Explain Data-at-Rest Encryption (DARE) functionality

The data-at-rest encryption feature is being released with NOS 4.1 and allow Nutanix customers to encrypt storage using strong encryption algorithm and only allow access to this data (decrypt) when presented with the correct credentials, and is compliant with regulatory requirements for data at rest encryption. Nutanix data-at-rest encryption leverages FIPS 140-2 Level-2 validated self-encrypting…

Read more...

Explain security concepts such as two-factor authentication, key management and cluster lockdown

Two Factor Authentication You can enable two-factor authentication for users through a combination of a client certificate and/or username/password to address stringent security needs. Key Management Nutanix supports key-based SSH access to a cluster. Adding a key through the Prism web console provides key-based access to the cluster, Controller VM, and hypervisor host. Each node…

Read more...

Describe how Nutanix provides cluster security

User accounts control access, and the web console allows you to set the authentication method (see Configuring Authentication). Nutanix uses SSL to secure communication with a cluster, and the web console allows you to install SSL certificates (see Installing an SSL Certificate). Nutanix supports key-based SSH access to a cluster, but you have the option…

Read more...

Unofficial Nutanix NCP Study Guide

I have always been a fan of leveraging community resources when studying for certification exams. The VCAP study guides here, and here were invaluable when I was studying for those exams. When I began preparing for the Nutanix NCP, I was a little bummed out when I couldn’t find any community resources like these. I…

Read more...