Presentation is loading. Please wait.

Presentation is loading. Please wait.

BACKUP IS DEAD! Restore iS born in the cloud!

Similar presentations


Presentation on theme: "BACKUP IS DEAD! Restore iS born in the cloud!"— Presentation transcript:

1 BACKUP IS DEAD! Restore iS born in the cloud!
Robert Hedblom | sumNERV Cloud and Solution Principal Architect robertanddpm.blogspot.com Steve Buchanan | Concurrency Regional Solutions Director

2 Robert Hedblom Steve Buchanan @RobertandDPM @buchatech 8 Year CDM MVP
20+ years in IT, 15+ years Business Continuity 15+ years in IT Meat Dinner with Robert

3 Getting started The longest journey always start with the first step…

4 Why do you back up your data

5 The key starting points
Why should you back up What data is important When should you back it up Who is responsible Where is the data stored Which data relates to another or other Business Services

6

7 Is all data equally important?
Define your Business Services and Infrastructure Services Create different tiers Threat and risk analysis (TRA) Business Impact Analysis (BIA) Business Continuity Plan (BCP)

8 Teir 1 Brings great value to your company
Revenue Timesaver Customer Facing Applications If this services goes down the impact will be significant for the company Customer facing applications Accounting applications ERP Any application tied to generating revenue

9 TIER 2 Business Services that have high use in the business
High and wide use across the entire organization Impacts at an enterprise level (Exchange) S4B HRMS SharePoint CRM Any application the business needs day to day but is NOT tied to revenue

10 Research and development application Marketing application
TEIR3 Business Services on a departmental level No impact on revenue or at an enterprise level Research and development application Printing application Marketing application Department specific. Not tied to revenue or does not have enterprise wide impact.

11 Why 2 off-site copies? April 11th 2016: An administrator wiped his entire company servers, customers data, and all their backups.

12 Planning RTO and RPO Robert H

13 Defining downtime & data loss
How could you define “Downtime”, “Data loss” and “Level of recovery”? Recovery Time Objectives (RTO) Recovery Point Objectives (RPO) Recovery Level Objectives (RLO)

14 Service Level Agreement
“A service-level agreement (SLA) is a part of a standardized service contract where a service is formally defined. Particular aspects of the service – scope, quality, responsibilities – are agreed between the service provider and the service user. ”

15 Recovery means Recovery Plan
Build a Business Continuity plan Sort out the Business Services and their dependencies Define and monitor your Service Level Agreements Perform continually restore-test for tier 1 Automation

16 DEMO Robert H

17 Being Ready for Cloud Steve B

18 Moving to Cloud Services
Roadmap for adapting the cloud Spend time understand HOW and WHEN Adopt your Business Continuity Plan to your cloud roadmap Steve B

19 Cloud ready Business Continuity Tools
Data Protection Manager Can send backup data to cloud Azure Backup Backup for on-prem directly to cloud and or IaaS protection Azure Backup Server DPM for free with Azure Backup account! Azure Site Recovery DR as a Service Hyper-V Replica On-prem to On-prem VM protection Steve B

20 Backup Security Steve B

21 Does backup security really matter?
Steve B Absolutely. Yes.

22 Security’s role in backup
When planning for protection of applications and data in your environment security should right up there in the forefront. “Backup Security” should be a key part of the plan. #1 as securing the backups #2 backups being used as an added measure for security breach mitigation Security in the context of backup can be thought of as: Steve B In regards to securing backups you want to do things like encrypt backup data as it travels offsite, encrypting backup data at rest, being able to protect encrypted data, requiring security pins or further authentication of admins and more. In regards to backup as an added measure for security backup becomes a direct part of Security planning in organizations. Sometimes when security measures fail backups are the only thing that can save you as a last resort. Backups are commonly becoming a way to recover from ransomware attacks as an alternative to paying the hackers.

23 How does Microsoft business continuity help
Prevent Alert Recover Prevent the security risk in the first place. If an attack occurs notify right away. The ability to recover means everything. Steve B

24 Product Breakdown Data Protection Manager Azure Backup
Encrypted backup data at rest MFA Security PIN Ransomware attacks Encrypted backup data at rest Backup data encrypted during offsite transfer Protection and recovery of shielded (Bitlocker) Hyper-V Virtual Machines Ransomware attacks Steve B Encrypted backup data at rest Once backup data is on Azure it is encrypted at rest. Microsoft does not decrypt the backup data at any point. The customer is the only one with the encryption key that can decrypt the backup data. If this key is lost not even Microsoft can decrypt your backup data. This is very secure. Security PIN With Azure Backup you can require a security pin for sensitive operations such as removing protection, deleting data, or changing other settings in Azure Backup itself such as changing a Passphrase. Azure Backup also has some other security measures in place like a minimum retention range to ensure a certain amount of backup data is always available and notifications upon critical operations to subscription admins or others as specified. MFA MFA is Multi-Factor Authentication. Microsoft has MFA available as a part of Azure Active Directory. Within Azure Backup you can configure it to require MFA of admins when performing critical operations. By enabling MFA you would then ensure via authentication from a second device usually physical to the user that they are who they say they are. Protection and recovery of encrypted computers The release of Hyper-V on Windows Server 2016 included a new feature known as Shielded virtual machines (VM’s). This feature essentially utilizes Virtual Trusted Platform Module (vTPM) technology and BitLocker to encrypt a VM to encrypt virtual machines at the virtual layer. This means if a VM is physically copied off a Hyper-V host whoever has the VM will not be able to get to the data on the virtual hard drive. With the release of DPM 2016 it supports protecting Shielded VM’s. DPM can protect Shielded VM’s regardless if they are VHD or VHDX. This is great news because as a secure organization you should want to encrypt your virtual machines and DPM can protect them. This gives you an added layer of security on top of having backups. Ransomware attacks In today’s world ransomware attacks are a common thing. These type of attacks are targeted at small, medium, and large enterprise businesses. No company is too small or too big to be put in the crosshairs of ransomware attacks. A well-known attack is Cryptolocker. As mentioned before in this blog post backups are an alternative to paying the ransom of a ransomware attack. They key here is to ensure you have a solid offsite backup in place such as Azure Backup. Having that offsite backup will ensure you can get your data back even if the ransomware attack get ahold of your onsite backup data.

25 DEMO Security in Azure Backup Steve B

26 The finish line Robert H

27 Sweet success… Build a Business Continuity Plan
Test and validate your recovery plans Proactive monitoring, not reactive Validate your strategies Rehearse and practice Robert H

28 Need answers? Don’t be afraid to ask me in person! Contacts:
Robert Hedblom

29

30


Download ppt "BACKUP IS DEAD! Restore iS born in the cloud!"

Similar presentations


Ads by Google