<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NetApp secure configuration - Tenable?  DISA?  Bueller? in ONTAP Discussions</title>
    <link>https://community.netapp.com/t5/ONTAP-Discussions/NetApp-secure-configuration-Tenable-DISA-Bueller/m-p/130020#M28310</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is sort of an open-ended question - more seeing what folks out there are doing in this particular space than necessarily looking for the "right" answer. &amp;nbsp;Anyway, we've dabbled with various approaches to standardizing our Data ONTAP builds and security lock-down procedures. &amp;nbsp;Several years ago, we worked with our Nessus scanning team to integrate the Tenable compliance template for NetApp into their scanners (for our 7mode systems):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.tenable.com/blog/nessus-now-secures-netapp-data-ontap" target="_blank"&gt;https://www.tenable.com/blog/nessus-now-secures-netapp-data-ontap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This wasn't a perfect check, but it was a nice view to show to auditors and it gave us a warm fuzzy that we weren't leaving anything obvious hanging in the breeze. &amp;nbsp;We'd also leverage the OpsMgr configuration comparison tool to see if a new 7mode system that we rolled out was substantively different (security-wise) than our already built "gold" systems. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Fast forward to ONTAP and a lot of those tools are gone. &amp;nbsp;NetApp and Tenable haven't collaborated on an ONTAP 9.x compliance template and the configuration comparison tools have sort of lagged behind the times as well.&amp;nbsp; We’ve mostly relied up on the TRs and such associated with best practices and built audit files for our provisioning procedures.&amp;nbsp; These work fine at build, but we don’t have our NetApp equipment locked down behind a CM tool (like TripWire) that would “flag” any updated variations to that configuration in compliance with our build standard.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyway, what else have folks done in this area?&amp;nbsp; Any great ideas out there for automating cluster provisioning and SVM builds in a secure manner?&amp;nbsp; Automated checks for security compliance?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;</description>
    <pubDate>Wed, 04 Jun 2025 15:12:49 GMT</pubDate>
    <dc:creator>colsen</dc:creator>
    <dc:date>2025-06-04T15:12:49Z</dc:date>
    <item>
      <title>NetApp secure configuration - Tenable?  DISA?  Bueller?</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/NetApp-secure-configuration-Tenable-DISA-Bueller/m-p/130020#M28310</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is sort of an open-ended question - more seeing what folks out there are doing in this particular space than necessarily looking for the "right" answer. &amp;nbsp;Anyway, we've dabbled with various approaches to standardizing our Data ONTAP builds and security lock-down procedures. &amp;nbsp;Several years ago, we worked with our Nessus scanning team to integrate the Tenable compliance template for NetApp into their scanners (for our 7mode systems):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.tenable.com/blog/nessus-now-secures-netapp-data-ontap" target="_blank"&gt;https://www.tenable.com/blog/nessus-now-secures-netapp-data-ontap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This wasn't a perfect check, but it was a nice view to show to auditors and it gave us a warm fuzzy that we weren't leaving anything obvious hanging in the breeze. &amp;nbsp;We'd also leverage the OpsMgr configuration comparison tool to see if a new 7mode system that we rolled out was substantively different (security-wise) than our already built "gold" systems. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Fast forward to ONTAP and a lot of those tools are gone. &amp;nbsp;NetApp and Tenable haven't collaborated on an ONTAP 9.x compliance template and the configuration comparison tools have sort of lagged behind the times as well.&amp;nbsp; We’ve mostly relied up on the TRs and such associated with best practices and built audit files for our provisioning procedures.&amp;nbsp; These work fine at build, but we don’t have our NetApp equipment locked down behind a CM tool (like TripWire) that would “flag” any updated variations to that configuration in compliance with our build standard.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyway, what else have folks done in this area?&amp;nbsp; Any great ideas out there for automating cluster provisioning and SVM builds in a secure manner?&amp;nbsp; Automated checks for security compliance?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 15:12:49 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/NetApp-secure-configuration-Tenable-DISA-Bueller/m-p/130020#M28310</guid>
      <dc:creator>colsen</dc:creator>
      <dc:date>2025-06-04T15:12:49Z</dc:date>
    </item>
  </channel>
</rss>

