HCI system data received from clusters enabled for telemetry data collection is encrypted and stored on the Dell EMC IT managed Dell infrastructure.
The Dell EMC IT infrastructure:
Dell Technologies Security and Resiliency Office (SRO), led by Dell's Chief Security Officer, is responsible for the security and protection of Dell EMCs information technology infrastructure that hosts SaaS multi-cluster management SaaS solution. This is accomplished via established governing security policies and procedures and enforcement of Information Security controls, which include measures such as multi-layered firewalls, intrusion detection systems, industry-leading antivirus, and malware protection. The Dell EMC cybersecurity team is involved in running continuous vulnerability scans on the application and underlying environment. Any required remediation is handled through an ongoing vulnerability remediation program such as software upgrades, patches, or configuration changes.
All data sent to SaaS multi-cluster management is stored on infrastructure hosted in the Dell EMC data center. The Information Security Policy ensures that all Dell EMC information and resources are properly protected, information owners must ensure all resources are accounted for, and each resource has a designated custodian. All infrastructure components are located in the dedicated Dell EMC firewall-protected enclave network that is not exposed to external access. No individual direct login to the database server and database is allowed, except by the members of the System Administrator and Database Administrator teams. Database application accounts are managed using standard database password authentication. Dell EMC has implemented an industry best practice Change Management process to ensure that Dell EMC infrastructure hardware is stable, controlled, and protected. Change Management provides the policies, procedures, and tools needed to govern these changes to ensure that they undergo the appropriate reviews, approvals and are communicated effectively to users.