7 tips to prevent ransomware attacks on backup storage

Slides:



Advertisements
Similar presentations
Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens.
Advertisements

Utility program + driver program Thomas Wat 4D (21)
Remove the hurdles to offsite backup Highly efficient Automatically copies VMs to local or offsite storage location Validation and remediation.
Veeam Backup & Replication v7 Deep Dive Anton Gostev, Veeam Software Doug Hazelman, Veeam Software BCO5362 #BCO5362.
Network-Attached Storage
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
After completing this topic, you will be able to explain the Agent for Hyper-V: backup flows Agent for Hyper-V: Backup flows.
Walter Pitrof Technology Solution Professional Microsoft Switzerland Backup, Restore und Disaster Recovery mit Data Protection Manager 2012 Philipp Witschi.
Module 8: Designing Active Directory Disaster Recovery in Windows Server 2008.
November 2009 Network Disaster Recovery October 2014.
Storage Security and Management: Security Framework
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Offsite Backup Solutions Justin Paul Senior Virtualization Engineer / VMware vExpert –
4/23/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
© 2014 VMware Inc. All rights reserved. Panzura with vCloud Air High-level Overview XYZ Date.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Component 8/Unit 9bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 9b Creating Fault Tolerant.
What is YOUR Data Worth???. “Just because you're paranoid doesn't mean they aren't after you.” Joseph Heller, Catch-22.
Using the Cloud to secure your data.. History of Randsomware December 1989 – AIDS Trojan made users male $189 USD to a PO Box in Panama. Fast-forward.
Elmtree Backup as a Service Discussion Veeam Cloud Connect Chris Tew – Business Development Manager Bruce Lawrence – Service Delivery Manager.
Veeam Availability Suite v9. Availability for the Always-On Enterprise.
Don’t let backups be the backdoor to your security policy Brad Farabaugh Senior Systems Engineer.
Commvault and Nutanix October Changing IT landscape Today’s Challenges Datacenter Complexity Building for Scale Managing disparate solutions.
Alicia A. Coon COSC 480 October 27, 2006
Veeam software Risk Mitigation and Protection
Network customization
Planning for Application Recovery
Storage Area Networks The Basics.
Integrating Disk into Backup for Faster Restores
Secure Data – a safe place in an unsafe world!
VMware Backup & Replication
Disaster Planning and Recovery
Network Attached Storage Overview
Table spaces.
Maintaining Windows Server 2008 File Services
1Y0-301 Deploying Citrix XenDesktop 7.6 Solutions
Veeam for the Microsoft Cloud
Introduction to Operating Systems
Installing OS.
Lesson Objectives Aims You should be able to:
Introduction to Data Management in EGI
Welcome! Thank you for joining us. We’ll get started in a few minutes.
Briefing: Leverage HPE Storage Solutions in Windows/Hyper-V
2TCloud - Veeam Cloud Connect
IT Services Portfolio Todd Endicott – Senior Network and System Engineer Mary Monroe – Implementation Engineer.
[Company Name] Veeam Offerings
THE STEPS TO MANAGE THE GRID
Introduction To Networking
Introduction to Networks
Veeam Backup Repository
Real IBM C exam questions and answers
Veeam-Powered Availability
Quick Sales Guide Acronis Backup Cloud Powered by Acronis – local and cloud backup and recovery service to solve your customers’ data protection challenges.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Data Security for Microsoft Azure
Preventing a Disaster -“A GB of Backup is Worth a TB of Sleep.”
PRESENTER GUIDANCE: These charts provide data points on how IBM BaaS mid-market benefits a client with the ability to utilize a variety of backup software.
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Andy Puckett – Sales Engineer
Computer communications
Using the Cloud for Backup, Archiving & Disaster Recovery
ENA Cloud Services.
Chris Henley & Ben DiQual
Network customization
Veeam Backup & Replication
Quick Tips #2 – VEEAM ONE Business View 10 minutes demo
Quick Tips #1 – Wan accelerator seeding for backup jobs
Presentation transcript:

7 tips to prevent ransomware attacks on backup storage Joe Marton Senior Systems Engineer joe.marton@veeam.com

Use special credentials for backup storage/backup job Tip #1: Use special credentials for backup storage/backup job

Tip #1: Use different credentials for backup storage Worst practice Worst practice using DOMAIN\Administrator for everything using DOMAIN\Administrator for everything Best practice using DOMAIN\backup-administrator (dedicated account with all corresponding privileges to complete successful backup) The username context that is used to access the backup storage should be very closely kept and used exclusively for that purpose. Additionally, other security contexts shouldn’t be able to access the backup storage other than the account(s) needed for the actual backup operations. Always consider authentication in the design and implement as much separation as possible from production workloads!

Utilize an offline storage Tip #2 : Utilize an offline storage

Tip #2: Utilize an offline storage Media type Characteristic Tape Completely offline when not being written or read from Replicated VMs Powered off and in most situations can be a different authentication framework (ex: vSphere and Hyper-V hosts are on a different domain) Primary storage snapshots Can be used as recovery techniques and usually have a different authentication framework Cloud Connect backups It’s not connected directly to the backup infrastructure and uses a different authentication mechanism along with different API Rotating hard drives (rotating media) Offline when not being written to or read from Cloud Connect has different credentials but also it is not a CIFS / SMB or NFS share so very hard to be exploited by malware even with credentials exploited.

Leverage different file systems for backup storage Tip #3 : Leverage different file systems for backup storage

Tip #3: Leverage different file systems for backup storage Example: any Linux based repository (ext3, etx4, etc) with different authentication framework Dell EMC DataDomain Using DDBoost or NFS mount HPE StoreOnce Using Catalyst ExaGrid Using native Veeam agent Linux server with JBOD Using NFS mount Having different protocols involved is a good way to prevent ransomware propagation.

Take storage snapshots on backup storage if possible Tip #4: Take storage snapshots on backup storage if possible

Tip #4: Take storage snapshots on backup storage if possible Veeam Backup Server Storage Storage Volume Volume Snapshot Storage snapshots usage as a “semi-offline” technique for primary storage and the same goes for backup storage. If the storage device holding backups supports this capability it may be worth leveraging it. Backup Repository

Tip #5: Master 3-2-1-1 Rule

Tip #5: Master the 3-2-1-0 Rule Different media 3 Different copies of data 1 of which is off-site cloud Is offline No errors after backup recoverability verification The 3-2-1 rule states to have three different copies of your media, on two different media, one of which is off-site.  And it’s a good idea to add another “1” to the rule where one of the media is offline. The offline storage options listed above highlighted a number of options where you can implement an offline or semi-offline copy of the data.

Have visibility into suspicious behavior Tip #6: Have visibility into suspicious behavior

Tip #6: Have visibility into suspicious behavior Use monitoring software to automatically detect suspicious VM behavior Example: Pre-defined alarm “Possible ransomware activity” in Veeam ONE 9.5. This alarm triggers if there are a lot of writes on disk and high CPU utilization One of the biggest fears of ransomware is that it may propagate to other systems. Having visibility into potential ransomware activity is a big deal. Use software alerts to detect this.

Tip #6: Have visibility into suspicious behavior “Possible ransomware activity” alarm in Veeam ONE 9.5

Let the Backup Copy Job do the work for you Tip #7: Let the Backup Copy Job do the work for you

Tip #7: Let the Backup Copy Job do the work for you When the previous tips above are incorporated, the backup copy job can be a valuable mechanism in a ransomware situation because there are different restore points in use with the Backup Copy Job. The Backup Copy Job is a great mechanism to have restore points created on different storage and with different retention rules than the regular backup job. When the previous points above are incorporated, the backup copy job can be a valuable mechanism in a ransomware situation because there are different restore points in use with the Backup Copy Job.

Tip #7: Let the Backup Copy Job do the work for you Backup Server Data Mover Service Data Mover Service VM restore point Veeam Backup Copy Job for CIFS share in action: if you have instructed Veeam Backup & Replication to automatically select the gateway server, Veeam Backup & Replication will use the Data Mover Services deployed on the backup server. If you have explicitly defined the gateway server, Veeam Backup & Replication will use the source Veeam Data Mover Service on the gateway server in the source site and target Veeam Data Mover Service on the gateway server on the target site. Source Backup Repository Gateway Server Gateway Server Target Backup Repository

US Headquarters 2520 Northwinds Parkway Alpharetta, GA 30009 678.353.2140 (Main office) 800.774.5124 (Support) 800.913.1940 (Support) Join us on: www.veeam.com