{"id":9336,"date":"2020-03-10T17:54:10","date_gmt":"2020-03-10T07:54:10","guid":{"rendered":"https:\/\/nsrd.info\/blog\/?p=9336"},"modified":"2020-03-10T17:54:20","modified_gmt":"2020-03-10T07:54:20","slug":"guess-who-else-likes-your-backups-in-the-cloud","status":"publish","type":"post","link":"https:\/\/nsrd.info\/blog\/2020\/03\/10\/guess-who-else-likes-your-backups-in-the-cloud\/","title":{"rendered":"Guess who else likes your backups in the Cloud?"},"content":{"rendered":"\n<p>Having just finished the excellent <em><strong><a rel=\"noreferrer noopener\" aria-label=\"Dickinson (opens in a new tab)\" href=\"https:\/\/www.youtube.com\/watch?v=_GtV9V0dBgw\" target=\"_blank\">Dickinson<\/a><\/strong><\/em> series on Apple TV+, I keep getting one of Emily Dickinson&#8217;s most famous refrains rolling around in my head:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Because I could not stop for Death \u2013<br>He kindly stopped for me \u2013<br>The Carriage held but just Ourselves \u2013<br>And Immortality.<\/p><cite><a href=\"https:\/\/poets.org\/poem\/because-i-could-not-stop-death-479\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Because I could not stop for Death (opens in a new tab)\"><strong>Because I could not stop for Death<\/strong><\/a>, Emily Dickinson.<\/cite><\/blockquote>\n\n\n\n<p>Now, I&#8217;m not suggesting that Emily Dickinson was thinking about the public cloud when she wrote arguably her most famous poem<span id='easy-footnote-1-9336' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/nsrd.info\/blog\/2020\/03\/10\/guess-who-else-likes-your-backups-in-the-cloud\/#easy-footnote-bottom-1-9336' title='If she were, that would indeed make her an even more remarkable person.'><sup>1<\/sup><\/a><\/span>, but like &#8220;don&#8217;t run with scissors&#8221;, I think her poem also at least partly reflects on running too fast to an objective \u2013 so much so that you don&#8217;t notice the risks. <span id='easy-footnote-2-9336' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/nsrd.info\/blog\/2020\/03\/10\/guess-who-else-likes-your-backups-in-the-cloud\/#easy-footnote-bottom-2-9336' title='And let&amp;#8217;s face it unless the author writes a definitive &amp;#8220;This is what I meant&amp;#8230;&amp;#8221; statement next to a piece of work, all interpretations are inherently subjective.'><sup>2<\/sup><\/a><\/span><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"500\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/cloud-security-is-your-responsibility.png\" alt=\"\" class=\"wp-image-9339\" srcset=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/cloud-security-is-your-responsibility.png 800w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/cloud-security-is-your-responsibility-300x188.png 300w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/cloud-security-is-your-responsibility-768x480.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><figcaption>Cloud Security Is Your Responsibility<\/figcaption><\/figure>\n\n\n\n<p>If you&#8217;re operating in the public cloud, you should be very much aware of the shared responsibility model:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"779\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/Shared-Responsibility-Model-1024x779.png\" alt=\"\" class=\"wp-image-9340\" srcset=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/Shared-Responsibility-Model-1024x779.png 1024w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/Shared-Responsibility-Model-300x228.png 300w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/Shared-Responsibility-Model-768x584.png 768w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/Shared-Responsibility-Model-1536x1168.png 1536w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/Shared-Responsibility-Model.png 2030w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>AWS Shared Responsibility Model<\/figcaption><\/figure>\n\n\n\n<p>I&#8217;ve said for a while that your backup environment has to be secured to the same level of paranoia as your most mission-critical systems: it represents a terrifying potential attack vector for your entire organisation if unsecured, and also represents an easy target for data breach situations. I.e., why would attackers scour your network for dozens or more systems if they can get access to everything by compromising the backup server?<\/p>\n\n\n\n<p>And we&#8217;re now at the point where backup servers running in the public cloud are becoming very attractive to attackers.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Backups are one the most, if not the most, important defense against ransomware, but if not configured properly, attackers will use it against you.<\/p><p>Recently the DoppelPaymer Ransomware operators published on their leak site the Admin user name and password for a non-paying victim&#8217;s Veeam backup software.<\/p><cite><strong><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ransomware-attackers-use-your-cloud-backups-against-you\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Ransomware Attackers Use Your Cloud Backups Against You, (opens in a new tab)\">Ransomware Attackers Use Your Cloud Backups Against You,<\/a><\/strong> Lawrence Abrams, March 3, 2020. (Bleeping Computer.)<\/cite><\/blockquote>\n\n\n\n<p>Lawrence Abrams from the above article quoted someone behind the Maze ransomware software as follows:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>&#8220;Yes, we download them. It is very useful. No need to search for sensitive information, it is definitely contained in backups. If backups in the cloud it is even easier, you just login to cloud and download it from your server, full invisibility to &#8220;data breach detection software&#8221;. Clouds is about security, right?&#8221;<\/p><cite>Ibid.<\/cite><\/blockquote>\n\n\n\n<p>Backups are <strong><em>very useful<\/em><\/strong>. Not just to your business, but to people who might attack your business. People who might be looking to hold your business to ransom or exfiltrate your data. Backups in the cloud are &#8220;even easier&#8221; to get to.<\/p>\n\n\n\n<p><strong>If you don&#8217;t secure them properly<\/strong>. Regardless of whether you have backup services in public cloud, on-premises, or both, you have to secure them of course. But in the public cloud, you might have a broader spread of groups involved in the setup and run. Last year, <strong><a rel=\"noreferrer noopener\" aria-label=\"I wrote about how backup servers, poorly secured, represent a significant security threat (opens in a new tab)\" href=\"https:\/\/nsrd.info\/blog\/2019\/04\/10\/backup-servers-and-malicious-attacks\/\" target=\"_blank\">I wrote about how backup servers, poorly secured, represent a significant security threat<\/a><\/strong>. I also wrote about how <strong><a rel=\"noreferrer noopener\" aria-label=\"Data Domain is one of the most important pieces of infrastructure that you can deploy to help secure your backup environment (opens in a new tab)\" href=\"https:\/\/nsrd.info\/blog\/2019\/10\/21\/6-reasons-why-data-domain-provides-unparalleled-ransomware-protection\/\" target=\"_blank\">Data Domain is one of the most important pieces of infrastructure that you can deploy to help secure your backup environment<\/a><\/strong>, and much of that holds true even in a virtualized or cloud-based environment \u2013 so long as the underpinning infrastructure has been suitably secured.<\/p>\n\n\n\n<p>When I was starting in IT, infrastructure was the castle, and security was a moat surrounding it. You had firewalls and DMZs, but everything <em>inside<\/em> the network was trusted. Over time we&#8217;ve matured, but backup servers were often perversely left out of the security model. So we moved away from relying exclusively on the moat to having every door in the castle locked. However, your backup server is <em>the skeleton key that opens any door<\/em>. If that&#8217;s not protected &#8230; well, ransomware developers and hackers will love you.<\/p>\n\n\n\n<p>There&#8217;s a lot more I have to say about data protection security in the public cloud in <strong><a rel=\"noreferrer noopener\" aria-label=\"Protecting Information Assets and IT Infrastructure in the Cloud (opens in a new tab)\" href=\"https:\/\/www.crcpress.com\/Protecting-Information-Assets-and-IT-Infrastructure-in-the-Cloud\/Das-Guise\/p\/book\/9781138393325\" target=\"_blank\">Protecting Information Assets and IT Infrastructure in the Cloud<\/a><\/strong>, but I think it&#8217;s worth ending with a simple statement:<\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Backups are the keys to your kingdom.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Having just finished the excellent Dickinson series on Apple TV+, I keep getting one of Emily Dickinson&#8217;s most famous refrains&hellip;<\/p>\n","protected":false},"author":1,"featured_media":9337,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[3,5,1229,21],"tags":[1465,1254],"class_list":["post-9336","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-architecture","category-backup-theory","category-cloud","category-security","tag-cloud-services","tag-security"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/bigStock-Lock-Data-Flow.jpg","jetpack_shortlink":"https:\/\/wp.me\/pKpIN-2qA","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/9336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/comments?post=9336"}],"version-history":[{"count":5,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/9336\/revisions"}],"predecessor-version":[{"id":9395,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/9336\/revisions\/9395"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/media\/9337"}],"wp:attachment":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/media?parent=9336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/categories?post=9336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/tags?post=9336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}