{"id":9343,"date":"2020-03-09T04:54:55","date_gmt":"2020-03-08T18:54:55","guid":{"rendered":"https:\/\/nsrd.info\/blog\/?p=9343"},"modified":"2020-03-09T04:55:01","modified_gmt":"2020-03-08T18:55:01","slug":"meme-monday-3","status":"publish","type":"post","link":"https:\/\/nsrd.info\/blog\/2020\/03\/09\/meme-monday-3\/","title":{"rendered":"Meme Monday"},"content":{"rendered":"\n<p>OK, it&#8217;s been a little while since I did a meme Monday, and there are s a few ones I want to cover off today. So let&#8217;s get cracking!<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"531\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/backup-capacity-meme.jpg\" alt=\"\" class=\"wp-image-9345\" srcset=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/backup-capacity-meme.jpg 800w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/backup-capacity-meme-300x199.jpg 300w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/backup-capacity-meme-768x510.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><figcaption>You can&#8217;t really predict how much backup capacity you&#8217;ll need in 5 years<\/figcaption><\/figure>\n\n\n\n<p>Listen, I get that people in procurement, in particular, want to be able to draw a line in the sand and say, &#8220;We spent X on this, we won&#8217;t need to spend any more for 5 years.&#8221;<\/p>\n\n\n\n<p>But that&#8217;s not how data protection works. That&#8217;s not because we&#8217;re always looking to spend more money \u2013\u00a0if anything, most people I know who work in data protection are always actively looking for ways to <em>save<\/em> money.<\/p>\n\n\n\n<p>In movies, the <strong><a rel=\"noreferrer noopener\" aria-label=\"butterfly effect (opens in a new tab)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Butterfly_effect\" target=\"_blank\">butterfly effect<\/a><\/strong> is arguably one of the most broadly used memes from maths, but if you want to see the butterfly effect in motion, track a backup system over 5 years. Or to jump across to quantum physics: you can predict <em>where<\/em> your business needs to be in 5 years time, but you can&#8217;t predict exactly what form its IT infrastructure will be in to meet that goal. And that&#8217;s not a jab at the cloud \u2013\u00a0I&#8217;m not talking about being able to say &#8220;we&#8217;ll be all-in on the Cloud in 5 years time&#8221;. Pfft, anyone can say that. I&#8217;m talking about being able to say exactly what the type and size of every one of your workloads are going to be in 5 years time.<\/p>\n\n\n\n<p>Never. Going. To. Happen.<\/p>\n\n\n\n<p>So, remember that there are better questions to ask than &#8220;give me sufficient capacity for 5 years&#8221;, such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>How do you scale?<\/li><li>Can you give me enough capacity for 2 years but headroom to scale for 5 <em>{at X% YoY growth}<\/em> without having to do a forklift upgrade?<\/li><li>Can you provide an estimate of cloud resource usage requirements for <em>{this sample workload with this growth}<\/em> over a 3 year period?<\/li><li>Can you provide a mechanism for me to move licensing and software between DCs and Cloud, and between appliances within DCs?<\/li><li>Can you help me scale on demand?<\/li><\/ul>\n\n\n\n<p>Here&#8217;s my honest advice to people:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>You can predict, with a reasonable degree of accuracy, what and how much you&#8217;ll be backing up within a year<\/li><li>You can predict, with at most 50% accuracy, what and how much you&#8217;ll be backing up within 3 years<\/li><li>Beyond 3 years, your predictions are pure guesses.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"448\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/backup-mount.jpg\" alt=\"\" class=\"wp-image-9346\" srcset=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/backup-mount.jpg 700w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/backup-mount-300x192.jpg 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><figcaption>Don&#8217;t give Ransomware a head start<\/figcaption><\/figure>\n\n\n\n<p>Look, online, disk-based backups are awesome at making the entire data protection process smoother. That&#8217;s why it&#8217;s increasingly rare to see tape used, particularly as the initial backup target, within a data protection system. <\/p>\n\n\n\n<p>Backing up to disk-based storage is great. But, if you pick a backup product that&#8217;s going to write backups to the D:\\ drive or E:\\ drive or \/backups mount-point, you&#8217;re <em>giving ransomware a head-start in your business<\/em>. I&#8217;m not joking when I say that the <strong><a rel=\"noreferrer noopener\" aria-label=\"Boost protocol is one of your best fundamental defences against ransomware (opens in a new tab)\" href=\"https:\/\/nsrd.info\/blog\/2019\/10\/21\/6-reasons-why-data-domain-provides-unparalleled-ransomware-protection\/\" target=\"_blank\">Boost protocol is <em>one of your best<\/em> fundamental defences against ransomware<\/a><\/strong>. Because Data Domain Boost backups don&#8217;t expose the protection storage to the accessing operating system (server or client), ransomware <strong>can&#8217;t<\/strong> just hop onto a system and encrypt all your backups.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"639\" height=\"800\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/release-notes.jpg\" alt=\"\" class=\"wp-image-9347\" srcset=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/release-notes.jpg 639w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/release-notes-240x300.jpg 240w\" sizes=\"auto, (max-width: 639px) 100vw, 639px\" \/><figcaption>Please read the release notes &#8230; and the compatibility guides!<\/figcaption><\/figure>\n\n\n\n<p>Here&#8217;s something I&#8217;ve seen saying for more than 20 years now:<\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Your backup systems touch more in your IT environment than anything else other than the network itself.<\/em><\/p>\n\n\n\n<p>It always surprises me when someone says, &#8220;I upgraded X and now my backups don&#8217;t work&#8221;. My first thoughts are:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Did you read the release notes?<\/li><li>Did you check the compatibility guide?<\/li><\/ul>\n\n\n\n<p>In a broad infrastructure, <em>backups touch everything<\/em>. That means <em>every change request<\/em>, every <em>upgrade<\/em>, should have mandatory checks in your business for &#8220;can we still back this up?&#8221; and &#8220;will this change break our backups?&#8221;<\/p>\n\n\n\n<p>The first question is the singular system protection: &#8220;we&#8217;re going to upgrade from Windows 2019 to Windows 2027&#8221;, &#8220;what does the compatibility guide say about support for Windows 2027?&#8221; Or &#8220;we&#8217;re switching from non-federated to federated databases, can we still back them up?&#8221;<\/p>\n\n\n\n<p>The second question is the more complex \u2013\u00a0wanting to make sure that as a result of doing a change, your backup system is still going to work, or still work <em>the same<\/em>. <\/p>\n\n\n\n<p>If there&#8217;s anything as a data protection expert you&#8217;re going to have bookmarked for easy access on your computer, it should be the release notes and compatibility guides.<\/p>\n\n\n\n<p>And if you&#8217;re a change coordinator who hasn&#8217;t added checks for backup\/data protection in <em>every change request<\/em>, you need to re-think how you handle changes in your organisation.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"587\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/backup-server-security.jpg\" alt=\"\" class=\"wp-image-9348\" srcset=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/backup-server-security.jpg 800w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/backup-server-security-300x220.jpg 300w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/03\/backup-server-security-768x564.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><figcaption>The entire security of your IT infrastructure is underpinned by your backup server<\/figcaption><\/figure>\n\n\n\n<p>I&#8217;ve said this before, and I&#8217;ll say it again: your backup server is singularly the most promising attack vector for any malicious actor operating within your organisation. Why struggle to jump through reams of security on mission-critical production systems when there&#8217;s a backup server on the network with credentials of &#8220;administrator&#8221; and &#8220;password123&#8221; for access?<\/p>\n\n\n\n<p>You want to use your backup server to save you when the chips are down. Given a chance, attackers will use it to inject vulnerabilities in your most mission-critical systems, to exfiltrate your data, and compromise your ability to recover from data destruction. It needs to be secured with the same level of paranoia as your most mission-critical systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>OK, it&#8217;s been a little while since I did a meme Monday, and there are s a few ones I&hellip;<\/p>\n","protected":false},"author":1,"featured_media":7047,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[5,21],"tags":[195,1330,196,1360,1343,809,1254],"class_list":["post-9343","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-backup-theory","category-security","tag-capacity","tag-capacity-management","tag-capacity-plan","tag-compatibility","tag-ransomware","tag-release-notes","tag-security"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2018\/08\/bigStock-Facts-and-Myths.jpg","jetpack_shortlink":"https:\/\/wp.me\/pKpIN-2qH","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/9343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/comments?post=9343"}],"version-history":[{"count":2,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/9343\/revisions"}],"predecessor-version":[{"id":9350,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/9343\/revisions\/9350"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/media\/7047"}],"wp:attachment":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/media?parent=9343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/categories?post=9343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/tags?post=9343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}