Best Practices for Using Storage Gateway
Learn about best practices for using Storage Gateway.
Apply the recommendations found in the following topics to optimize the manageability, performance, reliability, and security of your Storage Gateway.
Security Considerations
- ADMIN PASSWORD
- Because Storage Gateway administrators can create, modify, and delete file systems, follow these password guidelines:
- DOCKER
- Storage Gateway runs inside a Docker container for security and isolation. Follow these Docker-related guidelines and recommendations:
- ACCESS CONTROL
- Default file system export options are too permissive. Set more restrictive export options so that only trusted NFS clients can access the file system data and metadata. Modify the advanced file system settings for NFS Allowed Hosts and NFS Export Options to restrict access to a file system. In addition to NFS protocol security, you can also set up and configure a firewall on the host to further control access to the file system. UID/GID/modes control access to files and directories. Set the appropriate ownership mode to protect sensitive data.
- OBJECT STORAGE
- Files in a file system are uploaded to Oracle Cloud Infrastructure and stored as objects in an Object Storage bucket. Associated file attributes are stored as object metadata. Access control for Object Storage is different from access control for a traditional file system. Anyone with permission to read or modify any object in the bucket can read or modify all objects in the bucket. To protect sensitive data, set up Oracle Cloud Infrastructure IAM policies to limit who can access objects in the bucket.
- NETWORKING
-
Only use open network port access to networks that you trust. Oracle strongly recommends that you do not open network ports to the public internet. Instead, use a private connection to the machine hosting the Storage Gateway management console, for example a VPN or SSH local forward tunnel. See Site-to-Site VPN for more information.
Use the following syntax for SSH local forward tunnel:
ssh -L localHost:localPort:remoteHost:remotePort remoteHost
See https://www.ssh.com/ssh/tunneling/example#local-forwarding for more information.