Service Manual

Chapter 1: Preface........................................................................................................................ 4
Legal disclaimer.................................................................................................................................................................... 4
Scope of document.............................................................................................................................................................4
Document references......................................................................................................................................................... 4
Security resources...............................................................................................................................................................4
Getting help.......................................................................................................................................................................... 5
Reporting security vulnerabilities.....................................................................................................................................5
Chapter 2: Security quick reference.............................................................................................. 6
Deployment models.............................................................................................................................................................6
Security hardening third-party components................................................................................................................. 6
Security profiles................................................................................................................................................................... 6
Chapter 3: Product and subsystem security.................................................................................. 7
Product overview.................................................................................................................................................................7
Authentication...................................................................................................................................................................... 7
Login security settings..................................................................................................................................................7
User and credential management.............................................................................................................................. 7
Authentication types and setup................................................................................................................................. 8
Authorization........................................................................................................................................................................ 8
Network security................................................................................................................................................................. 9
Data security.........................................................................................................................................................................9
Configuring Transport Layer Security...................................................................................................................... 9
Cryptography...................................................................................................................................................................... 10
Certificate management.............................................................................................................................................10
Auditing and logging.......................................................................................................................................................... 10
Event audit.....................................................................................................................................................................10
Log management..........................................................................................................................................................10
Code or product integrity................................................................................................................................................ 10
Chapter 4: Contacting Dell...........................................................................................................12
Contents
Contents 3