Veritas NetBackup™ Appliance Security Guide

Last Published:
Product(s): Appliances (3.2)
Platform: NetBackup Appliance OS
  1. About the NetBackup appliance Security Guide
    1.  
      About the NetBackup appliance Security Guide
  2. User authentication
    1. About user authentication on the NetBackup appliance
      1.  
        User types that can authenticate on the NetBackup appliance
    2. About configuring user authentication
      1.  
        Generic user authentication guidelines
    3.  
      About authenticating LDAP users
    4.  
      About authenticating Active Directory users
    5.  
      About authentication using smart cards and digital certificates
    6.  
      About authenticating Kerberos-NIS users
    7.  
      About the appliance login banner
    8. About user name and password specifications
      1.  
        About STIG-compliant password policy rules
  3. User authorization
    1.  
      About user authorization on the NetBackup appliance
    2. About authorizing NetBackup appliance users
      1.  
        NetBackup appliance user role privileges
    3.  
      About the Administrator user role
    4.  
      About the NetBackupCLI user role
  4. Intrusion prevention and intrusion detection systems
    1.  
      About Symantec Data Center Security on the NetBackup appliance
    2.  
      About the NetBackup appliance intrusion prevention system
    3.  
      About the NetBackup appliance intrusion detection system
    4.  
      Reviewing SDCS events on the NetBackup appliance
    5.  
      Running SDCS in unmanaged mode on the NetBackup appliance
    6.  
      Running SDCS in managed mode on the NetBackup appliance
  5. Log files
    1.  
      About NetBackup appliance log files
    2.  
      Viewing log files using the Support command
    3.  
      Where to find NetBackup appliance log files using the Browse command
    4.  
      Gathering device logs on a NetBackup appliance
    5.  
      Log Forwarding feature overview
  6. Operating system security
    1.  
      About NetBackup appliance operating system security
    2.  
      Major components of the NetBackup appliance OS
    3.  
      Vulnerability scanning of the NetBackup appliance
  7. Data security
    1.  
      About data security
    2.  
      About data integrity
    3.  
      About data classification
    4. About data encryption
      1.  
        KMS support
  8. Web security
    1.  
      About SSL usage
    2.  
      Implementing third-party SSL certificates
  9. Network security
    1.  
      About IPsec Channel Configuration
    2.  
      About NetBackup appliance ports
    3.  
      About the NetBackup Appliance firewall
  10. Call Home security
    1. About AutoSupport
      1.  
        Data security standards
    2. About Call Home
      1.  
        Configuring Call Home from the NetBackup Appliance Shell Menu
      2.  
        Enabling and disabling Call Home from the appliance shell menu
      3.  
        Configuring a Call Home proxy server from the NetBackup Appliance Shell Menu
      4.  
        Understanding the Call Home workflow
    3. About SNMP
      1.  
        About the Management Information Base (MIB)
  11. Remote Management Module (RMM) security
    1.  
      Introduction to IPMI configuration
    2.  
      Recommended IPMI settings
    3.  
      RMM ports
    4.  
      Enabling SSH on the Remote Management Module
    5.  
      Replacing the default IPMI SSL certificate
  12. STIG and FIPS conformance
    1.  
      OS STIG hardening for NetBackup appliance
    2.  
      Unenforced STIG hardening rules
    3.  
      FIPS 140-2 conformance for NetBackup appliance
  13. Appendix A. Security release content
    1.  
      NetBackup Appliance security release content
  14.  
    Index

NetBackup Appliance security release content

The following list contains the known security issues that were fixed and that are now included in this release of NetBackup appliance software:

General release content for version 3.2

The appliance software has been updated to the RHEL7.6 Kernel. Many packages and libraries have been updated that address the following security vulnerabilities:

CVE-2017-3735

CVE-2018-0495

CVE-2018-0732

CVE-2018-0737

CVE-2018-0739

CVE-2018-1092

CVE-2018-1094

CVE-2018-1118

CVE-2018-1120

CVE-2018-1130

CVE-2018-1259

CVE-2018-5344

CVE-2018-5391

CVE-2018-5407

CVE-2018-5743

CVE-2018-5803

CVE-2018-5848

CVE-2018-7208

CVE-2018-7456

CVE-2018-7568

CVE-2018-7569

CVE-2018-7642

CVE-2018-7643

CVE-2018-7740

CVE-2018-7757

CVE-2018-8781

CVE-2018-8905

CVE-2018-8945

CVE-2018-10322

CVE-2018-10372

CVE-2018-10373

CVE-2018-10534

CVE-2018-10535

CVE-2018-10689

CVE-2018-10844

CVE-2018-10845

CVE-2018-10846

CVE-2018-10878

CVE-2018-10879

CVE-2018-10881

CVE-2018-10883

CVE-2018-10902

CVE-2018-10940

CVE-2018-12327

CVE-2018-13033

CVE-2018-13405

CVE-2018-14348

CVE-2018-14618

CVE-2018-16838

CVE-2018-16843

CVE-2018-16845

CVE-2018-16871

CVE-2018-16884

CVE-2018-17101

CVE-2018-18311

CVE-2018-18397

CVE-2018-18557

CVE-2018-18559

CVE-2018-18661

CVE-2018-19039

CVE-2018-20699

CVE-2018-1000026

CVE-2019-3778

CVE-2019-3811

CVE-2019-3813

CVE-2019-3862

CVE-2019-3880

CVE-2019-5953

CVE-2019-6133

CVE-2019-6454

CVE-2019-9824

CVE-2019-10160

CVE-2019-11085

CVE-2019-11811

CVE-2019-1000020