BMC recommends implementing the following best practices and security hardening measures for TrueSight Server Automation. The table following, later shows recommendations for securing various system components.
| Component | Recommendation |
|---|
| Remote Console Protocol (RCP) Security | - Restrict Access: The RCP console should only be accessible from a terminal server, which provides and additional layer of authorization and allows the administrator to limit connectivity to the application servers.
- Enforce Secure Communication: All RCP-to-app server connections must use TLS 1.2 to make sure encrypted communication. (bladsadmin EnabledSecureProtocols setting: Configuring the TLS protocol - BMC Documentation)
|
| TrueSight Server Automation User Authentication & Authorization | |
| Remote System Call Daemon (RSCD) Security | - Review Securing the RSCD Agent:
- Restrict Users File:
- Minimize users.local entries:
- users.local should have only minimal entries, ideally used only for recovering from a bad ACL push.
- Secure Communications:
- Restrict Root Access:
- Network-Level Security:
- Configure host-based firewalls to allow connections to the RSCD port only from the TSSA infrastructure, reducing the risk of unauthorized access.
|
| Application Server | Use strong cryptographic ciphers and enforce TLS 1.2 for all connections. |
| Database | Encrypting your database connection - BMC Documentation |
| Remote Site Access | - Remote sites should use a SOCKS proxy as a single point of entry.
- Consider implementing a repeater for payload caching.
|