Security Analytics utilizes secure keys for authenticating to a remote backup server, enabling the offloading of backups to a trusted external source via a Secure Shell (SSH) connection. By default, the system is configured to use RSA keys for this SSH authentication. If your organization requires the use of ECDSA keys (Elliptic Curve Digital Signature Algorithm) for SSH instead, instructions are available to manually update the remote backup configuration. ECDSA is a specific type of cryptographic key algorithm used within the SSH protocol, not an alternative to SSH.
Security Analytics 8.2.x
Security Analytics 8.3.x
The automated backup process uses a scheduled job (controlled by cron) on the appliance. This process first checks for configuration changes, then creates a compressed archive (a tarball), and finally transfers this file securely using SCP (Secure Copy Protocol) to the configured remote server.
backup_rsa and backup_rsa.pub) in the /etc/ssh directory.vi), open and edit the two key files in /etc/ssh: backup_rsa (private key) and backup_rsa.pub (public key).The automated backups will now use the custom ECDSA key pair for secure authentication with the remote server.
Important Note: Re-clicking the "Generate New SSH Keys" button in the GUI will overwrite the custom ECDSA keys with new RSA keys, requiring you to repeat the manual key replacement process.
More information about the backup and restore feature can be found here: Backup and Restore