Check out our companion blog!
Jan. 16, 2023

Protecting backups from ransomware (Backup to Basics)

Protecting backups from ransomware (Backup to Basics)

The latest in our Backup to Basics series is about making sure hackers don't delete, encrypt, or exfiltrate your backups as part of a ransomware attack. (Our Backup to Basics series reviews topics from Curtis' latest book Modern Data Protection, which you can download at druva.com/e-book.) We talk about how and why hackers are specifically targeting your backup system to either disable it or use it as a source for exfiltration. Then we talk about a number of things you can do to defend your backup system against these attacks. This is our most important episode in a while.

Mentioned in this episode:

Interview ad

Transcript
Speaker:

On this episode of restored all we're talking about how to secure your backup

Speaker:

data, to make sure that it doesn't get attacked in a ransomware attack.

Speaker:

Hope you enjoy.

Speaker:

The episode.

W. Curtis Preston:

Hi, and welcome to Backup Central's Restore it All podcast.

W. Curtis Preston:

I'm your host, W.

W. Curtis Preston:

Curtis Preston, a k a, Mr.

W. Curtis Preston:

Backup, and I with me, a guy whose only major flaw is that he

W. Curtis Preston:

won't go see scary movies with me.

W. Curtis Preston:

Prasanna Malaiyandi.

W. Curtis Preston:

How's it going?

W. Curtis Preston:

Prasanna.

Prasanna Malaiyandi:

I am good, Curtis.

Prasanna Malaiyandi:

I, yeah, I'm not a big fan of scary movies, especially on a large screen.

Prasanna Malaiyandi:

Um, I don't like, I know some people like you love it, but it's just I don't

Prasanna Malaiyandi:

find joy in watching a scary movie.

Prasanna Malaiyandi:

I do remember in college watching the Ring.

Prasanna Malaiyandi:

On a big screen.

W. Curtis Preston:

That movie messed with my head.

W. Curtis Preston:

I remember coming home and asking someone to take my picture.

W. Curtis Preston:

And saying, is there a thing in the picture?

W. Curtis Preston:

You know, I was scared.

W. Curtis Preston:

I was scared to take the picture.

W. Curtis Preston:

Yeah.

W. Curtis Preston:

That movie, that was, that was a fun movie.

W. Curtis Preston:

Um, it really kind of messed with your head.

Prasanna Malaiyandi:

And you just saw a scary movie just recently.

W. Curtis Preston:

Yeah.

W. Curtis Preston:

It, it,

Prasanna Malaiyandi:

Well, I wouldn't know if I'd called

W. Curtis Preston:

movie per se, it's more like a thriller.

W. Curtis Preston:

Um, It's called the Menu and it stars.

W. Curtis Preston:

Uh, Ralph finds, um, a k a Voldemort, and uh, Anya, the girl from the Queens gambit.

W. Curtis Preston:

Yeah.

W. Curtis Preston:

Um, and some other, other character actors that you may be familiar with.

W. Curtis Preston:

Um, and, uh, it, it's, it's a movie that I, I enjoyed the movie.

W. Curtis Preston:

I will just say this, um, trigger alert for those who are bothered by such things.

W. Curtis Preston:

It does contain suicide.

W. Curtis Preston:

Um, having said that, um, within the context of the show, it, it was a

W. Curtis Preston:

significant part of the storyline.

Prasanna Malaiyandi:

Mm-hmm.

W. Curtis Preston:

Um, and um, but having said that, it

W. Curtis Preston:

was a really unique storyline.

W. Curtis Preston:

That's a commentary on Modern Day Society.

W. Curtis Preston:

You know, there's a class thing, there's a, there's a, yeah.

Prasanna Malaiyandi:

It's not often that you come out of a movie and be

Prasanna Malaiyandi:

like, oh my God, that was so good.

W. Curtis Preston:

yeah, it was, it was, I really enjoyed it.

W. Curtis Preston:

I was like, oh, that was, I, I thought the ending.

W. Curtis Preston:

I don't know.

W. Curtis Preston:

I think I would've done something slightly differently within the ending, but the um,

Prasanna Malaiyandi:

That is why you are not the director, Curtis.

Prasanna Malaiyandi:

We're the writer.

W. Curtis Preston:

Yeah, that's why I'm not the director or the writer.

W. Curtis Preston:

I, I was not the only one, by the way.

W. Curtis Preston:

I read some reviews and stuff, and a lot of people felt the ending

W. Curtis Preston:

was somewhat anti cli climactic.

W. Curtis Preston:

But it was one of those movies where you're like, what?

W. Curtis Preston:

What is over?

W. Curtis Preston:

Like, it's one of those kind of movies, but everything all the

W. Curtis Preston:

way up to that point I thought, I thought was really, really good.

W. Curtis Preston:

All the actors are really good.

W. Curtis Preston:

Um,

Prasanna Malaiyandi:

never seen a Bollywood movie?

W. Curtis Preston:

yeah, what's

Prasanna Malaiyandi:

Where it's like anti-climactic at the very end.

Prasanna Malaiyandi:

It's like they literally, a lot of the movies boiled the ending down

Prasanna Malaiyandi:

to like the last like five minutes.

W. Curtis Preston:

interesting.

W. Curtis Preston:

Um, this one,

Prasanna Malaiyandi:

Shrek, oh, you would be proud.

Prasanna Malaiyandi:

Shrek.

Prasanna Malaiyandi:

And I watched while you were watching this movie, Shrek and

Prasanna Malaiyandi:

I watched a Bollywood movie.

W. Curtis Preston:

Uhhuh,

Prasanna Malaiyandi:

On Netflix and it was also suspenseful and kind of a comedy

Prasanna Malaiyandi:

thriller ish, but I would say that they basically wrapped up all the entire

Prasanna Malaiyandi:

movie in the last like five minutes.

Prasanna Malaiyandi:

And then at the end, Shraddha and I were like, what did we just watch?

W. Curtis Preston:

Interesting.

Prasanna Malaiyandi:

because we, because it left so many things open at the end and

Prasanna Malaiyandi:

we're like, did we just watch all of that?

Prasanna Malaiyandi:

Just for that last closing part?

W. Curtis Preston:

That's funny.

Prasanna Malaiyandi:

it's like two and a half hours also, so,

W. Curtis Preston:

Interesting thing about this movie is, you know, how the movie's

W. Curtis Preston:

gonna end about halfway into the movie.

W. Curtis Preston:

Like they tell you how the movie's gonna end.

W. Curtis Preston:

Um, it's just how it gets there.

W. Curtis Preston:

It, it, it's just was, was really good.

W. Curtis Preston:

Um, so I recommend it.

W. Curtis Preston:

Um, and, uh, you know, the, the

Prasanna Malaiyandi:

are you and

W. Curtis Preston:

saga continues.

W. Curtis Preston:

What I.

Prasanna Malaiyandi:

Are you and Jeff gonna talk about it on

Prasanna Malaiyandi:

your next, on the other podcast,

W. Curtis Preston:

know, he keeps threatening to record another

W. Curtis Preston:

episode and then he doesn't do it.

W. Curtis Preston:

But I'll , I'll take

Prasanna Malaiyandi:

I think Curtis is calling you out here.

W. Curtis Preston:

Jeff and I actually recorded a new episode this week, so look

W. Curtis Preston:

for it at, The Things That Entertain Us podcast, wherever you listen to podcasts.

W. Curtis Preston:

Today we're going, we're continuing in our backup to basic series, and we're

W. Curtis Preston:

covering, again, we're covering the book, modern Data Protection on Hold.

W. Curtis Preston:

For those of you watching this on backup central.com where you can watch the video

W. Curtis Preston:

of Prasanna and I waxing philosophical.

W. Curtis Preston:

Um, and, uh, you know, what we're doing is we're sort of going through the book and

W. Curtis Preston:

just discussing, you know, some important topics that I, that I found in the book.

W. Curtis Preston:

Um, and this next one is about protecting backup and archive data, which I

W. Curtis Preston:

think we can all agree is important.

W. Curtis Preston:

If you would like to download a free e-book copy of Modern Data Protection,

W. Curtis Preston:

you can do so at druva.com  slash ebook.

W. Curtis Preston:

Uh, we have to protect it from a couple of different things, right?

W. Curtis Preston:

We have to, mainly what I'm talking about in here is protecting

W. Curtis Preston:

it against attacks, right?

W. Curtis Preston:

Um, both attacks from like a, um, like a disaster type type attack.

W. Curtis Preston:

But, but mainly what I'm talking about is protecting it from cyber attacks, which.

W. Curtis Preston:

Um, I'm gonna have these same conversations over and over, so

W. Curtis Preston:

sometimes I forget what we say here versus what I say other places, but

W. Curtis Preston:

it, it is a well acknowledged fact that some of the largest of the ransomware

W. Curtis Preston:

bad actors are specifically targeting backup systems in order to do the.

W. Curtis Preston:

The extortion style of ransomware attack, and let me specify what I'm saying there.

W. Curtis Preston:

So, you know, a, a bunch of companies started realizing that, well, if I just

W. Curtis Preston:

get a decent backup in recovery and disaster recovery system, I can say, you

W. Curtis Preston:

know, pound sand to the ransomware folks.

W. Curtis Preston:

Well, the ransomware folks then said, oh, well, we'll show you.

W. Curtis Preston:

And so they developed this, this exfiltration style, right.

W. Curtis Preston:

and the um, The idea there is that they find databases and file

W. Curtis Preston:

systems and spreadsheets and whatnot that contains sensitive data.

W. Curtis Preston:

That could be two different things.

W. Curtis Preston:

That could be your company secrets.

W. Curtis Preston:

It could be your company plans.

W. Curtis Preston:

It could be your 11 herbs and spices or your, your, um, You know, your

W. Curtis Preston:

corporate plans for the next year, you know, um, but it could also be

W. Curtis Preston:

secrets that are like embarrassing.

W. Curtis Preston:

Uh, I think the best example of that, and I know we've talked

W. Curtis Preston:

about it, is the Sony attack

Prasanna Malaiyandi:

This is the one where someone broke in to the

Prasanna Malaiyandi:

movie studios and got a bunch of emails talking about scripts and

Prasanna Malaiyandi:

actors and all the rest of that.

W. Curtis Preston:

and very, some, some, and not very, not very flattering terms.

W. Curtis Preston:

Yeah.

W. Curtis Preston:

So it could be that, right?

W. Curtis Preston:

But the point is, there is no way to protect against that once the data's out.

Prasanna Malaiyandi:

Yep.

W. Curtis Preston:

It's not like the other attack.

W. Curtis Preston:

If you get the, the old school attack, if you had a good backup system, you're good.

W. Curtis Preston:

It doesn't matter how good of a backup system you have, if the data is

W. Curtis Preston:

exfiltrated, uh, you're gonna be forced to make some major, uh, decisions, right?

W. Curtis Preston:

So, um, so what, what these, uh, ransomware groups have started

W. Curtis Preston:

realizing is, they, uh, instead the, the people are starting to

W. Curtis Preston:

harden their primary environments.

W. Curtis Preston:

Right?

W. Curtis Preston:

And so, but one, you know, you, you, you've heard me talk, did

W. Curtis Preston:

I say one thing that has never changed in backup and recovery in

W. Curtis Preston:

the world of backup and recovery?

W. Curtis Preston:

Do you, do you know what it is?

W. Curtis Preston:

I often say like the one thing that has never changed,

Prasanna Malaiyandi:

that the junior person is always responsible for backups

Prasanna Malaiyandi:

and recovery.

W. Curtis Preston:

that is technically a cause of the thing of the thing that

Prasanna Malaiyandi:

Speaker:

No one who cares about

W. Curtis Preston:

no one wants to do the backups, right?

W. Curtis Preston:

No one wants to raise their hand and say that they want to be the backup guy.

W. Curtis Preston:

So why does that matter?

W. Curtis Preston:

Well, it's because it means that, that it ends up being an

W. Curtis Preston:

an or and an ignored system.

Prasanna Malaiyandi:

Yep.

W. Curtis Preston:

and as a result, it means that it gets ignored by everyone,

W. Curtis Preston:

including the cybersecurity folks.

W. Curtis Preston:

Right?

Prasanna Malaiyandi:

They're like, ah, that's just a systematic in the corner.

Prasanna Malaiyandi:

It's fine.

Prasanna Malaiyandi:

We don't care about it except it contains all of our data.

W. Curtis Preston:

Yeah.

W. Curtis Preston:

And depending on how, how you handle, um, things like encryption,

W. Curtis Preston:

they may be able to unen encrypt.

W. Curtis Preston:

Said backups and then, you know, get the keys to the kingdom.

Prasanna Malaiyandi:

Yeah, and like you were saying earlier, Curtis,

Prasanna Malaiyandi:

the fact that a lot of people focus on production systems harden

Prasanna Malaiyandi:

them, but they may not always be considering these backup systems.

W. Curtis Preston:

Right, right, right.

Prasanna Malaiyandi:

Easy target.

W. Curtis Preston:

Easy target.

W. Curtis Preston:

And so you need to.

W. Curtis Preston:

not be such an easy target, right?

W. Curtis Preston:

It's like the old joke about the guy, two guys crossing a field and they

W. Curtis Preston:

see, they see a bull and the guy says, you know, can you outrun that bull?

W. Curtis Preston:

He said, Nope, I don't have to.

W. Curtis Preston:

What are you talking about?

W. Curtis Preston:

All I have to do is outrun you,

Prasanna Malaiyandi:

You

W. Curtis Preston:

So, so you just want to be less of an interesting

W. Curtis Preston:

target than the person next to you.

W. Curtis Preston:

So the, the first thing that we talk about in terms of protecting

W. Curtis Preston:

backup data is encryption,

Prasanna Malaiyandi:

Yeah, which everyone should be doing.

Prasanna Malaiyandi:

Like if no, if you aren't doing encrypting your backups, I don't

Prasanna Malaiyandi:

know what's wrong with you.

Prasanna Malaiyandi:

Like even if it's not encrypted, honestly,

W. Curtis Preston:

Tell us what you really think.

Prasanna Malaiyandi:

No.

Prasanna Malaiyandi:

, no, because encryption isn't some heavyweight thing that it used to be.

Prasanna Malaiyandi:

Right.

Prasanna Malaiyandi:

You don't have to go physically encrypt your data as it comes out.

Prasanna Malaiyandi:

You could do disc level encryption, right?

Prasanna Malaiyandi:

There's so.

Prasanna Malaiyandi:

Ways you could leverage encryption to fit into your environment.

Prasanna Malaiyandi:

It should be a no-brainer that all your data at rest is encrypted.

Prasanna Malaiyandi:

And in a lot of companies, right?

Prasanna Malaiyandi:

If you wanna fit, be sort of like, uh, what is it?

Prasanna Malaiyandi:

If you wanna look at HIPAA com, uh, readiness or other things, right?

Prasanna Malaiyandi:

Other regulatory obligations.

Prasanna Malaiyandi:

A lot of 'em say All your data at at rest should be encrypt.

W. Curtis Preston:

Mm-hmm.

W. Curtis Preston:

. Well, I, um, I do think, I do think backup page backup data should be

W. Curtis Preston:

encrypted for this very reason.

W. Curtis Preston:

Right?

W. Curtis Preston:

And I'll give you different reasons for the different things, right?

W. Curtis Preston:

So if it's, if you got a backup server on-prem and you're

W. Curtis Preston:

storing your backups on a.

W. Curtis Preston:

File system, you know, an NFS mounted file system.

W. Curtis Preston:

Then if they're unencrypted, you know

Prasanna Malaiyandi:

Everyone has access.

Prasanna Malaiyandi:

Yeah.

W. Curtis Preston:

Everyone has access to those backups and a lot of these PR

W. Curtis Preston:

backup products they offer like to, to, to, so some of the backup products store

W. Curtis Preston:

the backups, not in a backup format.

W. Curtis Preston:

They're in native format, so you could just mount a disc, right?

W. Curtis Preston:

Other backup products, put it in a backup format.

W. Curtis Preston:

but they offer an ability to read that backups like it,

W. Curtis Preston:

it's, it's for DR purposes.

W. Curtis Preston:

So, so if you're not encrypting them, then you're just, you're

W. Curtis Preston:

just asking for trouble.

W. Curtis Preston:

So that's the disc side.

W. Curtis Preston:

The second side will be the tape side.

W. Curtis Preston:

So if you are, and believe it or not, many people are still making backup

W. Curtis Preston:

tapes and they're making 'em primarily, I think for offsite, uh, storage.

Prasanna Malaiyandi:

Yep.

W. Curtis Preston:

And so, And this is the, this is the one where I'm like,

W. Curtis Preston:

if you are ma, if you are putting your company's like crown jewels onto a little,

W. Curtis Preston:

you know, plastic tape and then you're handing it to a man in a van and you are

W. Curtis Preston:

not at this point encrypting that data, you know, professional malfeasance at this

Prasanna Malaiyandi:

Well, and I wonder, it's almost as if that should be like

Prasanna Malaiyandi:

a default, you know, like you can't write data out without encrypting it,

Prasanna Malaiyandi:

but I guess you have to deal with key management and all the rest of that,

Prasanna Malaiyandi:

and so, , do you have flexibility to shoot yourself in the foot?

W. Curtis Preston:

yeah, exactly.

W. Curtis Preston:

Um, but I will also say this encryption is only good, is only as good as the

W. Curtis Preston:

authentication and authorization and key management system that is connected to it.

W. Curtis Preston:

And if you can easily defeat.

W. Curtis Preston:

That, uh, system then, you know, and, and, and I mentioned, so for example,

W. Curtis Preston:

I know we mentioned it on the podcast, please do not make your backup server

W. Curtis Preston:

part of your, uh, active directory.

W. Curtis Preston:

What, what is it, what is it called?

W. Curtis Preston:

A cloud?

W. Curtis Preston:

Just a domain.

W. Curtis Preston:

Yeah.

W. Curtis Preston:

Um, please don't do that.

W. Curtis Preston:

, so the next term is one that we can debate.

W. Curtis Preston:

Uh, and I, I honestly, I don't even need you.

W. Curtis Preston:

I can debate it myself, right?

W. Curtis Preston:

It's one of those where I go back and forth, um, you

W. Curtis Preston:

know, and that's the term air.

Prasanna Malaiyandi:

What is like air gap?

Prasanna Malaiyandi:

Curtis?

W. Curtis Preston:

well, well, there is, what was an air gap?

Prasanna Malaiyandi:

Yeah.

W. Curtis Preston:

It's, and it is where it, it is from once we get the term.

W. Curtis Preston:

So the idea was to put a gap of error between the protection

W. Curtis Preston:

copy and the protected thing.

Prasanna Malaiyandi:

Or, or since you're dealing with plumbing

Prasanna Malaiyandi:

right now, since you're dealing with plumbing right now, right?

Prasanna Malaiyandi:

You have an air gap normally, right?

Prasanna Malaiyandi:

When you think about your dishwasher

W. Curtis Preston:

Now you made me think about the dishwasher that

Prasanna Malaiyandi:

or,

W. Curtis Preston:

life a living hell.

Prasanna Malaiyandi:

Fine.

Prasanna Malaiyandi:

Or a toilet.

Prasanna Malaiyandi:

How about that?

Prasanna Malaiyandi:

that's actually technically a water gap, but

W. Curtis Preston:

Speaker:

Don't, you're killing me.

W. Curtis Preston:

Speaker:

Don't be, don't be bringing plumbing into this.

W. Curtis Preston:

Speaker:

Um, anyway, yeah.

W. Curtis Preston:

Speaker:

So you, you had to separate the, and it meant, again, it meant the,

W. Curtis Preston:

Speaker:

it meant the man in the van, right?

W. Curtis Preston:

Speaker:

You, you, you, you put some tapes in a box and you handed that box to a, you

W. Curtis Preston:

Speaker:

know, a man or a woman, and then they got into a van and they took it someplace.

W. Curtis Preston:

Speaker:

And in order to get to that thing, you needed to physically, Um, access it.

W. Curtis Preston:

Speaker:

Right?

W. Curtis Preston:

Speaker:

Which meant that if you were a hacker and you wanted to get to it, it,

W. Curtis Preston:

Speaker:

it would be virtually impossible.

W. Curtis Preston:

Speaker:

Not completely impossible.

W. Curtis Preston:

Speaker:

There's no, there's no, cuz I remember,

Prasanna Malaiyandi:

than cyber.

W. Curtis Preston:

yeah, I remember for example, we would, uh, once a

W. Curtis Preston:

year at an unannounced time, we would attempt to circumvent the security of.

W. Curtis Preston:

Uh, storage fender and we would, uh, use really good like liars and whatnot.

W. Curtis Preston:

And more specifically, we would use someone like me that they

W. Curtis Preston:

knew, they knew the person.

W. Curtis Preston:

And so they would go over there and they would, and we would just have

W. Curtis Preston:

this really, really like elaborate.

W. Curtis Preston:

Scenario that basically would want, would want the, it would make the

W. Curtis Preston:

person that works there want to leave us alone in the vault with the tapes.

W. Curtis Preston:

And at least once we were able to do that,

Prasanna Malaiyandi:

Hmm.

Prasanna Malaiyandi:

Was a person go, or did the person have to go through training, I guess.

W. Curtis Preston:

Yeah, I don't, I, you know, honestly, I was so long ago, I don't

W. Curtis Preston:

remember what happened to that, to that person who left us alone in the vault.

W. Curtis Preston:

But, so that's what I'm saying.

W. Curtis Preston:

It's not, it, it was never 100%.

W. Curtis Preston:

Right.

W. Curtis Preston:

Um, the, um, I mean, you've seen the movies, you know, I've

W. Curtis Preston:

seen Oceans 11 and 12 and 13.

W. Curtis Preston:

The um, but the problem is most of us don't use tape.

Prasanna Malaiyandi:

Mm-hmm.

W. Curtis Preston:

And most of us, or many of us don't even

W. Curtis Preston:

use a data center anymore.

W. Curtis Preston:

So this idea of putting a, an actual air gap between A and B is quite difficult.

W. Curtis Preston:

And so we've sort of adopted or adapted to the, you know, the virtual air gap.

W. Curtis Preston:

Right.

W. Curtis Preston:

Um, the, um, Uh, so this is separated in as many ways as we can.

W. Curtis Preston:

I don't know.

W. Curtis Preston:

You want to talk about

Prasanna Malaiyandi:

Yeah, and I think we talked about this on the episode about

Prasanna Malaiyandi:

backups, or maybe it was restores, but.

Prasanna Malaiyandi:

It's even though they are available online, right, that second copy,

Prasanna Malaiyandi:

so it's not the same as having that tape in a vault somewhere.

Prasanna Malaiyandi:

You wanna make that, make it as close to that as possible.

Prasanna Malaiyandi:

And we totally get that.

Prasanna Malaiyandi:

You still have to have connectivity, right?

Prasanna Malaiyandi:

It's still gonna be up, but can you lock it down?

Prasanna Malaiyandi:

Can you basically make that target as inaccessible as possible?

Prasanna Malaiyandi:

Uh, to prevent it from being attacked by say, someone, um, gaining access

Prasanna Malaiyandi:

to your backup source, right?

Prasanna Malaiyandi:

And now they have access to your vault.

Prasanna Malaiyandi:

Uh, some of the examples are if you're backing up in the cloud, right, put

Prasanna Malaiyandi:

it in a separate account that no one has access to other than whatever

Prasanna Malaiyandi:

is transferring the data, right?

Prasanna Malaiyandi:

Make it in a different region.

Prasanna Malaiyandi:

So it's not easily accessible.

Prasanna Malaiyandi:

And there are many, many, many other things you could do as well.

Prasanna Malaiyandi:

But those are just some of the example.

W. Curtis Preston:

Yeah, I like if we're talking cloud, I like the

W. Curtis Preston:

idea of putting it in a different region and a different account.

W. Curtis Preston:

Right.

W. Curtis Preston:

Um, because we're not just talking about hacking.

W. Curtis Preston:

We're also, we also need to think about like, Disaster recovery

W. Curtis Preston:

and things like that, right?

W. Curtis Preston:

So again, O V H Cloud, we don't want to have that happen to us.

W. Curtis Preston:

So we want to make sure that a copy of the backup data is, is well far away

W. Curtis Preston:

from the thing that it's protecting.

W. Curtis Preston:

And yeah, separate account in a much more limited, an account with much

W. Curtis Preston:

more limited access, and you can.

W. Curtis Preston:

Um, you can consider using immutable storage, but we're

W. Curtis Preston:

gonna talk about that later.

W. Curtis Preston:

But essentially, this is the, we, we separated as much as possible.

W. Curtis Preston:

This is why, um, you know, one of your previous employers data domain, right?

W. Curtis Preston:

And, and, and, All of those things, they would always talk about

W. Curtis Preston:

replicating to another data domain.

W. Curtis Preston:

And I always, I always remember thinking, well, if I'm replicating to

W. Curtis Preston:

another data domain, it's essentially like in order to do that, I gotta

W. Curtis Preston:

have it in the same like land.

W. Curtis Preston:

Right?

W. Curtis Preston:

Or, or at least it's gonna look like it's in the land.

W. Curtis Preston:

Right.

W. Curtis Preston:

Um,

Prasanna Malaiyandi:

that's why they actually introduced a

Prasanna Malaiyandi:

feature, specifically talking about data domain, right?

Prasanna Malaiyandi:

Their cyber recovery solution.

W. Curtis Preston:

Mm-hmm.

Prasanna Malaiyandi:

that allowed for writing to a lockdown data domain that

Prasanna Malaiyandi:

didn't have access from anywhere else.

Prasanna Malaiyandi:

And going back to the point you were talking about, Curtis, okay, is it

Prasanna Malaiyandi:

on the network and I can connect to it then, doesn't that make it open?

Prasanna Malaiyandi:

And so what it would actually do is shut down network ports right

Prasanna Malaiyandi:

outside of your backup windows, such that it's not available, or

Prasanna Malaiyandi:

at least your attack surface is.

W. Curtis Preston:

Could you delete the backups?

W. Curtis Preston:

Was it.

W. Curtis Preston:

Could you delete the backups once you send it to it via the backup interface?

Prasanna Malaiyandi:

Typically no.

W. Curtis Preston:

Okay.

W. Curtis Preston:

Because that, cuz that would be, that would be an important part.

W. Curtis Preston:

Right.

Prasanna Malaiyandi:

It would also replicate like your

Prasanna Malaiyandi:

backup environment, right?

Prasanna Malaiyandi:

So you'd have your own backup server in that vault, if you will.

Prasanna Malaiyandi:

So there's no connectivity to anything outside, because if there

Prasanna Malaiyandi:

is, then you're just open to risk.

W. Curtis Preston:

Right, right.

W. Curtis Preston:

Um, yeah, so just like, so I've got a list here on virtual air gap here.

W. Curtis Preston:

So I talk about disabling or impairing R D P.

W. Curtis Preston:

Why does that matter?

Prasanna Malaiyandi:

Ah, so many ransomware issues have happened.

Prasanna Malaiyandi:

Rdp, which

W. Curtis Preston:

what is R D P by the way?

W. Curtis Preston:

Thank you,

Prasanna Malaiyandi:

right?

Prasanna Malaiyandi:

Which is how most people connect remotely to a Windows client.

Prasanna Malaiyandi:

Um, most people forget to turn it off or they leave it on because it's just easier.

Prasanna Malaiyandi:

They don't need to physically connect to it.

Prasanna Malaiyandi:

Uh, The only downside is it's a big attack surface, and there are

Prasanna Malaiyandi:

a lot of exploits using R D P.

Prasanna Malaiyandi:

And so when you enable R D P, you're letting yourself or leaving yourself

Prasanna Malaiyandi:

open to hackers and other exploits coming in, which could then move

Prasanna Malaiyandi:

laterally across your network and take out other pieces of your environment.

W. Curtis Preston:

Yeah, there is a way to automate sort of disabling and

W. Curtis Preston:

enabling R D P, um, like on a large scale.

W. Curtis Preston:

Um, I also talk about putting it in a different operating system, right?

W. Curtis Preston:

Not using the same operating system for your backups in your

W. Curtis Preston:

primary, uh, if that's possible.

W. Curtis Preston:

I know that there's a lot of big window shops and they use windows.

W. Curtis Preston:

Uh, backup servers.

W. Curtis Preston:

I don't think that's a good idea.

W. Curtis Preston:

Um, but you know, Um, and by the way, I, I forgot to throw out our disclaimer.

W. Curtis Preston:

I'll throw out, um, Prasanna.

W. Curtis Preston:

Prasanna.

W. Curtis Preston:

And I work for different companies.

W. Curtis Preston:

I work for Druva.

W. Curtis Preston:

He works for Zoom.

W. Curtis Preston:

And this is not a podcast of either company.

W. Curtis Preston:

This is an independent podcast and the opinions that you hear are ours.

W. Curtis Preston:

And, uh, be sure to rate us@ratethispodcast.com slash restore.

W. Curtis Preston:

And, um, if you'd like to join the conversation, you want to talk.

W. Curtis Preston:

What's going on in your world?

W. Curtis Preston:

Uh, you know, whether you're, uh, you know, an end user.

W. Curtis Preston:

If you're an end user, we really want to have you, you know, real

W. Curtis Preston:

people that actually do backups out there in the trenches.

W. Curtis Preston:

Weed.

W. Curtis Preston:

You're, you're it, man.

W. Curtis Preston:

No I do, uh, you know, as soon as I think about, um, Back when I used to

W. Curtis Preston:

be the person in the trenches, like when I was a consultant, and I, and

W. Curtis Preston:

I, I flashback to this one time where we were completely redoing the backups

W. Curtis Preston:

of, I'll just say a large television station, like, like a national

W. Curtis Preston:

television station, and I remember.

W. Curtis Preston:

I remember that time when the, when the, the, the director of it basically said,

W. Curtis Preston:

nobody's going home until this is done.

W. Curtis Preston:

He literally, I mean, there's a long story following up to this, but he basically,

W. Curtis Preston:

um, held us hostage in the data center and said, no one's going home until this,

W. Curtis Preston:

this thing that you said is gonna happen.

W. Curtis Preston:

You said it's gonna happen.

W. Curtis Preston:

I'm like, yeah, but it's not gonna finish until.

W. Curtis Preston:

10 30 at night, he's like, yeah, so we're not going home until it's done.

W. Curtis Preston:

And I'm like, okay, well this is kidnapping, but whatever.

W. Curtis Preston:

Um, you know, uh, so I think about stuff like that, right?

W. Curtis Preston:

I think about those moments of terror.

W. Curtis Preston:

But yeah, so I, you know, I wanna live vicariously through those who have

W. Curtis Preston:

been through those moments of terror.

W. Curtis Preston:

Um,

Prasanna Malaiyandi:

interesting to learn like what the more recent challenges

Prasanna Malaiyandi:

are in environments, because otherwise

W. Curtis Preston:

That too.

W. Curtis Preston:

Yeah,

Prasanna Malaiyandi:

otherwise, how do you build great products, you know, or build

W. Curtis Preston:

Exactly, exactly.

W. Curtis Preston:

So what, what I was thinking about saying, which is what reminded me to do the

W. Curtis Preston:

disclaimer, is just that, um, you know, one way to have a different operating

W. Curtis Preston:

system is to use a SaaS provider.

W. Curtis Preston:

Druva is not the only one, uh, but there are SaaS providers

W. Curtis Preston:

that are cloud native or use.

W. Curtis Preston:

Non windows, uh, tools that, um, you know, you do that.

W. Curtis Preston:

Also, you, you gain the second thing that I list here, which

W. Curtis Preston:

is about separating the storage.

W. Curtis Preston:

Please don't, um, you know, we talked, we talked about that already,

W. Curtis Preston:

the, these replication, right?

W. Curtis Preston:

Uh, but the, um,

Prasanna Malaiyandi:

but it's also like, don't use nfs.

W. Curtis Preston:

Yeah, exactly.

W. Curtis Preston:

Yes.

W. Curtis Preston:

Don't use NFS as a way to back up to the server use.

W. Curtis Preston:

There are ways to back up to, for example, a data domain box in other boxes

W. Curtis Preston:

without exposing the backups via nfs.

W. Curtis Preston:

Uh, I also talk about using object storage.

W. Curtis Preston:

I'm a huge fan of using object storage.

W. Curtis Preston:

Now, some of you go, well, object storage is too slow, to which I

W. Curtis Preston:

say, then you're using it wrong.

W. Curtis Preston:

Right.

W. Curtis Preston:

Um, Druva uses object storage.

W. Curtis Preston:

All our backups are on object storage, and we are not too slow.

W. Curtis Preston:

In fact, we get into competitions all the time with these big

W. Curtis Preston:

on-prem companies and we win.

W. Curtis Preston:

And here we are, we're a copy in the cloud and they're an on-prem

W. Curtis Preston:

appliance, and we win that restore test.

W. Curtis Preston:

Object storage is not too stor slow, but if you, if you treat it like file system

W. Curtis Preston:

storage, I think then it is, right?

W. Curtis Preston:

If you put.

Prasanna Malaiyandi:

Yeah.

W. Curtis Preston:

all your backups in one object, right?

W. Curtis Preston:

Tonight's, tonight's backup of server X is an image, and that

W. Curtis Preston:

image becomes an object on, uh, s3.

W. Curtis Preston:

Yeah.

W. Curtis Preston:

Then it's gonna be slow, right?

W. Curtis Preston:

Um, we talk about using aut storage.

W. Curtis Preston:

We're gonna come back to that in a minute.

W. Curtis Preston:

Um, that, that's an option that we talked

Prasanna Malaiyandi:

And then,

W. Curtis Preston:

S3

Prasanna Malaiyandi:

yeah, and then your.

Prasanna Malaiyandi:

And then your favorite topic is using tape.

Prasanna Malaiyandi:

I know, Curtis, you always like to throw out the disclaimer.

Prasanna Malaiyandi:

Actually, I should thank you because before this podcast,

Prasanna Malaiyandi:

I knew very little about tape.

Prasanna Malaiyandi:

Now I know just a bit more about tape, given the number of experts

Prasanna Malaiyandi:

who've come on in talking to you.

Prasanna Malaiyandi:

But yeah, it's

W. Curtis Preston:

There there's no, there's no beating the tape when it comes.

W. Curtis Preston:

That's an actual air gap.

Prasanna Malaiyandi:

Yep.

W. Curtis Preston:

right?

W. Curtis Preston:

If, if you, if you want a real air gap, I'm, I know there's challenges with

W. Curtis Preston:

it, you know, uh, but there is, you know, there is, there is an air gap

Prasanna Malaiyandi:

Yep.

W. Curtis Preston:

Uh, and I already talked about using a backup service.

W. Curtis Preston:

So let's talk about immutability.

Prasanna Malaiyandi:

Yep.

W. Curtis Preston:

Um, this,

Prasanna Malaiyandi:

Is it a made up word?

Prasanna Malaiyandi:

It sounds a little like a made up word,

W. Curtis Preston:

you know, this is another one of those things

W. Curtis Preston:

where we have to go back in time.

W. Curtis Preston:

Historically immutability wa it, it, it was like a legal term that you needed

W. Curtis Preston:

to be able to prove that the thing you were presenting in court had not changed.

W. Curtis Preston:

It was immutable.

W. Curtis Preston:

That's all, you know, immutable just means cannot be changed.

W. Curtis Preston:

So when you're, when you.

W. Curtis Preston:

uh, you pres, you, you know, you have to preserve chain of custody and you

W. Curtis Preston:

have to, you have to be able to say, or it's really helpful if you're able

W. Curtis Preston:

to say, this email that I'm showing you is exactly the same email as the email

W. Curtis Preston:

that we got five years ago from Steve.

Prasanna Malaiyandi:

Yep, and nothing changed and no one had

Prasanna Malaiyandi:

the ability to change it yet.

W. Curtis Preston:

That's where we used to talk about immutability.

W. Curtis Preston:

Now we talk a lot about it in terms of cyber attacks.

W. Curtis Preston:

And I would add to that, we also talk about it in terms of things like bit rot.

W. Curtis Preston:

We've talked about bit rot on this podcast where this is

W. Curtis Preston:

silent data corruption, right?

W. Curtis Preston:

That bits just flip underneath magnetic storage devices.

W. Curtis Preston:

It's just the way they work.

W. Curtis Preston:

and the, you know, and if, if you've got, if you've got a bunch of petabytes

W. Curtis Preston:

of data, you got flipped bits in there.

W. Curtis Preston:

It's just a matter of, it's just

Prasanna Malaiyandi:

when you're gonna run across it, right?

W. Curtis Preston:

yeah.

W. Curtis Preston:

Yeah.

W. Curtis Preston:

Um, so, so when we talk about immutability, we say, well, we, if

W. Curtis Preston:

somebody says they have immutable.

W. Curtis Preston:

Backups or immutable storage.

W. Curtis Preston:

What you're saying is stuff that gets put here can't be changed.

W. Curtis Preston:

And here's the thing.

W. Curtis Preston:

on how you look at it, it's complete nonsense.

Prasanna Malaiyandi:

Because everything's just software.

Prasanna Malaiyandi:

Anything can be cheap.

W. Curtis Preston:

is changeable.

W. Curtis Preston:

Give me a torch, I'll change that.

W. Curtis Preston:

S o b, right?

W. Curtis Preston:

Give me phy.

W. Curtis Preston:

So physical.

W. Curtis Preston:

All bets are off.

W. Curtis Preston:

Everyone knows that, um, if it's something on a server that you can, that, that,

W. Curtis Preston:

that is in your data center, that also, in my opinion, is not really immutable.

W. Curtis Preston:

Um, because if someone has root, uh, on that server, they can wipe the server.

W. Curtis Preston:

Uh, it's even built, like, you know, when we talk about immutable storage on

W. Curtis Preston:

Lennox, it's not really that immutable.

W. Curtis Preston:

It's it's immutable ish.

W. Curtis Preston:

So, so why do I say, like, why do I talk about it if it's bs?

W. Curtis Preston:

Well, here's the point.

W. Curtis Preston:

Nothing was ever a hundred percent immutable,

Prasanna Malaiyandi:

Even that document right, that you were talking about.

W. Curtis Preston:

Yeah, exactly right.

W. Curtis Preston:

As long as like if, if, if you put something on a a, a, a, right once

W. Curtis Preston:

cd, uh, optical platter, right?

W. Curtis Preston:

A worm tape, it's immutable to a point.

W. Curtis Preston:

If you have physical access, it's no longer immutable.

W. Curtis Preston:

You could, you could say from a legal standpoint, you could later, if you have

W. Curtis Preston:

the same disc and you've preserved chain of custody, and you could say, we can

W. Curtis Preston:

show that this disc was not destroyed, and we can show via these check sums and

W. Curtis Preston:

whatnot, that the stuff that we're giving you is the stuff that we have before.

W. Curtis Preston:

Saying that you've got a storage system that can't ever, ever, ever be changed.

W. Curtis Preston:

Um, I would argue it's just nonsense.

W. Curtis Preston:

Right.

W. Curtis Preston:

So it's, it's a, it's a, it's a, it's a degree.

W. Curtis Preston:

It's a what, what did we call it?

W. Curtis Preston:

Like a, like a spectrum.

W. Curtis Preston:

Thank you.

W. Curtis Preston:

I knew there was a word in there.

Prasanna Malaiyandi:

And even

W. Curtis Preston:

prism is what was coming to mind.

Prasanna Malaiyandi:

and even for those storage systems that have immutability,

Prasanna Malaiyandi:

right, that are used for like financial records and everything else, a lot

Prasanna Malaiyandi:

of that is certified by the storage vendors saying they have all the checks

Prasanna Malaiyandi:

in place and all the rest, right?

Prasanna Malaiyandi:

In the end it's all just software, right?

Prasanna Malaiyandi:

So they've built in the, into the software, those checks to make sure

Prasanna Malaiyandi:

that data cannot be deleted, right.

Prasanna Malaiyandi:

And is present.

W. Curtis Preston:

And the, and you know, after we're doing all this, like

W. Curtis Preston:

we're gonna, I'm slamming it and then I'm gonna talk about how important it's

W. Curtis Preston:

. But the other is, um, Uh, I'd say the, the one that I like the best right now

W. Curtis Preston:

is like the, the object lock and s3.

W. Curtis Preston:

And what I like about that is because it's, it is at least

W. Curtis Preston:

physically separated from.

W. Curtis Preston:

You.

W. Curtis Preston:

Now, that doesn't mean that somebody can't go crazy in the AWS data

W. Curtis Preston:

center and, and blow it up, but even that, it's built into that.

W. Curtis Preston:

So it, it would have to be like, it would have to be a really concerted

W. Curtis Preston:

attack to be able to attack multiple locations of S3 to be able to do damage.

Prasanna Malaiyandi:

it's, it's not only multiple

W. Curtis Preston:

is as low as, what's that?

Prasanna Malaiyandi:

It's not just multiple locations of s3, but also

Prasanna Malaiyandi:

they have to tack your primary site as well, so everything needs to be

Prasanna Malaiyandi:

coordinated across multiple vendors and corporations, which will probably have

Prasanna Malaiyandi:

their own security practices, et cetera.

W. Curtis Preston:

this is, this is that, this is that, uh, spectrum, right?

W. Curtis Preston:

I, I'd put, I'd put that and write, you know, worm tape, write once,

W. Curtis Preston:

read, write once, read many tape.

W. Curtis Preston:

Um, and then, and, and optical plat.

W. Curtis Preston:

I put that on one end of the spectrum.

W. Curtis Preston:

on the other put at the end of the spectrum is I would have unencrypted

W. Curtis Preston:

backup stored on a NFS mounted storage system behind a Windows backup server.

Prasanna Malaiyandi:

Yep.

W. Curtis Preston:

that's your spectrum.

W. Curtis Preston:

So we wanna be closer to this end than that end.

W. Curtis Preston:

Right?

W. Curtis Preston:

Um, nothing is ever

Prasanna Malaiyandi:

downsides.

Prasanna Malaiyandi:

Yeah.

Prasanna Malaiyandi:

And there are some downsides to immutability too, right?

Prasanna Malaiyandi:

Uh, you can't, like once the data gets written, you can't delete it

Prasanna Malaiyandi:

before that time period typically.

Prasanna Malaiyandi:

So there are some challenges as well.

W. Curtis Preston:

So, um, so what we need to do, Is we need to, I, I think

W. Curtis Preston:

there's multiple things there is that, um, we need to protect against access.

W. Curtis Preston:

We need to protect against, you know, change deletion, corruption.

W. Curtis Preston:

Um, uh, what was I, what was I talking about?

W. Curtis Preston:

Um, bit rot, right?

W. Curtis Preston:

So there are vendors out there.

W. Curtis Preston:

they're like, well, we have a, append only file system, and and,

W. Curtis Preston:

and we have data lock on the backups.

W. Curtis Preston:

And so they say, we're immutable.

W. Curtis Preston:

And, and I'm like, okay.

W. Curtis Preston:

And, and they say because they're saying that like, you can't encrypt the backups

W. Curtis Preston:

with a, with a ransomware attack.

Prasanna Malaiyandi:

Yep.

W. Curtis Preston:

and I, and I go, that's good.

W. Curtis Preston:

That's farther, that's, that's closer to the other one than the other ones.

W. Curtis Preston:

But it's like, well, what about other things?

W. Curtis Preston:

Right.

W. Curtis Preston:

What about other types of attacks that attack the operating system itself?

W. Curtis Preston:

Right.

W. Curtis Preston:

You know, if if you gain privileged access to that server,

W. Curtis Preston:

right?

Prasanna Malaiyandi:

And I wanna clarify though, what you're talking

Prasanna Malaiyandi:

about is someone who's written their own file system or is leveraging a file

Prasanna Malaiyandi:

system on top of a standard server.

W. Curtis Preston:

Yes.

Prasanna Malaiyandi:

Not a storage appliance, because I think that's a

Prasanna Malaiyandi:

little bit more, that's like further along in the spectrum, I would say

Prasanna Malaiyandi:

like a purpose-built storage appliance

W. Curtis Preston:

yeah.

W. Curtis Preston:

So, okay.

W. Curtis Preston:

So, so, so we got a couple different types of backup servers here, right?

W. Curtis Preston:

So we got the purpose-built backup appliance of various

Prasanna Malaiyandi:

flavors.

Prasanna Malaiyandi:

Yep.

W. Curtis Preston:

flavors.

W. Curtis Preston:

Sure.

W. Curtis Preston:

Um, and I would put them.

W. Curtis Preston:

More immutable, right?

W. Curtis Preston:

So immutable is supposed to be a binary condition, but I

W. Curtis Preston:

don't see it as that, right?

W. Curtis Preston:

So, um, I put it more immutable than I bought a box.

W. Curtis Preston:

I installed Windows or Linux, and I install my favorite backups or software.

W. Curtis Preston:

Why?

W. Curtis Preston:

Why, why do you feel that way?

W. Curtis Preston:

I agree with you.

W. Curtis Preston:

Why do you feel that way?

Prasanna Malaiyandi:

I feel that way because when it comes to that appliance,

Prasanna Malaiyandi:

typically there's more things locked down.

Prasanna Malaiyandi:

There's less configuration options, right?

Prasanna Malaiyandi:

It's kind of purpose built for that reason.

Prasanna Malaiyandi:

Versus when you're rolling your own, you have to worry

Prasanna Malaiyandi:

about all those dependencies.

Prasanna Malaiyandi:

What flavor of the OS are you taking?

Prasanna Malaiyandi:

Are you running through all the security patches?

Prasanna Malaiyandi:

Is it, are there any nuances in the way it's being deployed

Prasanna Malaiyandi:

today that leads to security vulnerabilities and things like that?

W. Curtis Preston:

Yeah, exactly.

W. Curtis Preston:

And, and when you update those appliances, you update an

W. Curtis Preston:

image which updates everything.

W. Curtis Preston:

Versus if I have a a box, a Windows box, I gotta update Windows or Linux.

W. Curtis Preston:

I've gotta make

Prasanna Malaiyandi:

the backup

W. Curtis Preston:

following the new security, then you gotta

W. Curtis Preston:

update the backup software.

W. Curtis Preston:

So, yeah.

W. Curtis Preston:

And these are, and I would say that's, so I would say that the

W. Curtis Preston:

appliances are more immutable than.

W. Curtis Preston:

Than the build drill in box.

W. Curtis Preston:

Um, and the, uh, but I, but I'm just gonna say that if you, if we're

W. Curtis Preston:

talking physical access, I still, I'm gonna put a service like S3 or a

W. Curtis Preston:

service like Druva that's up in the cloud, farther down the immutability

W. Curtis Preston:

spectrum than a survey, than a server that is sitting in your data center.

Prasanna Malaiyandi:

Yep.

Prasanna Malaiyandi:

And I think it's important because everyone is now doing virtualized, right?

Prasanna Malaiyandi:

It doesn't matter if it's a physical server or a virtual server.

Prasanna Malaiyandi:

Anything that's running on your infrastructure or in your

W. Curtis Preston:

Right,

Prasanna Malaiyandi:

is less secure in that immutability spectrum.

W. Curtis Preston:

Yeah.

W. Curtis Preston:

Um, the, uh, yeah, I put in the book a lot of things are mislabeled, immutable,

W. Curtis Preston:

uh, I just, again, it's a spectrum, but.

W. Curtis Preston:

If, if all you're doing is writing backups to a Linux file

W. Curtis Preston:

system with the immutability flag turned on, that is not immutable.

W. Curtis Preston:

I mean, it's, it is more immutable than not But if I, but if someone

W. Curtis Preston:

with root can and, and you gotta have someone with root, right?

W. Curtis Preston:

So if a person with root can go in and unset all those immutability flag,

Prasanna Malaiyandi:

It don't matter.

W. Curtis Preston:

That's, I don't know.

W. Curtis Preston:

That's just not, it's be, it's better than nothing.

W. Curtis Preston:

Right?

W. Curtis Preston:

So I, I don't want to be the, the, you know, perfect is the enemy of good or

W. Curtis Preston:

whatever, but I, I don't need perfect.

W. Curtis Preston:

And so I don't wanna say that that's crap, but I, I think it's, it's not as immutable

W. Curtis Preston:

as those appliances that we talked about.

W. Curtis Preston:

And I still think that a service where nobody gets access to your

W. Curtis Preston:

servers is more immutable than that.

Prasanna Malaiyandi:

Yeah.

W. Curtis Preston:

and I still want everybody to back up everything to Tape

Prasanna Malaiyandi:

Oh, Curtis, you and

W. Curtis Preston:

although I work at, I work at a tapeless backup company.

W. Curtis Preston:

Um, so

Prasanna Malaiyandi:

But, but here's

W. Curtis Preston:

Go

Prasanna Malaiyandi:

one thing I wanna ask, and I know we've

Prasanna Malaiyandi:

covered this on prior podcasts.

Prasanna Malaiyandi:

What are things that an admin can do to understand where on that spectrum,

Prasanna Malaiyandi:

when someone says, when a vendor says immutability, what are questions

Prasanna Malaiyandi:

that they should be asking to be able

W. Curtis Preston:

a great question.

W. Curtis Preston:

Who has root or admin, right?

W. Curtis Preston:

Who has that and what controls are placed over that?

W. Curtis Preston:

So, um, if it's an appliance, so like I, I know of like one company.

W. Curtis Preston:

They do have root, they have a password, they have the root password

W. Curtis Preston:

on your system, or they have the password to an account that has

W. Curtis Preston:

a u i D of zero for those of you.

W. Curtis Preston:

Um, which is essentially the same thing, but in order to log into that account,

W. Curtis Preston:

they can't log into that account remotely.

W. Curtis Preston:

You have to.

W. Curtis Preston:

You have to do an SSH tunnel and all that stuff, right?

W. Curtis Preston:

You have to open up a door for them to log in.

W. Curtis Preston:

Um, you know, what kind of protections are put against that.

W. Curtis Preston:

Uh, if the answer is it's just a local box and you're the one that has route,

W. Curtis Preston:

or there's unprotected route access from someone, um, I just, I worry well.

W. Curtis Preston:

you know, so if, if, if you or anyone in your ministry in your

W. Curtis Preston:

place has root, that's not very immutable, it's better than nothing,

W. Curtis Preston:

but it's not very immutable, right?

W. Curtis Preston:

If you know root, like if, if, if you normally never log into

W. Curtis Preston:

the system as root, right?

W. Curtis Preston:

No one in your, you only at you, you go to a ui, you log it as you, right?

W. Curtis Preston:

Um, and.

W. Curtis Preston:

There isn't direct route access by anyone.

W. Curtis Preston:

And the only way you can get route access is you can, um, you do the SSH

W. Curtis Preston:

tunnel thing that's more immutable.

W. Curtis Preston:

I like that better.

W. Curtis Preston:

Um, you still, but again, if you don't know this already, you still have

W. Curtis Preston:

to do physical security against that

Prasanna Malaiyandi:

Yep.

Prasanna Malaiyandi:

Exactly.

W. Curtis Preston:

do every other box.

W. Curtis Preston:

Right.

W. Curtis Preston:

Um, and then, You know, you ask a lot of que just ask a lot of questions.

W. Curtis Preston:

What happens if so, for example, I'm currently wondering because I haven't

W. Curtis Preston:

found a good answer online, I'm currently wondering what happens with Amazon S3

W. Curtis Preston:

object lock if I delete my account.

Prasanna Malaiyandi:

I don't think they allow you to.

Prasanna Malaiyandi:

It depends on what type of object lock you're using, because there are

W. Curtis Preston:

know what, I know what you're saying, right.

W. Curtis Preston:

Um, but if I'm u is it the compliance mode?

W. Curtis Preston:

It's the more,

Prasanna Malaiyandi:

Yeah.

W. Curtis Preston:

yeah.

W. Curtis Preston:

So assuming I'm using compliance

Prasanna Malaiyandi:

Oh wait.

Prasanna Malaiyandi:

Compliance is R L C R, lg.

Prasanna Malaiyandi:

I think compliance is less in governance is more, or is it the

W. Curtis Preston:

whichever it

Prasanna Malaiyandi:

Yeah.

Prasanna Malaiyandi:

Whichever way

W. Curtis Preston:

I think it's the other way around.

W. Curtis Preston:

But anyway, so I'm using the more strict one.

W. Curtis Preston:

and my credit card stops working.

W. Curtis Preston:

Right.

W. Curtis Preston:

It's not like they're gonna keep my storage forever.

W. Curtis Preston:

You, when you say they won't let you delete it.

W. Curtis Preston:

Well, I don't have to delete it.

W. Curtis Preston:

I'm just gonna have my credit card not work anymore.

W. Curtis Preston:

Right.

W. Curtis Preston:

What

Prasanna Malaiyandi:

like you said, it's not protected in all scenarios, right?

W. Curtis Preston:

Right.

W. Curtis Preston:

I don't know what the answer is.

W. Curtis Preston:

I am curious.

W. Curtis Preston:

I actually bought, I, I keep forgetting to do this, but I want to

W. Curtis Preston:

go create an Amazon account separate.

Prasanna Malaiyandi:

Mm-hmm.

W. Curtis Preston:

Put some object lock stuff in there.

W. Curtis Preston:

Not a whole lot, just like 90 days or something, but, but like a couple of

W. Curtis Preston:

gigabytes or something, and then go delete my account and see what happens.

W. Curtis Preston:

See if they let me delete the account.

W. Curtis Preston:

Um, I did read something somewhere that, that there is

W. Curtis Preston:

this like 30, 60 day timeframe.

Prasanna Malaiyandi:

Hmm.

W. Curtis Preston:

So again, that's still better because I'm assuming

W. Curtis Preston:

that if you're using Amazon S3 and.

Prasanna Malaiyandi:

by.

W. Curtis Preston:

or any of the other folks you're gonna, you're gonna know

W. Curtis Preston:

that somebody deleted your account

Prasanna Malaiyandi:

Yeah.

W. Curtis Preston:

Right.

W. Curtis Preston:

Um, and I know what I would want you to ask is what happens if, what happens

W. Curtis Preston:

if someone gets through someone?

W. Curtis Preston:

So I was just seeing a thing that said that it's like more than half of hacks

W. Curtis Preston:

are through compromised credentials.

W. Curtis Preston:

So what happens if someone, you know, you're a backup service?

W. Curtis Preston:

What happens if someone gets ahold of my admin credentials

W. Curtis Preston:

and is able to circumvent mfa?

Prasanna Malaiyandi:

Yep.

Prasanna Malaiyandi:

How much damage can they

W. Curtis Preston:

do you have against?

W. Curtis Preston:

Yeah, how much damage they can do.

W. Curtis Preston:

Can you undo any of that damage, et cetera, et cetera, et cetera.

W. Curtis Preston:

I know that if we go back in time, let's say two years, I don't think

W. Curtis Preston:

Druva had good answers to that question.

W. Curtis Preston:

Right.

W. Curtis Preston:

I remember being in those meetings and saying, Hey, we need to address this.

W. Curtis Preston:

We have addressed that.

W. Curtis Preston:

I think we now have really good answers to those questions.

W. Curtis Preston:

Um, but does your, does you know, if you're not using Druva, does your vendor

W. Curtis Preston:

have good answer to those questions?

W. Curtis Preston:

I don't know.

W. Curtis Preston:

Right.

W. Curtis Preston:

So, yeah, so come up with worst case scenarios and that one.

W. Curtis Preston:

Of compromised admin credentials, whether you're talking a service or

W. Curtis Preston:

so, like for example, I know that like Druva has data lock, you know,

W. Curtis Preston:

rubric and cohesive have data locks.

W. Curtis Preston:

I know that with them, if you, if you compromise, uh, credentials and

W. Curtis Preston:

you log into them and try to delete, if you, if you enable datalock,

W. Curtis Preston:

you will not be able to do so.

W. Curtis Preston:

Right.

W. Curtis Preston:

So, , what is your vendor's answer to that question?

W. Curtis Preston:

Um, and um, and then also ask 'em about bit rot.

W. Curtis Preston:

What are they doing about bit rot?

W. Curtis Preston:

If they're using object storage, I feel better cuz object storage

W. Curtis Preston:

will automatically detect bit rot happening underneath.

W. Curtis Preston:

Uh, cuz it will change the hash and somebody will be like, Hey, well not

W. Curtis Preston:

somebody, a program will figure it out.

W. Curtis Preston:

Um, I think Biro is rare.

W. Curtis Preston:

Just for the record.

W. Curtis Preston:

I think it's rare.

W. Curtis Preston:

Um,

Prasanna Malaiyandi:

It's rare.

W. Curtis Preston:

bit error.

W. Curtis Preston:

Right.

W. Curtis Preston:

But,

Prasanna Malaiyandi:

But it's still bad

W. Curtis Preston:

not, not a problem.

Prasanna Malaiyandi:

Yeah.

Prasanna Malaiyandi:

And the problem is when it's silent, that's the worst.

W. Curtis Preston:

Exactly.

W. Curtis Preston:

That's the worst.

W. Curtis Preston:

All right.

W. Curtis Preston:

Well enough about protecting backup data.

W. Curtis Preston:

You got any final thoughts?

Prasanna Malaiyandi:

Well, I think we covered it all.

Prasanna Malaiyandi:

I really like virtual air gaps, but that's just me

W. Curtis Preston:

I like the old school air gaps, but it's really

W. Curtis Preston:

hard to do those these days.

W. Curtis Preston:

All right.

W. Curtis Preston:

Well thanks for listening to us.

W. Curtis Preston:

Be sure to subscribe so that you can restore it all.