ONTAP Security and Compliance Solutions Administration (OCSA) – Outline

Detailed Course Outline

Module 1: Compliance Solutions

  • Data Compliance
  • Challenges
    • High availability
    • Backup and archive
    • Disaster recovery
    • Compliance
    • Cloud integration
  • Data compliance types
    • Data retention
    • Data encryption
  • Data protection solutions
  • Compliance features

Module 2: ONTAP Data Retention

  • SnapLock compliance software
    • SnapLock Compliance
    • SnapLock Enterprise
  • SnapLock architecture
    • Compliance clock
    • Clock architecture
  • SnapLock compliance volume
  • SnapLock enterprise volume
  • File types
    • Regular
    • WORM
    • WORM appendable
  • SnapLock settings verification
  • Protecting SnapLock volumes
    • Snapshot copies
    • Replication
    • SnapVault
  • Advanced SnapLock features
    • Privileged delete feature
    • Audit log
    • Compliance administrator account
    • SnapLock APIs

Module 3: ONTAP Key Management

  • Key management
    • Centralized key management
    • Compliance with mandates
    • Investment protection
    • OKM
    • External Key Server (KMIP)
    • Setup wizard

Module 4: ONTAP Data Encryption

  • Storage encryption solutions
  • ONTAP 9.1
    • NetApp storage encryption (NSE)
    • NetApp volume encryption (NVE)
    • NetApp SANtricity full disk encryption (FDE)
  • FIPS security levels
  • Volume encryption demonstration
    • License
    • OKM setup
    • OKM backup
    • Node keys
    • Create encrypted volume
    • SVM key
    • Volume key
    • Encrypt existing volume
    • Decrypt volume
    • Move encrypted volume
    • Re-key encrypted volume
    • Delete

LABS:

  • Configure SnapLock for file retention
  • Create aggregates that are compatible with SnapLock software
  • Create SnapLock volumes
  • Create SnapLock volume shares
  • Manage a SnapLock enterprise volume
  • Manage a SnapLock compliance volume
  • Create a cluster peer relationship
  • Create an SVM on cluster2
  • Create an SVM peer relationship
  • Create a SnapLock for SnapVault protection relationship
  • Manage source and destination volumes
  • Manage a SnapLock for SnapVault relationship
  • Create an audit log
  • Create a compliance administrator account
  • Enable the privileged delete feature
  • Delete WORM files by using the privileged delete feature
  • Configure the onboard key manager
  • Display the key management backup information
  • Verify the creation of encryption keys for each node