Enterprises have many reasons for encrypting their data, including addressing regulatory compliance, protecting against theft of customer data, and sensitive intellectual property.
PowerFlex appliance offers numerous built-in security features and capabilities cross multiple security domains to help you meet security and compliance requirements. Here is a summary of the PowerFlex appliance security features by security domains.
PowerFlex appliance architecture offers built-in security controls to meet authentication and authorization needs. Some of the key security controls are:
Confidentiality is one of the key pillars of the security triad (CIA). PowerFlex appliance offers both software and hardware based FIPS 140-2 compliant data at rest encryption. For hardware-based D@RE, you can choose self encrypting drives (SED)s that meet your business needs and use integrated CloudLink for key management. The integrated CloudLink can also be used to provide software-based encryption for PowerFlex storage data servers (SDS) that is transparent to the features and operation of the PowerFlex solution. CloudLink uses dm-crypt, a native Linux encryption package, to secure SDS devices. A proven high-performance volume encryption solution, dm-crypt is widely implemented for Linux machines.
CloudLink encrypts the storage data server devices with unique keys that are controlled by enterprise security administrators. CloudLink Center provides centralized, policy-based management for these keys, enabling single-screen security monitoring and management across one or more PowerFlex deployments.
PowerFlex appliance is built with Dell PowerEdge servers that are called PowerFlex nodes. PowerFlex nodes inherit all the cutting-edge cyber-resiliency and security features such as:
PowerFlex appliance not only offers built-in access/aggregation or leaf-spine network topology but also incorporates many advanced security features that are available with Cisco and Dell network switches. These security features help you protect your network against data loss or compromise resulting from intentional attacks and from unintended but damaging actions made by well-meaning network users. Some of the key security features include:
Audit and accountability's primary objectives are to maintain a record of system activities, and provide the ability to establish individual accountability, detect system anomalies, reconstruct system events using audit logs and records. PowerFlex appliance creates and retains system audit logs, event logs and alert records to that can be used for monitoring, trend and behavior analysis, incident investigation, and reporting of unlawful or unauthorized system activities.