Default roles.................................................................................................................................................................. 14
Configuring roles.......................................................................................................................................................... 14
Role mapping................................................................................................................................................................. 14
External role associations ..........................................................................................................................................14
Network security................................................................................................................................................................14
Network exposure........................................................................................................................................................14
Communication security settings............................................................................................................................. 15
Firewall settings............................................................................................................................................................15
Data security....................................................................................................................................................................... 15
Data storage security settings.................................................................................................................................. 15
Data at rest encryption...............................................................................................................................................15
Data erasure.................................................................................................................................................................. 15
Data integrity.................................................................................................................................................................16
Other data security features..................................................................................................................................... 16
Cryptography...................................................................................................................................................................... 16
Cryptographic configuration options.......................................................................................................................16
Certified cryptographic modules.............................................................................................................................. 17
Certificate management............................................................................................................................................. 17
Auditing and logging.......................................................................................................................................................... 17
Logs................................................................................................................................................................................. 17
Log management..........................................................................................................................................................18
Log protection...............................................................................................................................................................18
Logging format............................................................................................................................................................. 18
Alerting............................................................................................................................................................................18
Physical security.................................................................................................................................................................18
Physical interfaces....................................................................................................................................................... 18
Physical security options............................................................................................................................................19
Customer service access........................................................................................................................................... 19
Tamper evidence and resistance..............................................................................................................................19
Serviceability....................................................................................................................................................................... 19
Chapter 4: Miscellaneous configuration and management elements.............................................20
Licensing..............................................................................................................................................................................20
Customer modification and customization..................................................................................................................20
Protect authenticity and integrity.................................................................................................................................20
Preventing malware..........................................................................................................................................................20
Specialized security devices ..........................................................................................................................................20
Installing client software..................................................................................................................................................20
Chapter 5: Internal security information...................................................................................... 21
Embedded component usage.......................................................................................................................................... 21
Internally discovered issues............................................................................................................................................. 21
Chapter 6: Resources and support...............................................................................................22
Chapter 7: Contacting Dell EMC ................................................................................................. 23
4
Contents