Administrator’s Command Line Guide
Table Of Contents
- Introduction
- Accessing Storage Clusters via iSCSI
- Accessing Storage Clusters via S3 Protocol
- Monitoring Storage Cluster
- Managing Storage Cluster Security
- Maximizing Storage Cluster Performance
CHAPTER 5
Managing Storage Cluster
Security
This chapter describes some situations that may affect your cluster security.
5.1 Security Considerations
This section describes the security limitations you should keep in mind when deploying a storage cluster.
Traffic sniffing
Acronis Storage does not protect you from traffic sniffing. Anyone who has access to your network can
capture and analyze the data being sent and received through your network.
To learn how to keep your data secure, see Securing Node Communication in the Storage Cluster on page 61.
Absence of users and groups
Acronis Storage does not use the concept of users and groups, providing specific users and groups with
access to specific parts of a cluster. Anyone authorized to access a cluster can access all its data.
Non-encrypted data on disks
Acronis Storage does not encrypt data stored in a cluster. Attackers can immediately see the data once they
gain access to a physical disk drive.
60










