5 FlashArrayAccessSecurity
5 FlashArrayAccessSecurity
1 TB-160202-v05
Pure Storage Proprietary Information: for Internal Use Only
object data structures—lists of the hosts’ storage network addresses. Arrays only respond to
commands from storage network addresses associated with hosts that an administrator has
connected to the volumes their commands address. 1
Technical Brief TB-160201 describes how FlashArray protects the data at rest in an array from
misappropriation.
1
For iSCSI connections, array administrators may additionally configure Challenge Handshake Authentication
Protocol (CHAP) to prevent an unauthorized host from impersonating an authorized one.
2 TB-160202-v05
Pure Storage Proprietary Information: for Internal Use Only
mobile device application. In addition, Purity//FA supports a REST API for software-based
administration and for VMware’s vStorage APIs for Storage Awareness (VASA).
CLI access is validated either by a public/private key (PPK) pair or an account name and
password. GUI access uses account name and password for validation. Arrays may validate
passwords themselves, or they may optionally be configured to query an Active Directory (AD) or
Lightweight Directory Access Protocol (LDAP) service for validation.
Array administrators generate account-specific API tokens that are used to validate REST
exchanges. With VASA, vCenter administrators manage FlashArray systems in vSphere
environments using interfaces with which they are familiar. FlashArray administrator credentials
validate an array’s first interaction with vCenter; thereafter, certificates generated and validated
by vCenter authenticate interactions.
Each FlashArray account is associated with one of four roles:
⊲ Read-Only: can perform operations that report array state but cannot alter it.
⊲ Ops Admin: Read-Only operations plus plus controlling RemoteAssist sessions.
⊲ Storage Admin: Read-Only operations plus operations on volumes, hosts, and host
groups, but not global or array configuration operations.
⊲ Array Admin. All administrative operations.
FlashArrays are delivered with a pre-installed pureuser account that has the Array Admin role.
The pureuser account password can be changed, but its role cannot, nor can it be deleted.
Administrators, REST applications, and vCenter use
secure connections between arrays and workstations,
mobile devices, and management servers to create,
resize, organize, copy, and destroy storage volumes, to
manage host-volume connections, to schedule
snapshots and replications, and to monitor array
performance and storage utilization.
Figure 3: Administrative Access
Arrays log all administrative interactions, including
successful and unsuccessful logins, in a circular buffer that overwrites the oldest entries with the
newest ones when it fills. Logs cannot be deleted, except by a Pure Storage Technical Services
engineer resetting an entire array. Administrators can view logs via the GUI or CLI and can
optionally configure arrays to send them to syslog servers.
3 TB-160202-v05
Pure Storage Proprietary Information: for Internal Use Only
None of the FlashArray administrative interfaces
provides access to stored data. Purity//FA software has
no facilities for an administrator to read stored data or to
write data to an array’s volumes. While an administrative
access breach might enable an attacker to masquerade
as an array or storage administrator and obliterate data
by eradicating volumes, it would not enable data
alteration or other misappropriation. Purity//FA provides
robust mechanisms for limiting access to arrays to
authorized administrators, but it is incumbent on array
owners to manage administrator authorizations.
4 TB-160202-v05
Pure Storage Proprietary Information: for Internal Use Only
SSL interception that some organizations use to audit traffic leaving their internal networks.
(Earlier Purity//FA versions did not use TLS Mutual Authentication, so interception was possible.)
2
Pure1 does provide one-click access to arrays’ GUI login pages, from which administrators can log in with their
credentials and manage their arrays directly.
5 TB-160202-v05
Pure Storage Proprietary Information: for Internal Use Only
When a Pure Storage product is installed, a company representative creates a record of the
array’s security certificate in a Pure1 private database. Pure1 uses the database to restrict
organizations’ access to information about their own arrays.
Pure Storage representatives create a Pure1 administrative user (Pure1 Admin) account for each
of their customers. Users with Pure1 Admin accounts can create and delete additional accounts,
including Pure1 Admin ones, for their organization. Pure1 supports single sign-on (SSO) access
through recognized identify providers that support the Security Assertion Markup Language
(SAML 2.0). For organizations that do not use SSO, Pure authenticates Pure1 logins via a
recognized credentialing authority. 3 Pure1 Admin users create and delete additional Pure1
Admin accounts (e.g., when an employee’s role no longer requires Pure1 Admin access) upon
customer or partner request.
3
At the time of publication, Salesforce.com, Inc.
4
In the United States, laboratories are certified by the NIST National Voluntary Laboratory Accreditation Program.
6 TB-160202-v05
Pure Storage Proprietary Information: for Internal Use Only
recognize each others’ certifications, effectively making CC compliance an international IT
product security certification.
Increasingly, organizations are using CC compliance to assure that the equipment in their data
centers meets consistent, well-defined standards for securing data and access to it. Some,
especially in the public sector, require that all IT products they acquire be CC-certified.
Recognizing the importance of CC to its customers, Pure engages independent laboratories
certified by NIAP, 5 to evaluate FlashArray hardware and Purity//FA software for compliance to
current CC profiles. Evaluations have thus far resulted in certification of most current FlashArray
models and Purity//FA software versions against the Common Criteria Network Device Protection
Profile, Version 1.1. 6 Certification of newer array models, Purity//FA versions, and CC Profile
versions is constantly in progress.
5
For example, UL (https://ims.ul.com/common-criteriaiso15408) is one such laboratory.
6
https://www.niap-ccevs.org/Product/Archived.cfm?par303=Pure%20Storage%2C%20Inc%2E contains a partial list of
certified FlashArray models. Certification documents for other models are available from FlashArray Product
Management.
7 TB-160202-v05
Pure Storage Proprietary Information: for Internal Use Only
Secure access to FlashArray
administration
are trademarks of Pure Storage, Inc. Other names are trademarks of their respective owners. Use of Pure
Storage Products and Programs are covered by End User Agreements, IP, and other terms, available at:
https://www.purestorage.com/legal/productenduserinfo.html
and https://www.purestorage.com/patents
The Pure Storage products described in this documentation are distributed under a license agreement
restricting the use, copying, distribution, and decompilation/reverse engineering of the products. The Pure
Storage products described in this documentation may only be used in accordance with the terms of the
license agreement. No part of this documentation may be reproduced in any form by any means without
prior written authorization from Pure Storage, Inc. and its licensors, if any. Pure Storage may make
improvements and/or changes in the Pure Storage products and/or the programs described in this
documentation at any time without notice.
THIS DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE
EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. PURE STORAGE SHALL NOT BE
LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,
PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS
DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
8 TB-160202-v05
Pure Storage Proprietary Information: for Internal Use Only