No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


FusionStorage 8.0.0 Block Storage Security Configuration Guide 06

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).


FusionStorage block storage uses security control methods to manage data integrity, confidentiality, and availability, preventing storage resources and data from being accessed by unauthorized users. The following table describes the security control methods provided by FusionStorage block storage.

Table 1-1 Security control methods



Security deployment

Secure networking, plane isolation, and data encryption are used to ensure data transmission security physically and logically.

Operating system hardening

Operating system security is hardened to build a dynamic and complete security system.

Security configuration

  • Account and password management: By managing accounts, passwords, and security policies, you can specify the maintenance terminals and application servers that are allowed to access the storage system.
  • Certificate management: By importing security certificates, you can ensure communication security between the storage system and external entities.
  • Key management: FusionStorage block storage periodically updates keys.
  • Access control: By enabling access control, you can specify the IP addresses that are allowed to access FusionStorage block storage through DeviceManager and CLI.
  • Protocol security: Secure protocol versions are used and insecure protocols are disabled to avoid security risks.

Security maintenance

The system security is maintained through patch management, account maintenance, and password maintenance.

Data security features

Self-encrypting disks are supported. Data write encryption and data read decryption ensure data security.

Updated: 2019-11-14

Document ID: EDOC1100081422

Views: 1747

Downloads: 3

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Previous Next