Every IT Infrastructure team works to ensure their IT platforms adhere to a standard golden configuration – also known as baseline configuration. It’s well understood that configuration drifts cause storage & backup systems to deviate from a target baseline over time, inviting both system health and security risks.
Cyber criminals have been taking advantage of these misconfigurations, for example, compromising access credentials to organizations’ storage and backup systems.
Storage and backup system configurations can change beyond your control. Staying on top of configuration drift and actively managing security misconfigurations can significantly mitigate these risks.
Managing a baseline configuration process for your storage and backup systems is extremely difficult, since most vendor tools focus on host operating systems and web applications, and are unable to effectively communicate with the unique storage and backup technologies.