Reference Guide
Table Of Contents
Tables........................................................................................................................................... 4
Chapter 1: PREFACE..................................................................................................................... 5
Chapter 2: Deployment models......................................................................................................6
Chapter 3: Product and Subsystem Security ................................................................................ 7
Security controls map.........................................................................................................................................................7
Authentication...................................................................................................................................................................... 7
Login security settings....................................................................................................................................................... 7
Failed login behavior......................................................................................................................................................8
Emergency user lockout...............................................................................................................................................8
User and credential management.................................................................................................................................... 8
Password complexity.................................................................................................................................................... 8
RBAC privileges....................................................................................................................................................................8
Data security.........................................................................................................................................................................9
Cryptography........................................................................................................................................................................9
Auditing and logging............................................................................................................................................................9
Alerting........................................................................................................................................................................... 10
Serviceability....................................................................................................................................................................... 10
Chapter 4: Contacting Dell........................................................................................................... 11
Contents
Contents 3