StorageGuard overview
StorageGuard™ addresses the challenges of securing the vulnerable enterprise data storage and backup platforms. It automatically collects the up-to-date configurations of the enterprise’s data storage systems and checks for security misconfigurations and vulnerabilities, including violation of vendor security best practices, organizational security baseline configuration requirements, ransomware protection guidelines, non-compliance with information security standards, and more. It informs the relevant IT teams of violations and how to repair them to close the security gaps that put critical data systems at risk.
Key benefits of StorageGuard
- Meets vendor and community-driven security configuration best practices.
- Validation of Configuration Compliance with information security standards (ISO, CIS Controls, PCI DSS, NIST, NERC CIP, DORA, and more).
- Automatically validates security baseline configurations.
- Automatically detects security vulnerabilities and misconfigurations.
- Tracks and reports on security configuration changes.
- Provides remediation guidelines for detected misconfigurations and facilitates automatic healing.
- Provides the platform for easily implementing custom security configuration checks for storage, backup, and host systems.
- Supports all leading enterprise data storage systems, including SAN, NAS, HCI, Storage Network, Storage Management, Storage Virtualization, Data Protection Systems, and more.
- An enterprise-grade solution – A secure and scalable solution that can be easily customized and/or integrated with other management systems.
New in Version 9.2.6
New features and highlights
This StorageGuard release introduces new features and major enhancements in the following areas:
Exploitability details in Vulnerability risk tickets
- The Vulnerability risk now includes additional information to assist with vulnerability response prioritization,
such as:
- Exploitability Score
- Known Exploits
- Existence of Exploit Proof-of-Concept (PoC)
- References
- A dedicated CVE breakdown is included for faster and clearer risk evaluation.
- The data is automatically enriched from leading sources such as NVD, Exploit-DB, CISA, and cve.org
- Supports security audits and reporting with deeper CVE context in each risk view
List view:
Newly Supported Platforms
The new release enables StorageGuard to collect security configurations and automatically detect best practice violations or vulnerabilities across newly supported platforms:
New: Dell EMC PowerStore
Improved CVEs knowledge base auto-update mechanism
- Enhanced update process is now using a robust cloud architecture
- Improved reliability and performance of automatic updates
- No need for manual steps, proxy configurations, or firewall changes
- Continuous access to the latest vulnerability data with minimal operational effort
Redesigned Baseline configuration and Vulnerability risk tickets view
- Content-first design that brings the most important information to the center for faster analysis
- Cleaner layout with clearer separation between details, impact, evidence, and remediation
- Side panel highlights key metadata such as status, severity, priority, assignee and more.
CI Owner field for better risk ownership
- Users can now be defined as owners for one or more Configuration Items (CIs).
- New CI Owner field added to assets for clear responsibility tracking.
- Risks are automatically assigned based on the CI Owner of each asset.
- CI Owner is visible in inventory, risk views, and API exports for full transparency.
Risk knowledge base update
The StorageGuard risk knowledge base has been updated with additional industry security best practices, vendor recommendations and vulnerabilities.
Enhanced security
This release includes security enhancements and resolves third-party vulnerabilities. Refer to Support Announcements for additional information
Additional changes and enhancements
The following section highlights additional notable changes or enhancements:
ID | Description |
SG-23185 | Enhanced checks for HP XP8 |
SG-25983 | Enhanced checks for IBM DS8000 |
SG-26340 | Improved CVE mapping for versions of PowerMax models 2500 and 8500 |
SG-26395 | Improved CVE mapping for versions of NetBackup FLEX appliance |
SG-24354 | Improved PowerMax firmware patch analysys |
SG-24565 | Improved timeout handling to keep scans running smoothly |
SG-24585 | Improved execution of Scan Task by CI Group and Site |
SG-26762 | Extended support for NetBackup FLEX auth options incl. user and service accounts |
SG-24127 | Corrected behavior for showing available evidence |
SG-25841 | Data Domain check SG-C0065T061V01 Data at-rest encryption is disabled" was split into two: encryption status and algorithm strength |
SG-26221 | Enhanced accuracy and performance of Commvault checks |
SG-27071 | Additional setting added for check SG-C0367T049V01: Secure internal communication |
SG-21944 | Ability to generate Findings and Compliance Reports by policy |
SG-24400 | Added 'End of Support Date' column to Assets table in Inventory |
SG-25147 | Option to filter 'Solved Findings' graphs by closure reason |
Fixed issues
The following issues are resolved:
ID | Description |
SG-24412 | Inaccurate finding for check SG-C0171T055V01: NTP server configuration |
SG-24415 | Inaccurate finding for check SG-C0397T061V01: Remote support configuration |
SG-24417 | Inaccurate finding for check SG-C0259T061V01: System cipher strength |
SG-24101 | Corrupted popup is shown |
SG-24107 | Data in Scan/Storage/Systems Scan errors column is wrong |
SG-24128 | Customizable Parameter (Fabric name) is missing in finding ticket |
SG-24640, 24639, 24637 | SN, Software Version and Scan date are not shown for ECS cluster nodes |
SG-24840 | Telemetry: scheduled report export to CSV previously generated corrupted files |
SG-24864 | Inaccurate finding for check SG-C0395T049V01: SMTP server configuration |
SG-24866 | Inaccurate finding for check SG-C0390T049V03: TLS level - Azure |
SG-25338 | Inaccurate finding for SG-C0039T187V01: LDAP server configuration - cDOT |
SG-25452 | Resolved redundant login on expired sessions |
SG-25459 | Resolved issue preventing users from editing risk details |
SG-26134 | Inaccurate finding for SG-C0039T067V01: LDAP server configuration |
SG-26146 | Inaccurate finding for SG-C0025T061V01: LDAP server redundancy |
SG-26393 | Inaccurate finding for SG-C0433T073V01: Approved Active-Directory provider |
SG-26519 | Improved ECS check SG-C0439T067V01: Required LDAP servers |
SG-26780 | Improved Netbackup FLEX check SG-C0262T234V01: Minimum password age |
SG-26809 | Improved DataDomain check SG-C0447T061V01: Self-signed certificate |
SG-26811 | Inaccurate finding for SG-C0467T061V01: Automatic retention lock status |
SG-24670 | Wrong description of check SG-C0422T151V03: SNMPv3 privacy encryption algorithm |
SG-25714 | Fixed missing Risk fields in API export |
SG-26097 | Improved logic of check SG-C0188T073V01: CIFS SMB configured ACL |
SG-26810 | Improved logic for check SG-C0344T061V01: CIFS/SMB server-signing is disabled |
Important Notes
Database Locale requirement
The database instance used as the backend database for the Continuity Software Platform must be configured with the English Locale. This requirement is complementary to other requirements identified in the Deployment guide and/or other documents.
Web Browser Support
StorageGuard supports Google Chrome, Firefox, and Microsoft Edge. Microsoft IE is not supported.
Recommended display size and resolution
StorageGuard’s web user interface is best displayed and operated with these specs:
- Full HD resolution (1080p)
- Screens 21” or larger
- Aspect ratio of 16:9.
Using smaller screens, coarser resolution, or both might cause incomplete display of some information. Use the browser’s zoom-out function to display all content.
Scan of Storage and Replication Management servers
It is recommended to scan all production / DR storage management servers as hosts. This is required even for management servers are already configured for scanning as storage proxies. A storage proxy scan operates at the API/CLI level whereas scanning the storage management servers as a host enables collection of additional configuration files and settings.
Scan of Windows hosts through WMI
Scanning of Windows hosts updated with KB3139940 might fail with an “Access Is Denied” message. To overcome this failure, please make sure that the user configured to authenticate to this server is a member of the Local Administrator group on the StorageGuard server. As of version 7.2.1, StorageGuard also provides an alternative method of scanning Windows servers using WMI which requires PowerShell version 5.1 or higher.
User account for technical support only
The csadmin user provides access to support tools that can cause damage if not used properly; This user is intended to be used by Continuity Software support engineers only. Enable and login with the csadmin user only when directed to do so by support personnel. This user is locked by default.
Recommended scan protocol for Windows hosts
StorageGuard supports a variety of scan options for Windows hosts. The recommended scan option is using WinRM over HTTPS.
Limitations
Assigning a profile to an Active Directory group
- When assigning a profile to an AD Universal Group, the StorageGuard master server must have access to the Global Catalog of the AD Forest.
- When assigning a profile to an AD Local Domain Group, StorageGuard will not be able to assign the Profile to AD Users from a different Domain – even though such configuration is valid within AD. In other words – an AD user can log in to StorageGuard (with all the correct profiles assigned) only if each AD Local Domain Group it belongs to is part of the same AD Domain the AD user belongs to.
Special characters are converted during object import to StorageGuardWhen importing names and properties of objects from CSV/CMDB/API, special characters such as “&”,‘no-break- space’ and certain UTF8 chars are converted to alphanumeric chars.
In specific cases scan error messages are not sufficiently informative
The Scan Troubleshooting screen occasionally presents scan error messages that include the error code but no additional details.
Workaround: Run the erroneous command or script manually to see the full scan error message. If further assistance required, contact Technical Support.
SSH key supports only keys with less than 4000 characters [P-6645]
Elevated rights required for certain read-only Commvault API calls
Few of the optional read-only API calls executed by StorageGuard on Commvault require elevated rights - SNMP & Audit Trail API. It's recommended to grant these rights to enable StorageGuard to perform a comprehensive risk analysis however it is not mandatory. Whether these rights are granted or not, StorageGuard will only run read-only APIs and commands.
Elevated rights required for certain read-only Dell EMC Data Domain commands
Few of the read-only commands executed by StorageGuard on Data Domain require the limited-admin role. It's recommended to grant these rights to enable StorageGuard to perform a comprehensive risk analysis however it is not mandatory. Whether these rights are granted or not, StorageGuard will only run read-only APIs and commands. Alternatively, configure the scan user with the read-only user role.
Elevated rights required for certain read-only Dell EMC Unity API calls
Few of the read-only API calls executed by StorageGuard on Unisphere for Unity require the securityadministor role. It's recommended to grant these rights to enable StorageGuard to perform a comprehensive risk analysis however it is not mandatory. Whether these rights are granted or not, StorageGuard will only run read-only APIs and commands. Alternatively, configure the scan user with the read-only operator role.
Elevated rights required for certain read-only Hitachi Ops Center API calls
Few of the read-only API calls executed by StorageGuard on Hitachi Ops Center require the Security Administrator role. It's recommended to grant these rights to enable StorageGuard to perform a comprehensive risk analysis however it is not mandatory. Whether these rights are granted or not, StorageGuard will only run read-only APIs and commands. Alternatively, configure the scan user with the read-only operator role.
Elevated rights required for scanning Windows hosts
It’s recommended to scan a Storage Management system both at the application level and the OS level. OS-level scan is optional but recommended for a comprehensive security configuration analysis. The OS-level scan is performed by connecting through either WinRM or WMI and then running read-only commands and queries. These commands and queries, even though read-only, require elevated rights.
NetBackup version support
StorageGuard supports scanning NetBackup systems from release 8.1 and above. NetBackup 7.x and 8.0.x are not supported.
CVE detection limitation
StorageGuard may report a CVE vulnerability that was either worked around or mitigated through remedial steps other than applying software updates.
CVE detection knowledgebase
The CVE knowledgebase is limited to advisories and CVEs that have been announced by the vendor, MITRE or other source to the community.
Comments
0 comments
Article is closed for comments.