cover background

Secure Configuration of Storage & Backups

Baseline Configuration and Secure Configuration Process for Storage & Backup Systems

Leading standards require organizations to implement a secure configuration process for each technology. This includes: 

  • Defining polices, security controls, baseline configuration and technical implementation guides per technology and to periodically update them.  
  • Validating that all systems adhere to the required baseline and regularly checking to detect drifts and unauthorized changed.  
  • Reassessing adherence to the baseline after configuration changes or software updates made to the system. 
  • Automation for configuration documentation, configuration drift detection and response 
  • Restricting access, rights, interfaces, services and more.

Storage and backup systems are critical IT infrastructure that retains all production data as well as the backup data. Managing baseline configuration and secure configuration process for your storage and backup systems is extremely difficult, since most tools focus on host operating systems and web applications, and are unable to effectively communicate with the rather unique storage and backup technologies.

NIST Guide for Storage Security

Download the recently published NIST Guide for Storage Security – co-authored by Continuity™.

This guide provides CISOs and Heads of Storage with an overview of the evolution of the storage technology landscape, current security threats, and a set of practical recommendations.

How StorageGuard Helps

With StorageGuard, you can automatically enable pre-defined baseline policies or define a custom baseline for your storage and backup systems. 

StorageGuard’s pre-defined policies include thousands of configuration checks based on guidelines from storage and backup vendors such as Dell EMC, Hitachi Vantara, NetApp, Veritas, Rubrik and many others.  

It also includes guidelines for cybersecurity from industry standards such as NIST, CIS, ISO, PCI DSS, NERC, HIPAA, and others. 


Once baseline policies are enabled, the StorageGuard scan will connect to each storage and backup technology using the native APIs and CLIs to document the current configuration and then to detect drifts from the required baseline


StorageGuard will detect when a baseline requirement is not met and provide remediation guidance. This will appear within the StorageGuard dashboard or integrated into your IT service management solution as an incident or problem ticket

Product Comparison

Secure Configuration and Baseline Configuration Compliance
Endpoint systems McAfee Endpoint Security | Microsoft Endpoint Manager | Symantec Endpoint Protection | Tanium | CrowdStrike SCCM | Ivanti Endpoint Manager | Qualys Policy Compliance | McAfee Endpoint Security | Symantec Endpoint Protection | Tanium
Applications | Tenable | Qualys | Rapid7 | Veracode | IBM Security AppScan Tripwire | Qualys Policy Compliance | McAfee Application Control | AlienVault USM Anywhere
Database systems Imperva | IBM Guardium | McAfee Database Security | Oracle Database Vault Imperva | IBM Guardium | McAfee Database Security | Trustwave
Host systems Tenable | Qualys | Rapid7 Tenable | Qualys | Rapid7 | Tanium
Storage systems StorageGuard StorageGuard
Backup systems StorageGuard StorageGuard

StorageGuard Supports These Storage & Backup Systems

Talk To An Expert

Get in touch to see how you can detect, prioritize, and fix all security risks in your storage & backup systems.

We use cookies to enable website functionality, understand the performance of our site, provide social media features, and serve more relevant content to you.
We may also place cookies on our and our partners’ behalf to help us deliver more targeted ads and assess the performance of these campaigns. You may review our
Privacy Policy I Agree