Skip to main content

Cyber Resiliency Solution for IBM Spectrum Scale

Blueprint

thumbnail 

Published on 13 September 2019, updated 16 September 2019

  1. .EPUB (0.9 MB)
  2. .PDF (1.8 MB)

Apple BooksGoogle Play BooksRead in Google Books
Share this page:   

ISBN-10: 0738457965
ISBN-13: 9780738457963
IBM Form #: REDP-5559-00


Authors: IBM

menu icon

Abstract

This document is intended to facilitate the deployment of the Cyber Resiliency solution for IBM® Spectrum Scale. This solution is designed to protect the data on IBM Spectrum™ Scale from external cyberattacks or insider attacks using its integration with IBM Spectrum Protect™ and IBM Tape Storage. To complete the tasks that it describes, you must understand IBM Spectrum Scale™, IBM Spectrum Protect, and IBM Tape Storage architecture, concepts, and configuration.

The information in this document is distributed on an as-is basis without any warranty that is either expressed or implied. Support assistance for the use of this material is limited to situations where IBM Spectrum Scale or IBM Spectrum Protect are supported and entitled, and where the issues are specific to a blueprint implementation.

Table of Contents

About this document

Executive summary

Support for the Blueprint and its configurations

Requesting assistance

Scope

Prerequisites

National Institute of Standards and Technology framework

Implementing a Cyber Resiliency solution with IBM Spectrum Scale

IBM Spectrum Scale

IBM Spectrum Protect

IBM Tape Storage

Use cases considered for a Cyber Resiliency solution for IBM Spectrum Scale

Cyber Resiliency solution for IBM Spectrum Scale architectural overview

Configuring a Cyber Resiliency solution for IBM Spectrum Scale

IBM Spectrum Protect server configuration

IBM Spectrum Protect client configuration on IBM Spectrum Scale

Phases of an IBM Spectrum Scale Cyber Resiliency solution

Initialization Phase

Backup Synchronization technique in the Production phase

Production phase

Newly generated files or modified files

Deleted files

Detection of Anomaly phase

Failover and Failback phase

Summary

 

Others who read this also read