The
Cyber Recovery software copies a
Sheltered Harbor participant's data into the
Cyber Recovery vault and ensures that it complies with the
Sheltered Harbor Turnkey Data Vaulting Solution specification.
The
Sheltered Harbor feature must be enabled before you can access
Sheltered Harbor options and use the
Sheltered Harbor feature. Each financial institution that you plan to add to the deployment requires a
Sheltered Harbor license. Request a license file from Sheltered Harbor.
A
Sheltered Harbor copy action performs a
Cyber Recovery Secure Copy operation.
The
Cyber Recovery software:
Performs a
DDMTree replication from the
DD production system to the
DD system in the
Cyber Recovery vault. This operation is a Sync operation.
Verifies that the data matches the manifest and that there are no anomalies.
Performs a fast copy of the replication. This operation is a Copy operation.
Creates an archive volume of all the data.
Encrypts the archive volume.
Retention locks the encrypted archive volume. This operation is a Lock operation.
NOTE:The
Cyber Recovery vaultDD system must have a Retention Lock Governance or Compliance license. A Retention Lock Compliance license is recommended.
Generates a report with an email containing an attestation for submission to
Sheltered Harbor to confirm that the data has been copied, verified, certified, and locked. Automated scripts that are outside of the
Cyber Recovery vault can submit the attestation.
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\