Hardening Recommendations
Zerto recommends the following hardening steps to ensure the security and resilience of your Zerto solution:
|
1.
|
Access to the Zerto management server (the ZVM service host, or Zerto Cloud Appliance) should be limited to a minimal set of accounts. |
|
2.
|
Unnecessary network services on the Zerto management server, such as SMB, should be disabled and blocked by a firewall. |
|
3.
|
The Zerto management server should be patched regularly. |
|
4.
|
The Zerto management server should not be used for other purposes. For example, unrelated web browsing. |
|
5.
|
Network traffic to Zerto components should be restricted to the ports and endpoints described in this document. |
|
6.
|
Network traffic between Zerto components should be as segregated from the rest of the network as possible. For example, a separate VLAN. |