Reference Guide
Table Of Contents
Tables........................................................................................................................................... 4
Chapter 1: PREFACE..................................................................................................................... 5
Chapter 2: Deployment models......................................................................................................6
Chapter 3: Product and Subsystem Security ................................................................................ 7
Security controls map.........................................................................................................................................................7
Authentication...................................................................................................................................................................... 7
Login security settings....................................................................................................................................................... 7
Failed login behavior......................................................................................................................................................8
Emergency user lockout...............................................................................................................................................8
User and credential management.................................................................................................................................... 8
Password complexity.................................................................................................................................................... 8
RBAC privileges....................................................................................................................................................................8
Data security....................................................................................................................................................................... 10
Cryptography...................................................................................................................................................................... 10
Auditing and logging.......................................................................................................................................................... 10
Alerting............................................................................................................................................................................ 11
Serviceability........................................................................................................................................................................ 11
Chapter 4: Contacting Dell...........................................................................................................12
Contents
Contents 3