S 4.274 Secure basic configuration of storage systems

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator

All configuration work on storage systems must be performed according to the security policy drawn up (see S 2.352 Drawing up a security policy for NAS systems, S 2.353 Drawing up a security policy for SAN systems) and documented and annotated as described in S 2.358 Documenting the system settings of storage systems.

Operating system

Storage systems that can be operated as NAS systems are specialised servers administered internally by an operating system. This operating system is usually a lighter and higher-performance version of a standard operating system.

Even in SAN systems, which may consist of a number of individual components, some individual components may be administered by close-to-standard systems.

For these operating systems in particular, but also for "unknown" manufacturer-specific systems, it must be ensured before initial operation that the latest versions of all software and firmware components are installed to ensure the best possible stability of the system and to ensure protection against attacks, for example by worm programs.

Basic configuration

Before a storage system is integrated into IT production, a secure base configuration must be set. Many devices are delivered by the manufacturer with a default configuration primarily designed for fast start-up and the widest possible range of functionality, but with practically no security mechanisms enabled. For this reason, the default settings and the basic configuration must be checked offline over the administration network or in a secure test network specifically set up to this end.

When configuring the system, it must be taken into account that not every administration or configuration tool (console, web interface, external configuration program) will display all relevant information under some circumstances.

For this reason, it is important to be able to check the available documentation to see if all relevant parameters were set properly. It is desirable to have configuration tools that provide assessable documentation of all steps taken to configure the storage device at least in local log files, although a central logging system would be even better.

It is recommendable to divide the basic configuration procedure into the following steps:

User accounts and passwords

The capabilities for configuring users and roles and for assigning authorisations differ from manufacturer to manufacturer, sometimes significantly. For this reason, it is recommended to draw up a detailed concept for the particular devices according to the rights and role concept designed for the administration of the storage devices.

There are often one or more default administration user IDs with universally known standard user names and passwords, and sometimes even without passwords. Lists of manufacturer-specific default accounts and passwords can be downloaded from relevant websites.

When a device is operated for the first time, these default user accounts must be changed, if possible. In any case, though, the passwords for the default accounts must be changed. Unused user accounts must be deactivated.

After that, the planned user accounts and roles must be set up according to the rights and roles concept.

Configuration files must be specifically protected against unauthorised access. Even if the passwords are secure because they are stored in an encrypted form, for example, it must be ensured that such files are protected against unauthorised viewing, since they contain business-critical information and since encrypted passwords can often be decrypted in a short time using appropriate programs.

The password policies of the organisation in terms of the password length, strength, and change frequency must be followed in any case.

Login banners

No login messages from a storage system should be visible outside of the administration network. These login messages often contain information (for example the model or version number, software

release number, or patch level) a potential attacker could use to his/her advantage.

If the ability to log in to the intranet of the organisation cannot be eliminated, the standard login message should be replaced by a modified version which does not contain any internal information. The model and version number of the device and the version number of the operating system must not be displayed in the login banner under any circumstances. The following information should be displayed on the device instead when a user logs in:

Logging

The internal log on the storage system must be configured in such a way that all information, especially information required for early detection of problems, is in plain view.

The time and date on the storage system and the computer used for administration and logging should be synchronised using an NTP server.

It is generally recommended to synchronise all IT systems in the organisation to a uniform time and date via NTP.

Interfaces

Unused interfaces on storage systems must be disabled. This means that unused connections (e.g. a serial interface for connecting a terminal) should not have cables connected to them and that unused services should be disabled explicitly.

Testing the configuration

At the end of the test operation phase, the standard systems should be tested and a security check should be performed on the administration network.

Backing up the configuration

The configuration files of the basic configuration form the basis for the further configuration. Backup copies must be made of the default configuration delivered with the device, as well as of the data resulting from the basic configuration, and these copies must be stored securely.

These copies form the basis for a restart after serious malfunctions (see S 6.98 Contingency planning for storage systems).

Review questions: