fbpx
cover background

Secure Configuration of Storage & Backups

Detect Configuration Drift & Securely Configure Your Storage & Backup Systems

Leading standards require organizations to implement a secure configuration process for each technology. This includes: 

  • Defining polices, security controls, baseline configuration and technical implementation guides per technology and to periodically update them.  
  • Validating that all systems adhere to the required configuration baseline and running regular configuration checks to detect drifts and unauthorized changes.  
  • Reassessing adherence to the baseline after configuration changes or software updates made to the system. 
  • Automation for configuration documentation, configuration drift detection and response 
  • Restricting access, rights, interfaces, services and more.

Storage and backup systems are critical IT infrastructure that retains all production data as well as the backup data. Managing baseline configuration and secure configuration process for your storage and backup systems is extremely difficult, since most tools focus on host operating systems and web applications, and are unable to effectively communicate with the rather unique storage and backup technologies.

CISOs Guide To ISO 27040: Storage Security

The release of ISO/IEC 27040:2024 provides an overview, analysis, and guidance for the security of storage & backup systems.

How StorageGuard Helps

With StorageGuard, you can automatically enable pre-defined baseline policies or define a custom baseline for your storage and backup systems. 

StorageGuard’s pre-defined policies include thousands of configuration checks based on guidelines from storage and backup vendors such as Dell EMC, Hitachi Vantara, NetApp, Veritas, Rubrik and many others. 

StorageGuard runs a configuration audit of your storage & backup systems, to ensure they’re hardened and not vulnerable. StorageGuard automatically detects configuration drift and unauthorized changes, while validating that all systems adhere to the required baseline. As mandated by CIS, NIST, ISO, PCI and others, StorageGuard enables you to establish a configuration baseline for your storage and backup platforms, ensuring it is set to the most stringent requirement, while automatically detecting and resolving configuration drifts.

Visibility

The StorageGuard scan will connect to each storage and backup technology using the native APIs and CLIs, to document the current configuration and then to detect drifts

Compliance

StorageGuard will detect when a security baseline requirement is not met, and provide remediation guidance.

Product Comparison

Secure Configuration and Baseline Configuration Compliance
Endpoint systems McAfee Endpoint Security | Microsoft Endpoint Manager | Symantec Endpoint Protection | Tanium | CrowdStrike SCCM | Ivanti Endpoint Manager | Qualys Policy Compliance | McAfee Endpoint Security | Symantec Endpoint Protection | Tanium
Applications | Tenable | Qualys | Rapid7 | Veracode | IBM Security AppScan Tripwire | Qualys Policy Compliance | McAfee Application Control | AlienVault USM Anywhere
Database systems Imperva | IBM Guardium | McAfee Database Security | Oracle Database Vault Imperva | IBM Guardium | McAfee Database Security | Trustwave
Host systems Tenable | Qualys | Rapid7 Tenable | Qualys | Rapid7 | Tanium
Storage systems StorageGuard StorageGuard
Backup systems StorageGuard StorageGuard

StorageGuard Supports These Storage & Backup Systems

Get in touch to run a configuration audit of your storage & backups, and ensure your configuration baseline is met.

Talk To An Expert

It’s time to automate the secure configuration of your storage & backup systems.

Virtual Panel with Check Point, Qualys and Rapid7: Vulnerability Management 2025 Innovations – January 16

Register
We use cookies to enable website functionality, understand the performance of our site, provide social media features, and serve more relevant content to you.
We may also place cookies on our and our partners’ behalf to help us deliver more targeted ads and assess the performance of these campaigns. You may review our
Privacy Policy I Agree