Dell+PowerEdge+Server+Concepts+Server+Security+-+Participant+Guide
Dell+PowerEdge+Server+Concepts+Server+Security+-+Participant+Guide
SERVER CONCEPTS
SERVER SECURITY
PARTICIPANT GUIDE
PARTICIPANT GUIDE
Dell PowerEdge Server Concepts Server Security-SSP
Site Security 6
Authentication 6
Physical Site Security 8
Server Security Features 12
Data Wiping and Disposal 19
Server Backup 22
Introduction to Backup 22
Data Storage Backup Plans and Policies 24
Storage Solutions 27
Data Backup Execution and Frequency 35
Restoring Data and Verifying Backups 40
Server Configuration Profiles 42
Lifecycle Controller 43
Easy Restore 45
access."
Authentication
Authentication Importance:
Authentication Examples:
• Multifactor
• RSA SecurID
• Duo Security
• Elevated
• FIDO5
• LDAP6
• Active Directory
5 FIDO Alliance uses the FIDO protocols that utilize standard public key
cryptography techniques to provide stronger authentication.
6 The Lightweight Directory Access Protocol (LDAP) is a vendor-neutral
Select each tab to learn more about the aspects of physical security.
Risk
The significance of site security ensures that its components have been
protected at the physical level. The most important security measures are
to:
PowerEdge Features
Securit Description
y
Aspect
Securit
y Latch
The PowerEdge R760xa BIOS settings under System Security have a Power
Button setting that disables the front power button.
Root of Trust is a concept that starts a chain of trust that must ensure
systems boot with legitimate code.
The Root of Trust is an aspect of the cyber resilient architecture that helps
in providing effective protection from malicious attacks.
If the first piece of code that is run is verified as legitimate, the execution
of each subsequent piece of code trusts the credentials.
Boot Guard
A BIOS attack is typically hard to detect because the BIOS runs before the
operating system and other security software loads.
7 Boot Guard prevents the computer from running firmware images not
released by the system manufacturer.
TPM 2.0
• No TPM
TPM chipset
A TPM chip is installed inside a PowerEdge server. TPM is optional and not automatically
deployed in all deliveries.
Secure Boot
8 The security module supports the compliant with the Trusted Computing
Group (TCG) specification.
9 A specific TPM chipset that are manufactured by NationZ is made
Lockdown Mode
CPU Security
Server CPU security involves protecting the CPU from various attacks,
including malware10, side-channel attacks11, and privilege escalation
attacks12.
• Secure booting
• Access controls
• Patch management
• Monitoring.
Select each tab for more details about data wiping and data disposal.
Data Disposal
Do not use the 'delete' command as it does not delete the data
completely from your system. Proper full data erasure usually
require overwriting data on the same location.
Introduction to Backup
A backup server when the computing system is connected to several devices through
network.
A backup policy is rules and procedures that determine the strategy of and
organization when backing up data for protection against data loss.
Dell CloudIQ
There are three major backup storage solutions: Primary, Backup, and
Archival.
• Primary storage is for daily use that ranges from operating system,
software, and files.
• Backup storage is used on specific critical data such as databases,
codes, and software. Its secondary function is for recovery when there
is an accidental data loss.
• Archival storage is a repository for long-term storage that is designed
to optimize storage for documentation and audit logs.
Primary
Dell PowerFlex
Dell PowerVault
Storage
Dell
Dell DR Series PowerProtec
Disk Backup and PowerVault t DD and DP
System Recovery Linear Tape Open Series
System (LTO) Tape Appliances
Dell Storage DL
Drives
Series
Dell DX Object
Storage
Dell
ML
Serie
s
Stora
ge
Select each numbered tab to learn about the different backup practices.
Dell Cloud Clinical Archive (DCCA) is a managed service using secure hybrid cloud.
Data retention and integrity is vital for backups to enable compliance with
regulations and internal business policies. It can also ensure the integrity
and authenticity of data. An audit trail must reveal the integrity of data.
16Data archives are indexed so that the files or parts of files can be
located and retrieved.
Searchability
17Data that are restored from archival tapes often takes a long time to
retrieve and examine.
Consider the type of storage and the location. As an example, for offline
tapes that are used for backups shall be stored in an adjacent fireproof
safe in a separate building.
Verify backups and restores are working. The ability to restore data from
backups should be tested at least once per month.
The iDRAC page showing the export options to backup the server profile.
• RAID
• BIOS
• iDRAC
• NIC
18
Remote administrators can perform critical management functions while
maintaining server and network security.
Easy Restore Storage is part of the server front panel that can store up to
4 MB of data. All data is backed up in a backup flash device automatically.
If BIOS detects a new system board and the service tag in the backup
flash device, BIOS prompts the user to restore the backup information.
19 Easy Restore does not back up the firmware drivers, due to size
limitations.
15G
Generation 15 modifier to distinguish different features available for
generation 15 servers.
2S
Two socket form factor. Used to identify the family of servers. PowerEdge
servers can have 1S, 2S, or 4S. See the PowerEdge rack server portfolio
page for details.
AI
Artificial Intelligence (AI) is the designing and building of intelligent agents
that receive precepts from the environment and act to affect that
environment.
AI Inferencing
Machine learning inferencing is the ability of a system to make predictions
from novel data. ML Inferencing teaches an AI to sort different fruits by
color. The user shows the AI a tomato, apple, and cherry to learn the fruits
are red. Later, when showing the AI a strawberry, it can infer the
strawberry is also red.
DIMM
Direct-Access Inline Memory Module. DIMMs are available in varying
capacities. All DIMMs in a cache must have the same capacity.
DRAM
x4, x8, and x16 DIMMs refers to the width of the DRAM components on a
memory module. x4 DIMMs use DRAM components that have a 4-bit data
width. x8 DIMMs use components with an 8-bit data width. x16 DIMMs
use components with a 16-bit data width.
E3 Drives
The Enterprise and Data Center Small Form Factor (EDSFF) is an SSD
design for NAND and Storage Class Memory (SCM). EDSFF optimizes
storage in enterprise, private, and public data centers.
EE
Enhanced Edge (EE) Intel CPU's are used to acceleration network traffic
in Edge deployments. Edge computing is a distributed information
technology (IT) architecture in which client data is processed at the
periphery of the network, as close to the originating source as possible.
GFC
Gigabit Fibre Channel
HCI
Hyper Converged infrastructure (HCI) combines compute, virtualization,
storage, and networking in a single cluster.
HII
The Human Interface Infrastructure (HII) configuration utility is a storage
management application integrated into the System BIOS <F2> It is used
to configure and manage RAID disk groups, virtual disks, and physical
disks. This utility is independent of the operating system.
HPC
HW RAID
Form of RAID. The motherboard or a separate RAID card handles the
processing.
IDPA
The Integrated Data Protection Appliance (IDPA) is a converged solution
that offers complete backup, replication, recovery, deduplication, instant
access and restore.
iDRAC
The Integrated Dell Remote Access Controller (iDRAC) is designed for
secure local and remote server management and helps IT administrators
deploy, update, and monitor PowerEdge servers.
IDSDM
Redundant SD-card module for embedded hypervisors. PowerEdge
servers can boot to the hypervisor out-of-the-box. The embedded
hypervisor is mirrored across dual SD cards using an integrated hardware
controller.
IEEE 802.3
The Electrical and Electronics Engineers (IEEE) 802.3 is a collection of
IEEE standards. The working group defining the physical layer and Media
Access Control (MAC) of Data Link Layer in the Ethernet set the
standards.
iSM
The Integrated Dell Remote Access Controller(iDRAC) Service Module
(iSM) is a lightweight optional software application that can be installed on
PowerEdge servers. The iDRAC Service Module complements iDRAC
interfaces: Graphical User Interface (GUI), RACADM CLI, Redfish and
Web Service Management (WSMan) with additional monitoring data. The
iDRAC Service Module architecture uses IP socket communication and
provides additional systems management data (OS/device driver) to
iDRAC and presents one-to-many consoles with access to systems
management data through OS standard interfaces.
Latency
Latency is the response time or the period of time that a component waits
for an answer from another component. Latency is the time it takes for the
storage to respond to a request.
LRDIMM
Load-Reduced DIMM. Has higher densities than RDIMMs. Uses a
memory buffer chip to reduce the load on the server memory bus.
LTO
ML
Machine Learning (ML) is an application of AI where systems use data to
learn how to respond, rather than being explicitly programmed.
MT/s
Mega-Transfers per Second (MT/s). Measurement of bus and channel
speed in millions of cycles per second.
Multicasting
Multicasting involves sending the same message to many endpoints such
as in a video conferencing facility.
NL-SAS
Near Line SAS (NL-SAS): NL-SAS is combining the form of a SATA disk
with a SAS connector.
NVDIMM
Non-Volatile DIMM
NVMe
Non-Volatile Memory Express (NVMe). Communications interface for
PCIe-based SSDs. Used to increase efficiency and performance.
Object storage
OCP
Open Compute Project (OCP) is an organization that shares designs of
data center products and best practices among companies. OCP designs
and projects include server designs, data storage, rack designs, and open
networking switches. Read more information about the organization by
going to www.opencompute.org.
OMSA
OpenManage Server Administrator (OMSA) is a software agent that
provides a comprehensive, one-to-one systems management solution in
integrated web browser-based graphical user interface (GUI) or command
line interface(CLI) throught the operating system.
OSM
Dell Open Server Manager (OSM) is a Dell implementation of open-source
Baseboard Management Controller (OpenBMC) on PowerEdge servers.
OSM combines OpenBMC software with Dell servers. OpenBMC is a
Linux foundation open-source project to produce an implementation of the
Baseboard Management Controller's (BMC) Firmware Stack. The
OpenBMC stack allows users to remotely monitor, manage, and control
servers across different infrastructure.
PCH
Platform controller hub (PCH) controls certain data paths and support
functions used in conjunction with Intel CPUs.
PCIe
PERC
PowerEdge RAID Controller (PERC). Family of controllers that enhance
performance, increase reliability, add fault tolerance, and simplifies
management.
RAID
Redundant Arrays of Independent Disks (RAID). RAID controllers combine
multiple server physical hard drives together into a virtual drive or multiple
drives to improve data efficiency and protection.
RDIMM
Registered DIMM. Dual in-line memory module (DIMM) with improved
reliability.
RSA SecurID
RSA SecurID is multi-factor authentication (MFA) technology used to
protect network resources, such as applications and websites. MFA
mitigates risk and maintains compliance without disrupting employee
productivity. MFA can confirm user identities to ensure they are only
granted access to the resources they need to do their jobs. RSA SecurID
can quickly and securely provide appropriate access to resources both on-
premises and in the cloud.
SAN
A Storage Area Network (SAN) is a networked storage infrastructure (SAN
fabric). SANs connect servers to storage devices by using either a Fibre
Channel (FC) switch fabric technology or Internet Small Computer System
Interface (iSCSI) over an Ethernet LAN architecture.
SAS
SAS (serial-attached SCSI) is a type of SCSI that uses serial signals to
transfer data, instructions, and information. SAS drives are dual ported.
SATA
SCSI
A set of standards for physically connecting and transferring data between
computers and peripheral devices. The SCSI standards define
commands, protocols, electrical, optical and logical interfaces.
SDS
Storage data services such as APEX Data Storage Services. APEX is an
as-a-Service portfolio of scalable and elastic storage resources. The
storage as-a-Service model simplifies the storage process.
SED
Self-Encrypting Drive (SED) is a type of hard drive that provides full-disk
encryption through onboard drive hardware. Extra hardware external to
the drive is not required to encrypt the data on the drive. As data is written
to the drive, it is automatically encrypted, and data read from the drive is
decrypted. A chipset in the drive controls the encryption and decryption
processes. An onboard chipset allows for a transparent encryption
process. System performance is not affected, providing enhanced security
and eliminating dependencies on system software.
SNAP I/O
Balances I/O performance. CPUs share one adapter, which prevents data
from traversing the inter-processor link when accessing remote memory.
SP
A service provider (SP) is a company that provides its subscribers access
to the internet.
STP cable
Shielded Twisted Pair (STP) Ethernet cable that is commonly used for
high-speed networks. A metallic substance shields STP. An additional
metal foil wraps each set of twisted wire pairs together.
UDIMM
Unregistered or unbuffered DIMM. UDIMMs do not have an onboard
register as seen with an RDIMM. UDIMMs are typically used in desktops
and laptops.
UEFI boot
Unified Extensible Firmware Interface (UEFI). UEFI secure boot prevents
systems from booting from unsigned or unauthorized preboot device
firmware, applications, and operating system boot loaders. Without secure
boot enabled, systems are vulnerable to malware corrupting the startup
process. UEFI is a firmware interface that connects the firmware to the
operating system. UEFI initializes the hardware components and starts the
operating system.
UTP cable
Unshielded Twisted Pair (UTP) Ethernet cable that is commonly used
between a system and wall. It is also used for desktop communication
applications.
VLTi
Virtual Link Trunking interconnect (VLTi). Switch stacking is not supported
in OS10. VLTi aggregates two identical physical switches to form a single
logical extended switch. This single logical entity ensures high availability
and high resilience for all its connected access, core switches, and clients.
vRAN
Virtualized radio access networks (vRANs) are a way for
telecommunications operators to run their baseband functions as
software. One of the primary benefits of virtualizing radio access networks
(RANs) is that RAN functions no longer require special proprietary
hardware to run, and can instead be run on standard servers. This is
achieved by applying the principles of virtualization to RAN, and is usually
one part of a larger network function virtualization (NFV) effort.