Purpose This guide will provide the procedures necessary to harden the BrickStor Security Platform to meet the most rigorous security requirements and operate within a specific customer environment. This guide has been used to achieve approval to operate in classified and unclassified government environments and will provide admins with all the steps necessary to securely connect BrickStor SP to the local infrastructure. The procedures in this document are a subset of steps listed in the general BrickStor SP Configuration Guide. Background The secure by design culture at RackTop includes security reviews as part of the product architecture. A security analysis is performed against implementations to detect security weaknesses and common security vulnerabilities. RackTop uses automated scanning tools, such as Nessus, to continuously monitor, detect, and remediate vulnerabilities. RackTop is vigilant about preventing vulnerabilities from entering the product during the development and product delivery phases, while providing corrective configuration actions or updates to eliminate vulnerabilities in fielded products. The system is already designed to be hardened and operate successfully in most enterprise environments. The steps in this document provide certain customizations that need to be made on a per environment basis to meet the specific operational requirements of the environment or changes in requirements.