Reference Guide
Table Of Contents
Figures..........................................................................................................................................4
Tables........................................................................................................................................... 5
Chapter 1: PREFACE..................................................................................................................... 6
Terms used in this document............................................................................................................................................7
Chapter 2: Deployment models......................................................................................................8
Security profiles................................................................................................................................................................... 8
Chapter 3: Product and Subsystem Security................................................................................. 9
Security controls map.........................................................................................................................................................9
Authentication...................................................................................................................................................................... 9
Access control................................................................................................................................................................ 9
Login security settings......................................................................................................................................................10
Failed login behavior.................................................................................................................................................... 10
Remote connection security......................................................................................................................................10
User and credential management.................................................................................................................................. 10
Network security................................................................................................................................................................10
Network exposure........................................................................................................................................................10
Outbound ports............................................................................................................................................................ 10
Inbound ports................................................................................................................................................................. 11
Data security........................................................................................................................................................................ 11
Auditing and logging...........................................................................................................................................................11
Serviceability........................................................................................................................................................................ 11
Product code integrity...................................................................................................................................................... 12
Chapter 4: Miscellaneous Configuration and Management........................................................... 13
Dell EMC System Update licensing................................................................................................................................13
Protect authenticity and integrity..................................................................................................................................13
Manage backup and restore in Dell EMC System Update....................................................................................... 13
Contents
Contents 3