Skip to main content

Cyber Resiliency Solution for IBM Spectrum Scale

Blueprint

thumbnail 

Published on 13 September 2019, updated 16 September 2019

  1. .EPUB (0.9 MB)
  2. .PDF (1.8 MB)

Apple BooksGoogle Play BooksRead in Google Books
Share this page:   

ISBN-10: 0738457965
ISBN-13: 9780738457963
IBM Form #: REDP-5559-00


Authors: IBM

    menu icon

    Abstract

    This document is intended to facilitate the deployment of the Cyber Resiliency solution for IBM® Spectrum Scale. This solution is designed to protect the data on IBM Spectrum™ Scale from external cyberattacks or insider attacks using its integration with IBM Spectrum Protect™ and IBM Tape Storage. To complete the tasks that it describes, you must understand IBM Spectrum Scale™, IBM Spectrum Protect, and IBM Tape Storage architecture, concepts, and configuration.

    The information in this document is distributed on an as-is basis without any warranty that is either expressed or implied. Support assistance for the use of this material is limited to situations where IBM Spectrum Scale or IBM Spectrum Protect are supported and entitled, and where the issues are specific to a blueprint implementation.

    Table of Contents

    About this document

    Executive summary

    Support for the Blueprint and its configurations

    Requesting assistance

    Scope

    Prerequisites

    National Institute of Standards and Technology framework

    Implementing a Cyber Resiliency solution with IBM Spectrum Scale

    IBM Spectrum Scale

    IBM Spectrum Protect

    IBM Tape Storage

    Use cases considered for a Cyber Resiliency solution for IBM Spectrum Scale

    Cyber Resiliency solution for IBM Spectrum Scale architectural overview

    Configuring a Cyber Resiliency solution for IBM Spectrum Scale

    IBM Spectrum Protect server configuration

    IBM Spectrum Protect client configuration on IBM Spectrum Scale

    Phases of an IBM Spectrum Scale Cyber Resiliency solution

    Initialization Phase

    Backup Synchronization technique in the Production phase

    Production phase

    Newly generated files or modified files

    Deleted files

    Detection of Anomaly phase

    Failover and Failback phase

    Summary

     

    Others who read this also read