Management support for FIPS 140-2..........................................................49
Data Security Settings 51
About Data at Rest Encryption (physical deployments only)...................... 52
Encryption status.......................................................................... 52
Backup keystore file...................................................................... 53
Data at Rest Encryption audit logging........................................... 54
Hot spare operations..................................................................... 54
Adding a disk drive to a storage system with encryption activated....
55
Removing a disk drive from a storage system with encryption
enabled..........................................................................................55
Replacing a chassis and SPs from a storage system with encryption
enabled..........................................................................................55
Data security settings.................................................................................56
Security Maintenance 57
Secure maintenance...................................................................................58
License update.............................................................................. 58
Software upgrade..........................................................................58
EMC Secure Remote Services for your storage system............................. 59
Security Alert Settings 61
Alert settings..............................................................................................62
Configuring alert settings........................................................................... 63
Configure alert settings for email notifications ............................. 63
Configure alert settings for SNMP traps....................................... 63
Other Security Settings 65
Physical security controls (physical deployments only)..............................66
Antivirus protection....................................................................................66
TLS cipher suites 67
Supported TLS cipher suites...................................................................... 68
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Appendix A
CONTENTS
4 EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide