This section outlines standard hardening techniques that you should apply to every Delphix Engine in your environment.
The Delphix Engine delivers its functionality through a web-based graphical user interface (GUI), web-based RESTful APIs, and a command line interface (CLI) accessed over SSH. All three interfaces leverage the same accounts and privileges scheme.
Access to the Delphix Operating System (DxOS) is restricted to Delphix Support and Delphix Professional Services, and can be controlled through the Support Access Control mechanism, described below. Customer-specific software installations and modifications to the DxOS are not required or supported.
Communications to/from connected systems (“sources” and “targets”) should be limited to required ports, and encryption should be used wherever possible.
- Security Principles
- Software Updates
- System Configuration
- User Management
- Delphix Operating System (DxOS)
- GUI Security
- Network Security
- Source Database Security
- Source and Target Host Security
- Replication Security
- Masking Sensitive Data
- Audit Logs
- Additional Topics
- Certificate Management