Reference Guide
Table Of Contents
Chapter 1: Preface........................................................................................................................ 4
Scope of document.............................................................................................................................................................4
Audience................................................................................................................................................................................ 4
Related Documentation......................................................................................................................................................4
Chapter 2: Deployment models......................................................................................................5
Chapter 3: Product and Subsystem Security................................................................................. 6
Security controls map.........................................................................................................................................................6
Access control......................................................................................................................................................................6
Login security settings....................................................................................................................................................... 6
Failed login behavior...................................................................................................................................................... 7
Emergency user lockout............................................................................................................................................... 7
User and credential management.................................................................................................................................... 7
Username and Password complexity.........................................................................................................................7
RBAC privileges....................................................................................................................................................................7
Data security......................................................................................................................................................................... 7
Cryptography........................................................................................................................................................................8
Auditing and logging............................................................................................................................................................8
Serviceability.........................................................................................................................................................................8
Chapter 4: Contacting Dell............................................................................................................ 9
Chapter 5: Accessing support content from the Dell EMC support site........................................ 10
Contents
Contents 3










