interoperability Protocol (KMIP). External key managers for storage
arrays provide extra protection in the event the array is stolen. If the external key server is
not present to provide the relevant Key Encryption Key (KEK), the storage system cannot
be powered on.
For more information, see the Dell PowerStore Security Configuration Guide.
Snapshots Snapshots provide a simple and effective method for protecting local data. Snapshots
provide immutable point in time copies of data and the ability to instantly recover if there is
data corruption or deletion. Because PowerStore snapshots are 100% read-only and
cannot be modified or manipulated, they are ideal for recovering instantly from
ransomware attacks.
Snapshot rules can be created as part of a protection policy to define a schedule for
snapshot creation, access, and retention. Only users with an Administrator or Storage
Administrator role can administer snapshot policies. When used with Dell AppSync,
application-consistent snapshots can automatically be created and scheduled.
For more information, see the following white papers: Dell PowerStore: Snapshots and
Thin Clones and Dell PowerStore: AppSync.
Secure Starting in PowerStoreOS 3.5, an optional secure snapshot setting provides additional
snapshots protection for snapshots, volumes, and volume groups. When the secure snapshot setting
is enabled, the snapshot and its parent resource are protected from deletion until the
retention period expires on all secure snapshots. This provides a cost-effective line of
defense against ransom attacks and accidental deletion of snapshots, volumes, or volume
groups.
Cyber Recovery Dell PowerProtect Cyber Recovery with CyberSense analytics offers a data protection
solution that isolates business-critical data away from attack surfaces, using an
automated operational air gap. Critical data is stored immutably in a hardened vault
enabling recovery with assured data availability, integrity, and confidentiality. Fully
integrated with CyberSense, the solution uses machine learning to identify suspicious
activity and allows users to recover known good data and resume normal business
operations with confidence. For more information, see the Dell PowerProtect Cyber
Recovery Solution Brief.
The Dell PowerProtect Cyber Recovery solution supports integration with an AWS
vaulting solution for protecting critical data to the cloud. The air-gapped cyber-recovery
vault securely isolates data within AWS, improving cyber resiliency and reducing the
impact of cyberattacks. For more information, see the Dell PowerProtect Cyber Recovery
for AWS Solution Brief.
Communications security
TLS Transport Layer Security (TLS) is a cryptographic protocol that allows for secure
communication over a network. PowerStore supports TLS 1.2 by default. PowerStore
uses the TLS 1.2 protocol as both a server (for management traffic) and as a client (for
example, when importing external data from older systems). TLS 1.1 is disabled by
default on PowerStore and is not considered a secure protocol. For some operations, an
earlier version of the TLS protocol may be required. For example, TLS 1.1 can be enabled
on PowerStore to allow users to import data from older systems that do not support TLS
1.2. When TLS 1.1 is enabled, both TLS 1.1 and TLS 1.2 are supported and considered
valid protocols.
Cluster Communications between PowerStore appliances in a cluster are secure. During cluster
communications creation, the primary node of the cluster primary appliance creates a certificate authority
(CA) certificate, also known as the cluster CA. The primary appliance passes the cluster
CA certificate to the appliances joining the cluster. Each PowerStore appliance in a cluster
generates its own unique Internet Protocol Security (IPsec) certificate that is signed by the
cluster CA certificate. The sensitive data that PowerStore appliances transmit over their
cluster network is protected by IPsec and TLS so that the security and integrity of the data
is preserved.
Replication and The PowerStore certificate and credential infrastructure allows for the exchange of server
data import and client certificates, and user credentials. This process includes:
• Retrieving and validating a server certificate during TLS handshake
• Adding the trusted CA certificate from the remote system to the credential store
Third-party Beginning with PowerStoreOS 2.1, customers can import a custom third-party certificate
certificate chain to PowerStore for connections to PowerStore Manager. The imported certificate
support replaces the onboard self-signed certificate for management.
With PowerStoreOS 3.5 and later, customers can import a custom third-party certificate
chain to PowerStore for the VASA Provider. The imported certificate replaces the onboard
self-signed certificate for VASA.
The certificates are visible from the Settings > Security > Certificates in PowerStore
Manager.
Auditing
Auditing Auditing provides a historical view of user activity on the system. A user with the role of
overview Administrator, Security Administrator, or Storage Administrator can search and view
configuration change events using the PowerStore Manager UI, PowerStore CLI, or REST
API. The events that are audited are not just security-related: all create, modify, and
delete operations are recorded to the audit log.
Remote logging The storage system supports sending audit log messages to a maximum of two hosts.
The hosts must be accessible from the storage system. Audit log message transfers can
use a one-way authentication (Server CA Certificates) or an optional two-way
authentication (Mutual Authentication Certificate). An imported certificate applies to each
remote syslog server that is configured to use TLS Encryption. For more information
about remote logging, see the Dell PowerStore Security Configuration Guide.
Federal compliance
STIG PowerStoreOS 3.5 and later offers STIG mode. Compliance with the U.S. Federal
Security Technical Implementation Guide requirements (STIG compliance) is a highly
requested item from many users in the federal space. STIG compliance is also a
prerequisite for the Approved Products List (APL) certification, which is a requirement for
some Department of Defense (DoD) organizations. STIG mode on PowerStore applies
configuration changes to the core of the product so that the underlying containers meet
STIG requirements related to the SLES operating system, embedded web server, internal
database use, and various networking functions. For more information about this feature,
see the Dell PowerStore Security Configuration Guide.
CloudIQ
CloudIQ CloudIQ is a cloud-based AIOps proactive monitoring and predictive analytics application
overview for Dell systems. Each customer is provided an independent, secure portal in which users
can register and monitor their systems from a single portal. The secure portal ensures that
each customer will only be able to see systems in their environment. CloudIQ is included
at no additional cost for systems under a ProSupport or higher contract.
CloudIQ uses machine learning and predictive analytics to identify potential issues,
anomalies, and security risks, and proactively notifies users, allowing them to take quick
action to remediate identified issues.
• Performance metrics are compared with historical values to determine any
deviation outside of normal ranges.
• Performance impacts are also analyzed to identify any increases in latency against
other metrics such as IOPS and bandwidth. The analysis determines if workload
characteristics or other competing resources cause an increase of latency and
identifies where the impact is coming from.
• Capacity anomaly detection uses hourly analysis of usage to identify any surges of
capacity utilization to identify resources at imminent risk of running out of space.
The Security Advisories section of the Cybersecurity feature in CloudIQ notifies users of
relevant Dell and VMware Security Advisories. Users quickly see a summary of
vulnerabilities specific to their systems and code levels along with links to remediation
details.
For more information about CloudIQ, see the Dell CloudIQ: A Detailed Review white
paper.
References
Dell The following Dell Technologies resources provide other information that is related to this
Technologies document. Access to the documents depends on your login credentials. If you do not have
documentation access to a document, contact your Dell Technologies representative.
• PowerStore Info Hub
• Dell PowerStore product documentation and videos
• Dell PowerStore: Security Configuration Guide
• Dell PowerStore: PowerStore Manager Overview
• Dell PowerStore: Snapshots and Thin Clones
• PowerStore: File Capabilities
• Dell PowerStore: AppSync
• Dell PowerProtect Cyber Recovery
• Dell PowerProtect Cyber Recovery for AWS
• Dell CloudIQ: A Detailed Review