Executive Summary
| Cluster Name: | sample-cluster | Analysis Date: | January 09, 2026 at 04:30 PM |
| ONTAP Version: | 9.16.1P10 | Node Count: | 2 |
| Severity | Count | Impact |
|---|---|---|
| Critical | 0 | Immediate action required |
| High | 127 | High priority remediation |
| Medium | 27 | Scheduled remediation |
| Low | 4 | Address during maintenance |
| Passed | 166 | Meets security requirements |
| Function | Findings | Issues | Passed |
|---|---|---|---|
| Identify | 11 | 1 | 10 |
| Protect | 205 | 90 | 115 |
| Detect | 49 | 36 | 13 |
The LM compatibility level allows legacy LM and/or NTLMv1 authentication methods. LM (LAN Manager) hashes are cryptographically weak and can be cracked in seconds. NTLMv1 is also vulnerable to relay attacks and offline cracking. Modern environments should use NTLMv2 or Kerberos only.
This network service policy allows connections from any IP address (0.0.0.0/0) for management services. This exposes administrative interfaces (SSH, HTTPS, HTTP) to potential unauthorized access from any network location, significantly increasing the attack surface.
Multi-Admin Verification (MAV) is not enabled. MAV implements separation of duties by requiring approval from designated administrators before executing destructive operations such as volume deletion, snapshot deletion, or disabling security features.
This export policy rule allows any IP address (0.0.0.0/0) to mount the export. This configuration provides no network-level access control and allows unauthorized hosts on the network to access potentially sensitive data.
The default 'admin' account has login access configured. Using the built-in admin account for routine administration creates significant security and audit concerns including no individual accountability and credential sharing risks.
Snapshot locking (tamperproof snapshots) is not enabled on this volume. Without snapshot locking, backup copies can be deleted by any administrator or by ransomware that has gained administrative access.
This volume has no snapshots configured. Without snapshots, there is no point-in-time recovery capability for accidental deletion, corruption, or ransomware attacks.
... and 120 more high severity findings