Administrator’s Command Line Guide

Table Of Contents
CHAPTER 5
Managing Cluster Security
This chapter describes some situations that may affect your cluster security.
5.1 Security Considerations
This section describes the security limitations you should keep in mind when deploying a Acronis Storage
cluster.
Traffic sniffing
Acronis Storage does not protect you from traffic sniffing. Anyone who has access to your network can capture
and analyze the data being sent and received through your network.
To learn how to keep your data secure, see Securing Server Communication in Clusters on page 60.
Absence of users and groups
Acronis Storage does not use the concept of users and groups, providing specific users and groups with access
to specific parts of a cluster. Anyone authorized to access a cluster can access all its data.
Non-encrypted data on disks
Acronis Storage does not encrypt data stored in a cluster. Attackers can immediately see the data once they
gain access to a physical disk drive.
59