{"id":6025,"date":"2016-11-16T17:14:57","date_gmt":"2016-11-16T07:14:57","guid":{"rendered":"http:\/\/nsrd.info\/blog\/?p=6025"},"modified":"2018-12-11T10:07:34","modified_gmt":"2018-12-11T00:07:34","slug":"falling-in-love-with-the-irs","status":"publish","type":"post","link":"https:\/\/nsrd.info\/blog\/2016\/11\/16\/falling-in-love-with-the-irs\/","title":{"rendered":"Falling in love with the IRS"},"content":{"rendered":"<p>Years ago when NetWorker Management Console was first introduced, Australians (and no doubt people in other countries with a similarly named tax law) found themselves either amused or annoyed having to type commands such as:<\/p>\n<pre># <strong>\/etc\/init.d\/gst start<\/strong><\/pre>\n<p>Who would want to&nbsp;<em>start<\/em> a goods and services tax, after all? In the case of NetWorker, GST didn&#8217;t stand for a tax on purchases, but the master control software for&nbsp;NMC.<\/p>\n<p>It&#8217;s amusing then to be back in the&nbsp;realm of using an overloaded&nbsp;three letter acronym which for many (in this case) US citizens refers to the tax-man \u2013 IRS. In this case though, IRS stands for <span style=\"text-decoration: underline;\"><strong>I<\/strong><\/span>solated <span style=\"text-decoration: underline;\"><strong>R<\/strong><\/span>ecovery <span style=\"text-decoration: underline;\"><strong>S<\/strong><\/span>ite.<\/p>\n<p>Our view of &#8216;disaster recovery&#8217; situations by and large hasn&#8217;t changed much over&nbsp;the two decades I&#8217;ve been working in IT. While we&#8217;ve moved from active\/passive datacentres to active\/active datacentres as being the norm, the types of&nbsp;situations that might lead to&nbsp;invoking disaster recovery and transitioning services from one location to another have remained&nbsp;largely the same, such as:<\/p>\n<ul>\n<li>Site loss<\/li>\n<li>Site access loss<\/li>\n<li>Catastrophic hardware failure<\/li>\n<li>Disaster recovery testing<\/li>\n<\/ul>\n<p>In fact, they&#8217;re pretty much the key four reasons why we need to invoke DR \u2013 either granularly or for an entire datacentre.<\/p>\n<p>The concept of an IRS is not to&nbsp;provide assistance in any of the above four situations.&nbsp;(In theory it could be utilised&nbsp;partly for any of the above, in&nbsp;practice that&#8217;s what your&nbsp;normal disaster recovery datacentre is about, regardless of whether it&#8217;s in an active\/active or active\/passive configuration with your primary.)<\/p>\n<p><a href=\"https:\/\/nsrd.info\/blog\/2016\/11\/16\/falling-in-love-with-the-irs\/vendetta-mask-symbol-for-the-online-hacktivist-group-anonymous\/\" rel=\"attachment wp-att-6028\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6028\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2016\/11\/bigStock-Hacktivist.jpg\" alt=\"Hactivism\" width=\"900\" height=\"633\" srcset=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2016\/11\/bigStock-Hacktivist.jpg 900w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2016\/11\/bigStock-Hacktivist-300x211.jpg 300w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2016\/11\/bigStock-Hacktivist-768x540.jpg 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><\/p>\n<p>Deploying an IRS solution within your&nbsp;environment is about protecting you from modern threat vectors. It represents&nbsp;a business maturity that accepts any, many or all of the following scenarios:<\/p>\n<ul>\n<li>Users not understanding what they&#8217;re doing represent a threat vector that can no longer be casually protected against by using anti-virus software and firewalls<\/li>\n<li>Administrators can make mistakes \u2013 not just little &#8216;boo-boos&#8217;, but catastrophic mistakes<\/li>\n<li>On-platform protection should only form part of a&nbsp;holistic&nbsp;data protection&nbsp;environment<\/li>\n<li>It is no longer a case of keeping malicious&nbsp;individuals&nbsp;<em>out<\/em> of your IT infrastructure, but also recognising&nbsp;they may already be inside<\/li>\n<li>Protests are no longer&nbsp;confined to letter&nbsp;writing campaigns, boycotts and&nbsp;demonstrations<\/li>\n<\/ul>\n<p>Before I explain&nbsp;some of those situations, it would be helpful to provide a high level overview of what one kind of IRS layout might look like:<\/p>\n<p><a href=\"https:\/\/nsrd.info\/blog\/2016\/11\/16\/falling-in-love-with-the-irs\/irs-basic\/\" rel=\"attachment wp-att-6030\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6030\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2016\/11\/IRS-Basic.png\" alt=\"Basic High Level IRS\" width=\"1689\" height=\"897\" srcset=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2016\/11\/IRS-Basic.png 1689w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2016\/11\/IRS-Basic-300x159.png 300w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2016\/11\/IRS-Basic-768x408.png 768w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2016\/11\/IRS-Basic-1024x544.png 1024w\" sizes=\"auto, (max-width: 1689px) 100vw, 1689px\" \/><\/a><\/p>\n<p>The key things to understand in an IRS configuration such as the above are:<\/p>\n<ul>\n<li>Your tertiary data copy (the IRS copy) is not, in&nbsp;the conventional sense of the word, connected to your network<\/li>\n<li>You either use physical network separation (with periodic plugging of cables in) or automated control of network separation, with control accessible&nbsp;only within the IRS bunker<\/li>\n<li>The&nbsp;Data Domain in&nbsp;your IRS bunker&nbsp;will optimally be configured with governance and retention lock<\/li>\n<li>Your <strong>primary backup<\/strong> environment <strong>will not be aware<\/strong> of the tertiary Data Domain<\/li>\n<\/ul>\n<p>IRS is not for&nbsp;traditional Business As Usual (BAU) or disaster recovery. You will still run those standard recovery operations out of your primary and\/or disaster recovery sites in the same way as you would normally.<\/p>\n<p>So what are some of the examples where you might resort to an IRS&nbsp;copy?<\/p>\n<ul>\n<li>Tired\/or disgruntled admin triggers deletion of primary&nbsp;and DR storage, including snapshots<\/li>\n<li>Ransomware infects a primary file&nbsp;server, encrypting data&nbsp;<em>and<\/em>&nbsp;flooding the snapshot pool to the point the system can&#8217;t be recovered from<\/li>\n<li>Hactivists penetrate&nbsp;the network and prior to deleting&nbsp;production system data,&nbsp;<em>delete backup data<\/em>.<\/li>\n<\/ul>\n<p>These aren&#8217;t &#8216;example&#8217; use cases, they&#8217;ve happened. In the first two if&nbsp;you&#8217;re using off-platform protection, you&#8217;re probably safe \u2013 but if you&#8217;re not, you&#8217;ve lost data. In the third example, there have been several examples&nbsp;over the last few years where this penetration has successfully been carried out by&nbsp;hactivists.<\/p>\n<p>Maybe you feel your&nbsp;environment is not of interest&nbsp;from hactivists. If you work in the finance industry, you&#8217;re wrong. If you work in government, you&#8217;re wrong. OK, maybe you don&#8217;t work in either of those areas.<\/p>\n<p>With&nbsp;the increasing availability of tools and broader surface area for&nbsp;malicious individuals or groups to strike with, hactivism isn&#8217;t limited to just the &#8216;conventional&#8217; high&nbsp;profile industry verticals. Maybe you&#8217;re a pharmaceutical company that purchased the patent on a cheap drug then enraged communities by increasing prices by 400 times.&nbsp;Maybe you&#8217;re a theatre chain showing a movie a certain group has taken significant offence at. Maybe you&#8217;re a retail company selling&nbsp;products containing palm oil, or toilet paper not sourced from environmentally sustainable forests. Maybe you&#8217;re an energy company. Maybe you&#8217;re a company doing a really good job but have a few ex-employees with an axe to grind. If you&#8217;ve ever read an online forum&nbsp;thread,&nbsp;you&#8217;ll probably recognise that some people are trollish enough to do it&nbsp;<em>just for the fun of it<\/em>.<\/p>\n<p>Gone are the days where you worried about hactivism if you happened to be running a nuclear enrichment programme.<\/p>\n<p>IRS is about protecting you from&nbsp;<em>those<\/em> sorts of scenarios. By keeping at least a core of your critical data on a tertiary, locked down Data Domain that&#8217;s not accessible via the network, you&#8217;re not only&nbsp;leveraging&nbsp;the industry leading Data Invulnerability Architecture (DIA) to ensure what&#8217;s written is what&#8217;s read, you&#8217;re also&nbsp;ensuring that tertiary copy is&nbsp;<em>off platform<\/em> to the rest of your&nbsp;environment.<\/p>\n<p>And the great&nbsp;thing is, products like NetWorker are basically designed from&nbsp;the ground up to&nbsp;be used in an IRS configuration. NetWorker&#8217;s long and rich history of command automation means you can build into that Control &amp; Verification service area whatever you need to take read-write snapshots of replicated data,&nbsp;DR an isolated NetWorker server and perform&nbsp;automated test recoveries.<\/p>\n<p>One last point \u2013 something I&#8217;ve discussed with a few customers recently \u2013 you might be having an&nbsp;<em>ahah!<\/em> moment and point to a box of tapes&nbsp;somewhere and say &#8220;There&#8217;s my IRS solution!&#8221; I can answer that with one simple question: If you went to your business and said you could scrap a disaster recovery site and&nbsp;instead rely on tape to perform all&nbsp;the required recoveries, what would they say? Tape&nbsp;<em>isn&#8217;t<\/em> an IRS option except perhaps for&nbsp;the most&nbsp;lackadaisical&nbsp;data protection environments. (I&#8217;d suggest it&#8217;d even be an Icarus IRS solution \u2013 trusting that wax won&#8217;t melt when you fly your business too close to the sun.)<\/p>\n<p>There&#8217;s some coverage of IRS in my upcoming book, <a href=\"https:\/\/www.amazon.com\/Data-Protection-Ensuring-Availability\/dp\/1482244152\" target=\"_blank\">Data Protection: Ensuring Data Availability<\/a>, and of course, you can read up&nbsp;on Dell EMC&#8217;s IRS offerings too. A good starting point <a href=\"http:\/\/www.emc.com\/collateral\/solution-overview\/isolated-recovery-solution-overview.pdf\" target=\"_blank\">is this solution overview<\/a>. If you&#8217;re in IT \u2013 Infrastructure or Security \u2013 have a chat to your risk officers and ask them what they think about those sorts of challenges outlined above. Chances are they&#8217;re already worried about them,&nbsp;and you could very well be bringing them the solution that&#8217;ll let everyone sleep easily at night.&nbsp;You might one day find yourself saying &#8220;I love the IRS&#8221;.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Years ago when NetWorker Management Console was first introduced, Australians (and no doubt people in other countries with a similarly&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[3,5,1181],"tags":[1329,422,1328,1326,1327,566,836],"class_list":["post-6025","post","type-post","status-publish","format-standard","hentry","category-architecture","category-backup-theory","category-data-domain-2","tag-cryptoware","tag-hacking","tag-hactivism","tag-irs","tag-isolated-recovery-site","tag-malware","tag-risk"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pKpIN-1zb","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/6025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/comments?post=6025"}],"version-history":[{"count":8,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/6025\/revisions"}],"predecessor-version":[{"id":7404,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/6025\/revisions\/7404"}],"wp:attachment":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/media?parent=6025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/categories?post=6025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/tags?post=6025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}