Contents


Security Hardening Guide

Legal notice

Contents

About this document

1. NSP OS security

What host OS hardening measures are recommended?

2. Database security

What is recommended for database hardening for classic management?

3. Kubernetes security

What is recommended for Kubernetes hardening?

4. Communications and network security

What should I configure for network and mediation security?

What should I know about Transport Layer Security (TLS) in NSP?

How do certificate signatures work?

5. NSP user security

How does NSP user authentication work?

What is NSP User Access Control (UAC)?

What is login banner customization?

6. NE security in NFM-P

What encryption options do I have in NFM-P?

7. Network security in the NSP UI

What is anti-theft on the NE?

What is an anti-theft policy in NSP?

How do I create an anti-theft policy?

How do I edit or delete an anti-theft policy?

How do I update an anti-theft password?

8. RHEL OS security hardening

Which RHEL 8 CIS benchmark recommendations does NSP support?

What options do I have for RHEL sudoer configuration?

9. Data privacy summary

How do NSP network and user data privacy work?

10. NSP interface cryptography

What algorithms are supported per NSP component?