4

Using Immutable Storage to Protect Data Against Ransomware

 2 years ago
source link: https://hackernoon.com/using-immutable-storage-to-protect-data-against-ransomware
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client
Using Immutable Storage to Protect Data Against Ransomware
Notifications
šŸ’° 144k+ in Contest Prizes Year to Date! Join now!
Last Tuesday at 1:33 PM
šŸ†• TOP 12 Product Features Deployed in Q1 2022
04/07/2022
šŸž Got a story on #debugging? Write today and win up to $500 in prizes!
Last Sunday at 4:09 PM
Help Elon Musk Find Web3 and Make Money While You Do That
Today at 9:25 AM
March 2022 Results For the Web3 Writing Contest Have Been Announced!
Last Monday at 12:16 AM
Growing Up in a Digital Time: What is in the Mind of a Gen Z?
Last Sunday at 12:26 AM
see more
Using Immutable Storage to Protect Data Against Ransomwareā€‚by@valeryyy

Using Immutable Storage to Protect Data Against Ransomware

Nearly 37% of global organizations fell victim to ransomware in 2021, including one of the largest cyber insurance firms CNA Financial and computer giant Acer. In 10 years, ransomware costs are set to grow by 400 times, exceeding $250 billion. Immutable data storage ā€œlocks'' backup and any other data, ensuring that stored data and metadata can never be modified and deleted. Immutability goes hand in hand with the WORM (write once, read many) technology that allows storing data in an unchangeable format.

Audio Presented by Udemy-icon

Speed:
Read by:
Your browser does not support theaudio element.
voice-avatar

The frequency of data breaches due to ransomware attacks has doubled. New ransomware schemes and the rise of crimeware-as-a-service put more businesses at the risk of losing their money, data and reputation. But implementing immutable storage in a data protection strategy can become the key to your fight against ransomware.Ā 

heart.png
light.png
money.png
thumbs-down.png

This blog post explains the advantages of immutability against ransomware and helps you choose what immutable storage type works best in your case. Weā€™ll also guide you on how to use immutable storage most effectively.Ā 

heart.png
light.png
money.png
thumbs-down.png

Growing Ransomware Threats

Ransomware continues to be a major problem for global organizations. Nearly 37% of them fell victim to ransomware in 2021, including one of the largest cyber insurance firms CNA Financial and computer giant Acer. The latter reported the largest ransom demand to date ā€” a stunning $50 million for getting the companyā€™s data back.Ā 

heart.png
light.png
money.png
thumbs-down.png

Unfortunately, ransomware trends show that there is much more to come. As attacks are getting more personalized and craftier, double extortion will soon become commonplace, driving ransoms to new heights. In 2021, ransomware-related costs outpaced the 2020 costs in just six months: $590 million for the first half of 2021 compared to $416 million for all of 2020. Does this seem expensive? In 10 years, ransomware costs are set to grow by 400 times, exceeding $250 billion.Ā 

heart.png
light.png
money.png
thumbs-down.png

Sophisticated ransomware attacks are difficult to detect early because most of them bypass ransomware detection solutions. This makes businesses believe that they canā€™t protect their data and have no other choice but to pay the ransom. And here is where immutable backups come into play.

heart.png
light.png
money.png
thumbs-down.png

Immutable Backup Storage: Your Last Line of Defense

Ransomware attack success depends on whether a business can restore data access without paying the ransom. No wonder that attackers are trying to limit recovery options and often target the companyā€™s backups and snapshots first. On the other hand, keeping backup data in protected immutable storage minimizes the risk of a ransomware infection and increases the chances of recovery success. Why? Because immutable backup data is virtually impervious to new cyberattacks and ransomware. Letā€™s explore this in more detail.Ā 

heart.png
light.png
money.png
thumbs-down.png

What is immutable storage?

Immutable data storage ā€œlocks'' backup and any other data, ensuring that stored data and metadata can never be modified and deleted, either by other users, root users, criminals or ransomware. Immutability goes hand in hand with the WORM (write once, read many) technology that allows storing data in an unchangeable format. Users can access and read files stored on WORM devices but not change or delete them.Ā 

heart.png
light.png
money.png
thumbs-down.png

Immutable WORM storage helps ensure data security and is legally required in the finance and healthcare industries by SEC rules and HIPAA. The US government agencies use WORM technology to comply with federal laws and minimize the risk of file accidental deletion from the National Archive. Finally, educational institutions and law firms often store their records in WORM-compliant format for long-term archiving.Ā 

heart.png
light.png
money.png
thumbs-down.png

Immutable storage types

The concept of immutable WORM storage isnā€™t new. Even in the times of tape, you could set tape media to be written only once. Optical CD-R and DVD-R discs are also one of the oldest WORM devices that allow users to add new data to the media until thereā€™s free storage space left. Once the data is written to the disk, the only way to remove records is to destroy the disk itself.

heart.png
light.png
money.png
thumbs-down.png

Today, there is a wider variety of storage media and software that enable you to store data in immutable form. You can use tape, optical technologies, purpose-built backup appliances, SSDs, disks and even the cloud.Ā 

heart.png
light.png
money.png
thumbs-down.png

Letā€™s take a closer look at the advantages and disadvantages of two main WORM storage types.

heart.png
light.png
money.png
thumbs-down.png

Hardware-based storage

Hard drives, tapes and solid-state storage drives can serve as immutable backup storage. They are usually inexpensive and are capable of holding large amounts of data. They can also be stored offline, disconnected from the production site. This makes physical media more secure against cyberattacks and ransomware.

heart.png
light.png
money.png
thumbs-down.png

On the downside, hardware-based storage can degrade and become prone to physical failures over time. They also require secure physical storage space with regulated temperature for long-term archiving. In case of natural disaster or improper storage, devices can be destroyed, causing irreversible data loss. Whatā€™s more, such devices can be stolen by criminals and used for blackmail.

heart.png
light.png
money.png
thumbs-down.png

Software-based storageĀ 

Software-based storage solutions aim to combine the benefits of hardware-based solutions with the flexibility of cloud and SaaS services. They usually provide more storage capacity and mitigate some of the risks associated with physical devices.Ā 

heart.png
light.png
money.png
thumbs-down.png

Such immutable storage uses WORM technology to lock down the data for a specific period of time configured by a user. Once immutability is enabled, no one can edit, delete or encrypt data until the immutability window expires.Ā 

heart.png
light.png
money.png
thumbs-down.png

The popularity of cloud immutable storage (Amazon S3, Microsoft Azure Blob, Google Cloud) is now on the rise. Cloud repositories are easily accessible and require no physical storage space. At the same time, they are isolated from the network and have no links to production sites and storage systems, which makes cloud storage air-gapped by default. A ransomware infection canā€™t spread to cloud repositories until you manually transfer infected data there, which is impossible during the immutability time window.Ā 

heart.png
light.png
money.png
thumbs-down.png

On the downside, cloud storage costs grow over time, and you can end up with eye-watering bills for long-term archiving.

heart.png
light.png
money.png
thumbs-down.png

Immutable WORM storage was originally hardware-based, but as more organizations measure their data in petabytes, physical media alone is no longer enough for complete data protection. Many companies combine both physical media and cloud immutable storage to improve their resilience against ransomware attacks.Ā Ā 

heart.png
light.png
money.png
thumbs-down.png

Implementing Immutable Backup Strategy

Using several types of immutable backup storage allows you to mitigate the disadvantages of each storage type and eliminate the single point of failure. Whatā€™s more, you can completely disconnect cloud storage and physical media from your network, making them air-gapped and, thus, more secure against ransomware attacks. Even if an attack does happen, you can avoid paying the ransom, knowing that you have unaffected backups.

heart.png
light.png
money.png
thumbs-down.png

But thereā€™s a catch.Ā 

heart.png
light.png
money.png
thumbs-down.png

Air-gapped and immutable systems alone don't protect your data against ransomware. Ransomware can remain unnoticed for a long time and infect even immutable backups if you transfer corrupted files to storage. Immutable storage doesnā€™t detect or repel ransomware attacks and canā€™t replace ransomware monitoring tools, either.

heart.png
light.png
money.png
thumbs-down.png

Immutable backup data can be your last line of defense against ransomware, but only if you use this storage together with other data protection practices, such as:

heart.png
light.png
money.png
thumbs-down.png

Regular backups

heart.png
light.png
money.png
thumbs-down.png

Back up critical data on a regular basis and implement a flexible recovery point rotation scheme to ensure no data loss.

heart.png
light.png
money.png
thumbs-down.png

Backup data tiering and the 3-2-1-1 backup rule. Have at least three copies of your backup data and store them on at least two storage media, one of which is offsite and the other is offline.

heart.png
light.png
money.png
thumbs-down.png

Recoverability verification

heart.png
light.png
money.png
thumbs-down.png

Ensure that stored backups are application consistent and regularly verify the recoverability of VM backups.

heart.png
light.png
money.png
thumbs-down.png

Backup data encryption

heart.png
light.png
money.png
thumbs-down.png

Encrypt backup data during the transfer over the web and enable storage encryption to prevent unauthorized access.

heart.png
light.png
money.png
thumbs-down.png

Access control

heart.png
light.png
money.png
thumbs-down.png

Restrict access to your backup data and configure role-based permissions using the principle of the least privilege.

heart.png
light.png
money.png
thumbs-down.png

Give Your Thoughts on All The Latest in Tech

HackerNoon has built a custom Slack app called Slogging to publish conversations about how technology is infiltrating everything! Join us on Slogging to give us (and the world) your two cents on all the emerging technologies of today.

4
heart.pngheart.pngheart.pngheart.png
light.pnglight.pnglight.pnglight.png
boat.pngboat.pngboat.pngboat.png
money.pngmoney.pngmoney.pngmoney.png

Comments

Signup or Login to Join the Discussion

Customized Expe|

About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK