Skip main navigation (Press Enter).
Log in
Toggle navigation
Log in
Community
Topic Groups
Champions
Directory
Program overview
Rising Champions
IBM Champions group
User Groups
Directory
Benefits
Events
Dev Days
Conference
Community events
User Groups events
All TechXchange events
Participate
TechXchange Group
Welcome Corner
Blogging
Member directory
Community leaders
Resources
IBM TechXchange
Community
Conference
Events
IBM Developer
IBM Training
IBM TechXchange
Community
Conference
Events
IBM Developer
IBM Training
IBM Storage Defender
×
IBM Storage Defender
Early threat detection and secure data recovery
Group Home
Threads
1.3K
Blogs
357
Events
0
Library
24
Members
3.8K
View Only
Share
Share on LinkedIn
Share on X
Share on Facebook
Back to Blog List
Use the built in 'four-eye' principle to avoid unwanted dataloss
By
Mikael Lindström
posted
Wed March 17, 2021 03:46 PM
Like
With the increased focus on security, simplicity and stability in Delivery organizations, we want be sure your backup data is safe, secure and available. One way to help with this is to follow our best practices and use the built-in software capability that prevents an administrator from performing an action that could cause a major incident, including data loss. This administrator action could have been unintentional or it could have been more nefarious, from a rogue administrator or hacker.
I strongly recommend that you enable the IBM Spectrum Protect "Command Approval" built-in functionality so that the four eyes principle (two-person rule) is enforced for any data destructive actions. IBM Spectrum Protect has a very simple procedure (via the Operations Center or command-line interface (CLI)) where the command approval feature provides an oversight process that prevents certain restricted actions (e.g. data deletion) from running until the action is approved by a second administrator. This provides an additional layer of security to ensure your backup data is protected.
I have personally worked in IT Emergencies caused by human errors or virus and knows that it is vital to create a "hard to do harm" IT environment. This four eye principle we have implemented is a key contributor to a solid IT infrastructure (and sleep at nights instead of working..).
Here is the IBM Spectrum Protect documentation regarding this topic:
https://www.ibm.com/support/knowledgecenter/en/SSEQVQ_8.1.11/srv.admin/t_cmdappr_mng.html
I also recommend that you watch these short videos to see how easily this is to enable and use:
https://www.youtube.com/watch?v=ZK81qK7vQNk
https://www.youtube.com/watch?v=SDYo-xVaf2g
0 comments
358 views
Permalink
Copy
https://community.ibm.com/community/user/blogs/mikael-lindstrm1/2021/03/12/hard-to-do-harm-ibm-spectrum-protect-command-appro
Powered by Higher Logic