Chapter 4: System Hardening — Attack Surface Reduction

Learning Objectives

Pre-Quiz — Test Your Existing Knowledge

1. What is the name of Cohesity's purpose-built Linux-based operating system?

CohesityLinux
DataOS
SpanOS
ClusterOS

2. Starting from Cohesity version 6.8, what SSH security feature is enabled by default?

SSH is completely disabled on all nodes
The Secure Shell feature restricts SSH to a limited command environment
SSH requires a hardware security token for all connections
SSH is only allowed from the Helios management console

3. What mechanism does Cohesity use to achieve zero-downtime cluster upgrades?

Blue-green deployment with a standby cluster
Rolling upgrades with VIP migration
Hot-swapping node hardware during operation
Pausing all backup jobs until the upgrade completes

4. What three-step workflow does Security Advisor use to improve cluster security posture?

Detect, Analyze, Report
Audit, Alert, Enforce
Scan, Score, Remediate
Monitor, Assess, Harden

5. Which two industry hardening frameworks does Cohesity SpanOS align with?

NIST CSF and ISO 27001
CIS Benchmarks and STIG
PCI DSS and SOC 2
OWASP and MITRE ATT&CK

4.1 Cohesity OS and System Access Security

The foundation of any hardened system begins at the operating system layer. Cohesity runs a purpose-built Linux-based OS called SpanOS, and its security controls start there.

Linux-Based OS Hardening

Cohesity Data Cloud follows a secure-by-default design philosophy. Out of the box, the platform includes:

At the network level, all ports are disabled by default except for known required ports. Preconfigured IP tables allowlist only the services that need to communicate internally. The cluster is FIPS 140-2 certified, always operates in FIPS mode, and does not support TLS v1.1 or below.

Think of FIPS 140-2 certification as a government stamp of approval on a bank vault's lock mechanism. It does not just mean the lock works — it means the lock has been independently tested, validated, and certified to meet a rigorous federal standard.

SSH and Console Access Restriction

SSH restriction is one of the most critical hardening measures. Since version 6.8, the Secure Shell feature restricts SSH access to a limited command environment rather than full OS-level shell access. Administrators can execute CLI commands and run diagnostics but cannot browse the filesystem or modify OS-level files directly.

ControlDefault BehaviorRecommendation
SSH access to host OS shellRestricted (enabled by default from v6.8)Keep enabled
Direct filesystem accessDisabled by defaultDo not enable unless required
Root user accessLimited via Secure ShellMaintain restriction

For console access, Cohesity introduced the Split Key feature in version 7.0. This mandates a challenge-response system when a user attempts to access the console via IPMI. The response codes can only be generated by opening a support case with Cohesity SREs.

sequenceDiagram participant Admin as Administrator participant Cluster as Cohesity Cluster participant Support as Cohesity SRE (24x7) Admin->>Cluster: Request console access via IPMI Cluster->>Admin: Generate challenge code Admin->>Support: Open support case with challenge code Support->>Support: Verify identity and authorize Support->>Admin: Provide response code Admin->>Cluster: Enter response code Cluster->>Admin: Grant console access
Split Key works like a safe deposit box at a bank — you need your key and the bank manager's key to open it. No single person can gain access alone.

Service Account Management

Cohesity's security architecture is built on least privilege and segregation of duties:

Role-Based Access Control (RBAC) supports three methods: default roles, individual user-based roles, and user groups-based roles. Best practice is to deploy SSO with user groups-based RBAC.

Quorum approval (dual control) requires that critical system changes be authorized by more than one person, preventing a rogue or compromised administrator from acting unilaterally.

Patch Management

Cohesity provides one-click, non-disruptive cluster upgrades that handle software, security, firmware, and OS upgrades through a single workflow. Each node upgrades sequentially while other nodes absorb its workload via VIP migration (Virtual IP migration), ensuring zero downtime.

Rolling Upgrade with VIP Migration
Watch each node upgrade sequentially (red = upgrading, green = complete)
Node 1
Node 2
Node 3
Node 4

Long-Term Support (LTS) releases are supported for a minimum of twelve months, with six months of overlapping coverage between two LTS releases to give organizations a comfortable migration window.

Key Takeaways — OS and System Access

4.2 Attack Surface Analysis

Attack surface refers to the sum of all points where an unauthorized user could attempt to enter or extract data from a system. Reducing it is an ongoing discipline, not a one-time event.

Identifying Exposed Services

Cohesity's platform consolidation approach inherently reduces the attack surface by unifying backup, DR, file services, object storage, dev/test, and analytics on a single platform. However, administrators must still actively audit what is exposed:

Exposure PointRiskMitigation
Open network portsUnauthorized service accessVerify only required ports are open; use firewall rules
IPMI management interfaceConsole hijackingRestrict to management network; enable Split Key
SSH accessOS-level compromiseKeep Secure Shell enabled (default from v6.8)
API endpointsAutomated attack vectorsEnforce API authentication; use RBAC for API users
Syslog transportLog interceptionEnable encryption between cluster and syslog server
Agent communicationMan-in-the-middle attacksKeep agents at same version as cluster; use TLS
Attack Surface Reduction — Building the Castle Wall
Closing ports and disabling services builds a stronger perimeter

Disabling Unused Connectors

Every enabled but unused connector is an unnecessary door. Administrators should periodically audit for:

Minimal Privilege Access

Data exposure reduction extends to who can see what data and when:

graph LR Backup[Backup Job] --> Gold[Gold Copy Snapshot] Gold -->|Immutable - Never Exposed| Storage[(Protected Storage)] Gold -->|Zero-Cost Clone| Clone[Read-Write Clone] Clone --> App[Application / User Access] Admin[Administrator] -.->|Cannot Delete| Gold Attacker[Attacker] -.->|Cannot Modify| Gold DataLock[DataLock WORM Policy] -->|Time-Bound Lock| Gold

Key Takeaways — Attack Surface

4.3 Security Advisor and Posture Scoring

Security Advisor is a built-in, no-cost tool available via Cohesity Helios that assesses, scores, and helps improve cluster security posture. It launched in December 2021.

Dashboard and Scoring

Security Advisor operates through a three-step workflow: Scan, Score, Remediate.

  1. Scan: Evaluates security configurations across clusters — access control, audit logs, encryption framework
  2. Score: Generates a numerical score indicating performance against best practice recommendations
  3. Remediate: Provides actionable recommendations on addressing potential risks with detailed guidance

Security Recommendations

Security Advisor evaluates four primary dimensions:

CategoryWhat It EvaluatesExample Findings
Access Control SettingsPermissions, authentication, privilege managementMFA not enabled; default password unchanged
Audit LogsLogging configuration, retention, monitoringRetention below threshold; syslog not configured
Encryption FrameworksData-at-rest and data-in-transit encryptionNode-to-node encryption disabled
Cluster Security ConfigurationsMulti-site deployment consistencyInconsistent settings across geographies

When prioritizing remediation, focus on: (1) authentication gaps, (2) encryption gaps, (3) access control gaps, (4) logging and monitoring gaps.

Automated Checks

Security Advisor provides centralized visibility across all clusters spanning geographies, sites, and regions through the Helios Dashboard. Key capabilities include executive-ready security scorecards, detailed configuration issue analysis, and native Helios integration requiring no additional licensing.

Security Advisor complements CyberScan, a Marketplace application that scans backup snapshots for indicators of compromise (IOCs) and known vulnerabilities. Security Advisor hardens the platform; CyberScan ensures the data being protected is not already compromised.

graph TB subgraph "Security Advisor" SA[Platform Configuration Scanning] SA --> AC[Access Control] SA --> AL[Audit Logs] SA --> EF[Encryption Framework] SA --> CC[Cluster Configuration] end subgraph "CyberScan" CS[Backup Data Scanning] CS --> IOC[Indicators of Compromise] CS --> Vuln[Known Vulnerabilities] CS --> Malware[Malware Detection] end SA -->|Score and Remediate| Posture[Improved Security Posture] CS -->|Alert and Quarantine| Posture

Tracking Improvements

Security posture requires ongoing measurement. Best practices:

  1. Baseline: Run an initial scan after deployment or major configuration changes
  2. Remediate in priority order: Critical findings first (authentication, encryption), then moderate
  3. Re-scan regularly: Monthly or quarterly to detect configuration drift
  4. Document and report: Use executive scorecards for leadership communication
  5. Integrate with change management: Tie scans to change control processes

Key Takeaways — Security Advisor

4.4 Hardening Frameworks and Compliance

CIS Benchmark Alignment

The Center for Internet Security (CIS) Benchmarks are consensus-based configuration guidelines developed by security practitioners worldwide. Cohesity's SpanOS ships with many CIS-aligned configurations already applied at the factory level, covering:

CIS alignment is not something you build from scratch — it is something you verify and maintain after deployment, particularly after upgrades or configuration changes.

STIG Compliance

The Security Technical Implementation Guide (STIG) is published by the US DoD's DISA. Cohesity SpanOS implements many STIG controls across these categories:

STIG CategoryScopeDescription
APSC-DVApplication SecurityAuthentication, authorization, session management
RHELOperating SystemRed Hat baseline controls adapted for SpanOS
SRG-APPApplication Security Requirements GuideLogging, access control, data protection

STIG compliance is particularly important for government, defense, financial services, and healthcare organizations.

Hardening Checklist for New Deployments

#Hardening ActionCategoryPriority
1Change all default passwords before going liveAccess ControlCritical
2Enable cluster-wide encryption at initial installationEncryptionCritical
3Verify Secure Shell is enabled (default from v6.8)SSH RestrictionCritical
4Enable MFA for admin and support user accountsAccess ControlCritical
5Enable Split Key for IPMI console access (v7.0+)Access ControlHigh
6Configure Quorum approval for privileged operationsAccess ControlHigh
7Enable node-to-node encryptionEncryptionHigh
8Deploy SSO with user groups-based RBACAccess ControlHigh
9Set audit log retention to 180+ daysLoggingMedium
10Restrict IPMI traffic to management network onlyNetworkMedium
11Apply DataLock WORM policies to critical backupsData ProtectionMedium
12Run initial Security Advisor scan and establish baselinePosture ScoringMedium

Key Takeaways — Hardening Frameworks

Post-Quiz — Test What You Learned

1. What is the name of Cohesity's purpose-built Linux-based operating system?

CohesityLinux
DataOS
SpanOS
ClusterOS

2. Starting from Cohesity version 6.8, what SSH security feature is enabled by default?

SSH is completely disabled on all nodes
The Secure Shell feature restricts SSH to a limited command environment
SSH requires a hardware security token for all connections
SSH is only allowed from the Helios management console

3. What mechanism does Cohesity use to achieve zero-downtime cluster upgrades?

Blue-green deployment with a standby cluster
Rolling upgrades with VIP migration
Hot-swapping node hardware during operation
Pausing all backup jobs until the upgrade completes

4. What three-step workflow does Security Advisor use to improve cluster security posture?

Detect, Analyze, Report
Audit, Alert, Enforce
Scan, Score, Remediate
Monitor, Assess, Harden

5. Which two industry hardening frameworks does Cohesity SpanOS align with?

NIST CSF and ISO 27001
CIS Benchmarks and STIG
PCI DSS and SOC 2
OWASP and MITRE ATT&CK

6. What does the Split Key feature require in order to grant IPMI console access?

A one-time password generated by an authenticator app
A response code obtained by opening a support case with Cohesity SREs
Approval from at least three cluster administrators
A signed certificate from the organization's PKI infrastructure

7. What is the default privilege level of the Cohesity "support" user account?

Full administrator with sudo access
Read-only privileges
Write access to backup policies only
No access until explicitly granted by Cohesity SRE

8. What happens to the original "gold copy" backup snapshot on Cohesity?

It is mounted read-write for direct application access
It is replicated to a secondary site and then deleted locally
It remains immutable and is never directly exposed; access requires a zero-cost clone
It is compressed and archived to cold storage after 30 days

9. What distinguishes CyberScan from Security Advisor?

CyberScan is a paid add-on while Security Advisor is free
CyberScan scans backup data for IOCs and vulnerabilities, while Security Advisor scans platform configuration
CyberScan replaces Security Advisor in version 7.0 and later
CyberScan only works with cloud-deployed clusters

10. What is the recommended RBAC deployment method for enterprise Cohesity environments?

Default predefined roles applied at login
Individual user-based role assignment
SSO with user groups-based RBAC
Local accounts with custom roles per cluster

11. Which STIG category covers Red Hat Enterprise Linux baseline controls as adapted for SpanOS?

APSC-DV
SRG-APP
RHEL
NIST-800

12. What is the minimum support duration for a Cohesity Long-Term Support (LTS) release?

Six months
Twelve months
Eighteen months
Twenty-four months

Your Progress

Answer Explanations