Template:ZMC security notes

Table of contents
No headers

Version as of 00:48, 17 Apr 2024

to this version.

Return to Version archive.

View current version

You should take care to secure access to enterprise backup tools such as the Zmanda Management Console. Here is a list of some practices to help ensure that the ZMC and backups themselves are available only to authorized network administrators.

  • When installing the ZMC, choose https rather than http for ZMC access. Use http only if the administrator, backup server, and all backup clients reside in a single network that is isolated from the internet.
  • Change the password as soon as you log in to the default Admin account. Changing the password is described here.
  • Only create accounts on the backup server and the ZMC server for those trusted with the data processed by these systems.
  • Use backup set ownership as a mechanism to limit access to the user data that is being backed up.
  • Make sure strong passwords (i.e. alpha and numerical, at least 8 characters) are in effect for all login accounts: ZMC accounts, and OS accounts for the backup and MySQL users.
  • Enable encryption when using the ZMC to back up remote systems over the network. Take care to retain the encryption keys; if they are lost, the backup data will also be lost.

In addition to these precautions, you should review the overall security of your network and follow the best practices for the industry. Entering the term "Network Security Best Practices" into any web search engine will yield a wealth of current information on the subject.