| CPC G06F 21/54 (2013.01) [G06F 21/78 (2013.01); G06F 21/00 (2013.01); G06F 21/44 (2013.01)] | 18 Claims |

|
1. A method of implementing cyber protection automation using a secure cyber vault, comprising:
receiving an instruction by a storage system implementing the secure cyber vault;
determining, by the storage system, whether a flag is set on the storage system designating the storage system as configured to implement the secure cyber vault;
determining, by the storage system, an origin of the instruction, the origin of the instruction specifying whether the instruction was received from a host that is locally physically attached to the storage system or not locally physically attached to the storage system;
in response to a determination that the flag is set on the storage system that designates the storage system as configured to implement the secure cyber vault, and in response to determination that the origin of the instruction was from the host that is not locally physically attached to the storage system, denying the instruction and not processing the instruction by the storage system; and
in response to a determination that the flag is set on the storage system that designates the storage system as configured to implement the secure cyber vault, and in response to determination that the origin of the instruction was from the host that is locally physically attached to the storage system, allowing the instruction and processing the instruction by the storage system;
wherein the instruction received by the cyber vault is one of:
a system call (syscall); and
a Command Line Interface (CLI) command received on a Remote Data Forwarding link.
|