HP StorageWorks Application Recovery Manager Installation and Licensing Guide (T4395-96002, February 2008)
Maintaining the Installation
Security Considerations
Chapter 3 61
Security Considerations
This section describes the security elements of Application Recovery
Manager. It describes the advanced settings that can be used to enhance
the security of Application Recovery Manager with prerequisites and
considerations that have to be taken into account.
Since enhancing security in an entire environment requires additional
effort, many security features cannot be enabled by default.
The considerations described in this chapter apply not only when the
security settings are changed, but must also be followed when
configuring new users, adding clients, or making any other changes these
considerations apply to. Any changes in the security settings can have
cell-wide implications and should be carefully planned.
Security Layers
Security has to be planned, tested and implemented on different
security-critical layers to ensure the secure operation of Application
Recovery Manager. Such layers are Application Recovery Manager
clients, Cell Manager and users. This section explains how to configure
security on each of these layers.
Client Security
Application Recovery Manager agents installed on clients in the cell
provide numerous powerful capabilities, like access to all the data on the
system. It is important that these capabilities are available only to the
processes running on cell authorities (Cell Manager and Installation
Server), and that all other requests are rejected.
Before securing clients, it is important to determine a list of trusted
hosts. This list must include:
• Cell Manager
• Relevant Installation Servers
• For some clients also a list of clients that will access them remotely.