White Papers

Additional resources
3 Best Practices for Securing Dell EMC SC Series Storage | BP1082
Table of contents
Revisions............................................................................................................................................................................. 2
Acknowledgements ............................................................................................................................................................. 2
1 Introduction ................................................................................................................................................................... 4
1.1 Audience ............................................................................................................................................................. 4
2 SC Series SAN ............................................................................................................................................................. 5
2.1 Basic security features ....................................................................................................................................... 6
2.2 Operational environment .................................................................................................................................... 7
2.3 Administrative access points .............................................................................................................................. 7
2.4 SupportAssist and Secure Console .................................................................................................................... 8
2.5 SupportAssist at air-gapped sites ....................................................................................................................... 8
2.6 CloudIQ data sources ......................................................................................................................................... 8
3 Protect data at rest with self-encrypting drives ............................................................................................................ 9
4 Protect data in flight .................................................................................................................................................... 10
5 Security scanning ....................................................................................................................................................... 11
5.1 SCOS port list ................................................................................................................................................... 11
5.2 DSM port list ..................................................................................................................................................... 12
5.3 DSM client port list ............................................................................................................................................ 14
5.4 DSM Server Agent port list ............................................................................................................................... 14
6 Conclusion .................................................................................................................................................................. 15
A Additional resources ................................................................................................................................................... 16
A.1 Related resources ............................................................................................................................................ 16