No momento você está vendo Retention Time-Lock for Ransomware Recovery

Ransomware attacks are on the rise, becoming disruptive and potentially very costly to businesses. No matter how meticulously an organization follows best practices to protect valuable data, the attackers seem to stay one step ahead. They maliciously encrypt primary data, take control of the backup application and delete the backup data.

Protection from ransomware is a primary concern for organizations today. ExaGrid offers a unique approach to ensure that attackers cannot compromise the backup data, allowing organizations to be confident that they can restore the affected primary storage and avoid paying ugly ransoms.

ExaGrid’s Unique Value Propositions

DOWNLOAD NOW

The challenge is how to protect the backup data from being deleted while at the same time allowing for backup retention to be purged when retention points are hit. If you retention lock all of the data, you cannot delete the retention points and the storage costs become untenable. If you allow retention points to be deleted to save storage, you leave the system open for hackers to delete all data. ExaGrid’s unique approach is called Retention Time-Lock. It prevents the hackers from deleting the backups and allows for retention points to be purged. The result is a strong data protection and recovery solution at a very low additional cost of ExaGrid storage.

ExaGrid is Tiered Backup Storage with a front-end disk-cache Landing Zone and separate Retention Tier containing all retention data. Backups are written directly to the “network-facing” ExaGrid disk-cache Landing Zone for fast backup performance. The most recent backups are kept in their full undeduplicated form for fast restores.

Once the data is committed to the Landing Zone, it is tiered into a “non-network-facing” long-term retention repository where the data is adaptively deduplicated and stored as deduplicated data objects to reduce the storage costs of long-term retention data. As data is tiered to the Retention Tier, it is deduplicated and stored in a series of objects and metadata. As with other object storage systems, the ExaGrid system objects and metadata are never changed or modified which makes them immutable, allowing only for the creation of new objects or deletion of old objects when retention is reached. The backups in the retention tier can be any number of days, weeks, months, or years that is required. There are no limits to the number versions or length of time backups can be kept. Many organizations keep 12 weeklies, 36 monthlies, and 7 yearlies, or even sometimes, retention” forever”.

ExaGrid’s Retention Time-Lock for Ransomware Recovery is in addition to the long term-retention of backup data and utilizes 3 distinct functions:

  • Immutable data deduplication objects
  • Non-network-facing tier (tiered air gap)
  • Delayed delete requests

ExaGrid’s approach to ransomware allows organizations to set up a time lock period that delays the processing of any delete requests in the Retention Tier as that tier is not network facing and not accessible to hackers. The combination of a non-network facing tier, a delayed deletion for a period of time and immutable objects that cannot be changed or modified are the elements of the ExaGrid Retention Time-Lock solution. For example, if the time lock period for the Retention Tier is set to 14 days, then when delete requests are sent to the ExaGrid from a backup application that has been compromised, or from a hacked CIFS, or other communications protocols, the entire long-term retention data (weeks/months/years) is all intact.  This provides organizations days and week to identify that they have an issue and restore.

Data is time-locked for up to 30 days against any deletion. This is separate and distinct from the long-term retention storage that could be kept for years. The data in the Landing Zone will be deleted or encrypted, however, the Retention Tier data is not deleted upon an external request for the configured period of time – it is time-locked for up to 30 days against any deletion. When a ransomware attack is identified, simply put the ExaGrid system into a new recover mode and then restore any and all backup data to primary storage.

The solution provides a retention lock, but only for an adjustable period of time as it delays the deletes. ExaGrid chose not to implement Retention Time-Lock forever because the cost of the storage would be unmanageable. With the ExaGrid approach, all that is needed is up to an additional 10% more repository storage to hold the delay for the deletes. ExaGrid allows the delay of deletes from 1 day to 30 days.

Recovery Process – 5 Easy Steps

  • Invoke recover mode.
    • Retention Time-Lock clock is stopped with all deletes put on hold indefinitely until data recovery operation is complete.
  • The backup administrator can carry out the recovery using the ExaGrid GUI, but since this is not a common operation, we suggest contacting ExaGrid customer support.
  • Determine the time of the event so you can plan restore.
  • Determine which backup on the ExaGrid completed deduplication before the event.
  • Perform restore from that backup using the backup application.

ExaGrid advantages are:

  • Long term-retention is not impacted and retention time-lock is in addition to the retention policy
  • Immutable deduplication objects cannot be modified, changed or deleted (outside of the retention policy)
  • Manage a single system instead of multiple systems for both backup storage and ransomware recovery
  • Unique second Retention Tier that is only visible to ExaGrid software, not to the network – (tiered air gap)
  • Data is not deleted as delete requests are delayed and therefore ready to recover after a ransomware attack
  • Daily, weekly, monthly, yearly, and other purges still occur, but are simply delayed, to keep storage costs in line with the retention periods
  • Requires up to an additional 2% to 10% of repository storage
  • Storage does not grow forever and stays within the backup retention period set to keep storage costs down
  • All retention data is preserved and is not deleted

Example Scenarios

Data is deleted in the ExaGrid disk-cache Landing Zone via the backup application or by hacking the communication protocol. Since the Retention Tier data has a delayed delete time lock, the objects are still intact and available to restore. When the ransomware event is detected, simply put the ExaGrid in a new recover mode and restore. You have as much time to detect the ransomware attack as the time lock was set for on the ExaGrid. If you had the time lock set for 14 days, then you have 14 days to detect the ransomware attack (during which time all backup retention is protected) to put the ExaGrid system in the new recover mode for restoring data.

Data is encrypted in the ExaGrid Disk-cache Landing Zone or is encrypted on the primary storage and backed up to ExaGrid such that ExaGrid has encrypted data in the Landing Zone and deduplicates it into the Retention Tier. The data in the Landing Zone is encrypted. However, all previously deduplicated data objects never change (immutable), so they are never impacted by the newly arrived encrypted data. ExaGrid has all previous backups before the ransomware attack that can be restored immediately. In addition to being able to recover from the most recent deduplicated backup, the system still retains all the backup data according to the retention requirements.

Features:

  • Immutable deduplication objects that cannot be changed or modified or deleted (outside of the retention policy)
  • Any deletion requests are delayed by the number of days in the protection policy.
  • Encrypted data written to ExaGrid does not delete or change previous backups in the repository.
  • Landing Zone data that is encrypted does not delete or change previous backups in the repository.
  • Set delayed deletion in 1 day increments from 0 days to 30 days. (this is in addition to the backup long term retention policy)
  • Protects against loss of any and all retained backups including monthlies and yearlies.
  • Two-Factor Authentication (2FA) protects changes to Time-Lock setting.
    • Only Administrator role is allowed to change Time-Lock setting.
    • 2FA with administrator Login/Password and system generated QR code for second factor authentication.
  • Separate password for primary site versus second site ExaGrid.
  • Separate Security Officer or Vice President of Infrastructure/Operations password to change or turn off Retention Time-Lock.