Preventing a Disaster -“A GB of Backup is Worth a TB of Sleep.”

Slides:



Advertisements
Similar presentations
Introducing FailSafeSolutions Online Backup Software.
Advertisements

The System Center Family Microsoft. Mobile Device Manager 2008.
MUNIS Platform Migration Project WELCOME. Agenda Introductions Tyler Cloud Overview Munis New Features Questions.
Skyward Disaster Recovery Options
Harris LiveVault® Online Backup System. Harris LiveVault 2  What is Harris LiveVault?  Why Harris LiveVault?  How Harris LiveVault works  Harris LiveVault.
Shared File Service VM Forum January, SFS Topics Targeted Usage Security Accessing CIFS Shares Availability & Protection Monitoring Pricing.
Barracuda Backup Service Data Backup and Disaster Recovery.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Cloud Backup. Current Backup failures  Bad media (tapes have limited lifespan, HDD’s can fail)  Backup software fault  Operating system fault  Human.
IT is our job! Mind your own business.. 1.Consulting 2.Support 3.Maintenance Network Assessment We provide you with an overview of your current network,
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Kaseya Data Backup KDB Online backup. Preamble Due to limitations in the current structure of permission some aspects of using Private Storage can be.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
November 2009 Network Disaster Recovery October 2014.
Chapter 10 : Designing a SQL Server 2005 Solution for High Availability MCITP Administrator: Microsoft SQL Server 2005 Database Server Infrastructure Design.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 18: Windows Server 2008 R2 and Active Directory Backup and Maintenance BAI617.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
David N. Wozei Systems Administrator, IT Auditor.
1 © 2010 Overland Storage, Inc. © 2012 Overland Storage, Inc. Overland Storage The Storage Conundrum Neil Cogger Pre-Sales Manager.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
11 DISASTER RECOVERY Chapter 13. Chapter 13: DISASTER RECOVERY2 OVERVIEW  Back up server data using the Backup utility and the Ntbackup command  Restore.
Configuring Data Protection Chapter 12 powered by dj.
Module 15 Managing Windows Server® 2008 Backup and Restore.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Component 8/Unit 9bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 9b Creating Fault Tolerant.
HalFILE 2.1 Network Protection & Disaster Recovery.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Backup Technologies Revisited. o Physical or Virtual or Both o Full VM or Agent o On-site or Off-Site or Both o Application Consistent or Crash Consistent.
Install, configure and test ICT Networks
Storage Netværk Mød Microsoft Feb 2005, Agenda Data Protection Server (opdatering) Microsoft og iSCSI Demo.
KeepItSafe Solution Suite Securely control and manage all of your data backups with ease, from a single location. KeepItSafe Online Backup KeepItSafe.
CommVault Architecture
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
© 2015 MetricStream, Inc. All Rights Reserved. Cloud Backup and DR Configuration © 2015 MetricStream, Inc. All Rights Reserved. By, Shailesh & Sherin.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Backup and Disaster Dr Stuart Petch CeG IT/IS Manager
Commvault and Nutanix October Changing IT landscape Today’s Challenges Datacenter Complexity Building for Scale Managing disparate solutions.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
Backups for Azure SQL Databases and SQL Server instances running on Azure Virtual Machines Session on backup to Azure feature (manual and managed) in SQL.
Database recovery contd…
XenData SX-10 LTO Archive Appliance
Dev and Test Solution reference architecture.
Open-E Data Storage Software (DSS V6)
Business Continuity & Disaster Recovery
Maintaining Windows Server 2008 File Services
Dev and Test Solution reference architecture.
Dev and Test Solution reference architecture.
Chapter 5 : Designing Windows Server-Level Security Processes
7 tips to prevent ransomware attacks on backup storage
Dev and Test Solution reference architecture.
Agenda Backup Storage Choices Backup Rule
Dev and Test Solution reference architecture.
2TCloud - Veeam Cloud Connect
Bare Metal Server Backup Solution
Uptime All The Time: Doing Business In The Cloud
Business Continuity & Disaster Recovery
CYB 110 Competitive Success/snaptutorial.com
The Ultimate Backup Solution.
The Ultimate Backup Solution.
Dev and Test Solution reference architecture.
Andy Puckett – Sales Engineer
Using the Cloud for Backup, Archiving & Disaster Recovery
AWS S3 Cloud Backup Licensing per system Starting at $79 per year.
6. Application Software Security
IBM Tivoli Storage Manager
Designing Database Solutions for SQL Server
Presentation transcript:

Preventing a Disaster -“A GB of Backup is Worth a TB of Sleep.” www.fortlewis.edu Backup Strategies Preventing a Disaster -“A GB of Backup is Worth a TB of Sleep.” Parker Jardine – April 2017

Preventing a Disaster Disaster Prevention and Focus on Availability www.fortlewis.edu Preventing a Disaster Disaster Prevention and Focus on Availability Network Redundancy Design Vmware vSphere Metro Storage Cluster Design 3rd Datacenter Site Backup Strategies Current Backup Issues Fort Lewis College’s Backup Strategy The “1” in the 3-2-1 Backup Strategy The Ransomware Threat – Backup Strategy Changes A Second Look At Tape – And Long Term Data Retention

Preventing a Disaster Network Design www.fortlewis.edu Preventing a Disaster Network Design The current generation FLC Network is a two tier, dual core campus network fully meshed with a two tier, dual core data center network. Datacenter isolation from campus core (all user networks)

www.fortlewis.edu Preventing a Disaster Vmware vSphere Metro Storage Cluster (Uniform Configuration) Primary Storage High Availability using HPE 3PAR Peer Persistence Vmware Stretch Cluster for Datacenter and Compute HA Resource Utilization – 50% rule

Preventing a Disaster 3rd Datacenter Site Network Connectivity www.fortlewis.edu Preventing a Disaster 3rd Datacenter Site Network Connectivity Backup Storage, Servers, and Tape Libraries

Nature’s Backup Strategy www.fortlewis.edu Nature’s Backup Strategy

World Backup Day Strategy www.fortlewis.edu World Backup Day Strategy

3 – Keep 3 copies of any important file: 1 primary and 2 backups. www.fortlewis.edu 3-2-1 Backup Strategy US-CERT Recommended Backup Strategy (Including the Pros, Cons and Security Implications 1 3 – Keep 3 copies of any important file: 1 primary and 2 backups. 2 – Keep the files on 2 different media types to protect against different types of hazards. 1 – Store 1 copy offsite (e.g., outside your home or business facility). Common Backup Strategies Disk To Cloud (No onsite storage) Disk To WAN (No onsite storage) Disk To Disk To Cloud Disk To Disk To WAN Disk Disk To Disk To Tape Disk To Tape Disk To Disk 1 - https://www.us-cert.gov/sites/default/files/publications/data_backup_options.pdf

The “1” in the 3-2-1 Backup Strategy www.fortlewis.edu The “1” in the 3-2-1 Backup Strategy

The “1” in the 3-2-1 Backup Strategy www.fortlewis.edu The “1” in the 3-2-1 Backup Strategy A primary backup storage device is used for quick backup and restore processes Backups are then copied to a secondary backup storage device using a native Backup Copy Job. 1 Backup Copy Job to disk Not simply copying the backup file to another disk, but a secondary backup copy job Should the primary backup be encrypted or become corrupt, the Backup Copy Job would also fail because the backup software would not be able to interpret the data. 1 Removable hard disks This is the scenario of connecting external USB drives that can be disconnected They should be interchanged regularly and should not be kept connected to the system permanently. 1 1 - https://www.veeam.com/blog/how-to-protect-against-ransomware-data-loss-and-encryption-trojans.html

The “1” in the 3-2-1 Backup Strategy www.fortlewis.edu The “1” in the 3-2-1 Backup Strategy Tape Tapes should be exported to a secure location for optimum protection. 1 Storage snapshots and replicated VMs Semi-Offline instances of data Storage snapshots and replicated VMs are usually created and updated on a schedule Cloud backup repository Off-site data Access anywhere Now native functionality within some backup software 1 - https://www.veeam.com/blog/how-to-protect-against-ransomware-data-loss-and-encryption-trojans.html

Fort Lewis College’s Backup and Recovery Strategy www.fortlewis.edu Fort Lewis College’s Backup and Recovery Strategy Current Backup Issues Growth of on-premise data is still increasing substantially VM Servers are still growing Camera data, Logging data, ERP data Data integrity and Backup Verification Virtual Machine Incident Different procedures for backing up different systems Appliances and unique systems Threat of Ransomware within the environment Veeam Endpoint protection agents Not Cluster Aware (For our Legacy File Share and SQL Clusters) Unlimited Budgets? Primary Storage redundancy, network redundancy, multiple data centers, cooling, generators, fire suppression, backup storage, tape libraries, off-site storage repositories IT staff resources

4.1 Backup Plan Fort Lewis College’s Backup and Recovery Strategy www.fortlewis.edu Fort Lewis College’s Backup and Recovery Strategy 4.1 Backup Plan Server backups are performed nightly, every day of the week including weekends and holidays. Server backup verification jobs will run daily to validate the entire disk contents and check for any silent data corruption for the most recent backups. All backups are retained for the length of time related to the retention policy applied to the backup job before recycling. See section 4.2 for retention policies. Active full server backups are performed monthly, occurring on the last Saturday and Sunday of the month. Windows File Shares will be protected with Volume Shadow Copies, allowing 1 month of previous versions on folders and files. All backup data will be stored in the primary backup storage location. The primary backup location is a fully redundant datacenter on campus. This location has its own redundant switching, backup power, and cooling.

Fort Lewis College’s Backup and Recovery Strategy www.fortlewis.edu Fort Lewis College’s Backup and Recovery Strategy A third copy of the most recent ERP database server and supported middleware servers will be moved to an off-site cloud provider daily (On the roadmap). A third copy of all production backup data will be encrypted and placed on drone to fly up to the mountain site. It will then then return the following week for the next data load and system charge (On the roadmap). The entire IT systems administration team will manage and monitor backups. Backups will be automated using Veeam Backup and Replication and Veritas Backup Exec. Daily backup job summary emails will be sent directly to the IT Managers and delegated IT staff as desired.

Fort Lewis College’s Backup and Recovery Strategy www.fortlewis.edu Fort Lewis College’s Backup and Recovery Strategy Any backup related issues will be reported to the Director of Information Technology and action will be taken to quickly fix the problem. Baseline backups will be performed on the server before moving the server into production. Decommission server backups will be performed on the servers before removing it from the environment. Decommission server backups will be retained for 30 days after removal.

Fort Lewis College’s Backup and Recovery Strategy www.fortlewis.edu Fort Lewis College’s Backup and Recovery Strategy 4.2 Retention Policies Non-Production Retention Policy (14 day retention) Test and Non-Production Server Data: All test and non-production server data is retained for 14 days. Production Retention Policy (3 month retention) Production Server Data: All production server data, including servers that are used to monitor and manage the environment. Production Extended Retention Policy ( 6 month retention) Email and ERP system data: All on-premise email data and the college’s critical ERP system data is retained for 6 months. Archive Retention Policy (1 year retention) File Share Data: All student, faculty, and staff file share data located on the M, O and other mapped drives. The last monthly active full backup is retained for a 1 year.

The Ransomware Threat – Backup Strategy Changes www.fortlewis.edu The Ransomware Threat – Backup Strategy Changes https://www.fbi.gov/news/stories/incidents-of-ransomware-on-the-rise Latest Ransomware Threat LOCKY Ransomware family called Osiris (Nov 2016 – March 2017) secondary malware that included a keystroke logger spoofed Email Delivery Notifications from UPS, FEDEX or USPS with a zip files attached the Zip file was a JavaScript file disguised as a word document If the JavaScript file was executed it would retrieve executables from  compromised WordPress sites on the Internet

The Ransomware Threat – Backup Strategy Changes www.fortlewis.edu The Ransomware Threat – Backup Strategy Changes Safeguarding Backup Repositories from Ransomware Backup Repository Servers should not be connected to AD Should be protected as much as possible from the rest of the network Local user accounts only Backup Software service account access Only account that has access to the backup repository data NAS Backup Repository Only backup service account should have access to the backup repository data Domain Administrators Should never login to a local desktop with a domain administrator account This can lead to the ransomware spreading around the network very quickly Firewall must be turned on! And not be configured for IP/ANY A virus scanner with an activated real-time search

A Second Look At Tape – And Long Term Data Retention www.fortlewis.edu A Second Look At Tape – And Long Term Data Retention Security Benefits Becoming an increasingly popular option for IT to leverage again in regards to encryption Trojans Tapes do not enable direct data access, and thus provide protection against ransomware The Enterprise Strategy Group, Inc has completed a detailed economic analysis for data archiving. Source: ESG White Paper, Analyzing the Economic Value of LTO Tape for Long-term Data Retention, 2016

A Second Look At Tape – And Long Term Data Retention www.fortlewis.edu A Second Look At Tape – And Long Term Data Retention Source: ESG White Paper, Analyzing the Economic Value of LTO Tape for Long-term Data Retention, 2016

A Second Look At Tape – And Long Term Data Retention www.fortlewis.edu A Second Look At Tape – And Long Term Data Retention http://resources.idgenterprise.com/original/AST-0163679_3_3_2016_ESG_Economic_Value_of_LTO_Tape_TCO_REV.pdf Source: ESG White Paper, Analyzing the Economic Value of LTO Tape for Long-term Data Retention, 2016

Questions? Defrag Animation www.fortlewis.edu