Veeam Ransomware Enterprise 6 Capabilities Rapid Recovery
Veeam Ransomware Enterprise 6 Capabilities Rapid Recovery
Veeam Ransomware Enterprise 6 Capabilities Rapid Recovery
6 Capabilities Enterprises
Need for Rapid Recovery
Table of Contents
Businesses can’t prevent a cyber attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1. Trusted Immutability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2. Backup Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3. 3-2-1-1-0 Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
6. DR Orchestration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 1
Ransomware: 6 Capabilities Enterprises Need for Rapid Recovery
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 2
Ransomware: 6 Capabilities Enterprises Need for Rapid Recovery
Ransomware Protection
Secure Backup is your last line of Defense
Backup Recovery
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 3
Ransomware: 6 Capabilities Enterprises Need for Rapid Recovery
Veeam ransomware best practices Veeam offers a horizontally scalable software defined
and selected capabilities storage (SDS) architecture. On the front end, Veeam can
easily be extended to ingest more data as your backup
volumes, or performance needs change. On the back end,
Since 2019, every release of Veeam’s® Modern Data Protection
our Scale-out Backup Repository™ (SoBR) is a software-
platform has delivered significant cyber resiliency and secure
defined construct that pools different types of storage
ransomware protection capabilities, helping enterprises
devices for backup data. Through Veeam’s policy engine,
reliably recover from any cyberattack in minutes. Our software-
data can be placed on the most appropriate devices,
first approach gives you the flexibility to maintain resilient,
including on-premises direct attached storage (DAS),
immutable storage on premises and in the cloud without being
deduplication appliances, network attached storage (NAS),
locked into proprietary hardware. These best practices allow
object storage and the cloud; automatically managed over
you to have the appropriate safeguards to ensure the delivery
time or via a Service Provider.
of reliable backup and recovery for your critical infrastructure
services and ensure your data will be there when you need it.
The Veeam Platform delivers on all these capabilities,
allowing for a solution that scales and extends as
Secure Backup is your last line your business and its requirements evolve over time.
of Defense Veeam’s approach is modular and extensible, with no point
solutions required, no dictated hardware dependencies and
The availability solution deployed should be capable of no worry of outgrowing the solution.
protecting the breadth of all mission critical workloads, be they
physical, virtual or container based. Regardless of if workloads Veeam’s software-defined ransomware remediation
are deployed on premises, in the cloud with IaaS or as SaaS, capabilities work with any infrastructure, today and
mission critical data now resides in many locations, and needs to in the future. Proprietary infrastructure should not be
be portable to account for future requirements. The protection required, allowing the business to deploy on the hardware
platform should have the ability to scale up or down, depending or cloud that it selects. Infrastructure flexibility not only
on requirements and workloads being protected. The backup allows an organization to determine what hardware their
solution should be capable of capturing data via a multitude backup solution runs on, but also protects your backups
of methods, including backup, replication, continuous data from ransomware, no matter where vital data resides.
protection (CDP) and storage array integrations.
Veeam Platform
Single Platform to protect ALL workloads
Share UNIX
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 4
Ransomware: 6 Capabilities Enterprises Need for Rapid Recovery
1. Trusted Immutability
Cyber criminals now routinely attempt to encrypt or delete AWS Amazon S3 and other approved S3-compatible object
an organization’s backups as part of any ransomware storage providers, using their object lock capability.
attack. Success for the adversary is critical here, because
Backups written to resilient storage will be one of
without backups the victim must pay handsomely to recover
the most critical defenses for ensuring ransomware
their data.
resiliency. Resilient backup storage would mean that
Resilient backups are simply backups that cannot be you have one or more copies of your backup data on any
destroyed by an adversary — even one who has acquired combination of the following media:
administrative credentials.
• Backups on tape (and removed from the library or
At the simplest level, robust resiliency can be achieved marked as WORM)
by backup to removable drives or to tapes which are then
• Immutable backups in S3 or S3-compatible object storage
removed from the tape library. Having offline, air gapped
backups is step one. • Air-gapped and offline media (i.e., removable drives,
rotating drives)
Veeam offers a bulletproof, policy-driven approach for
data management across various resilient storage options. • Backups in Veeam Cloud Connect with Insider Protection
Enhancing overall resiliency, certified storage solutionsii (a services-lead capability)
from Veeamiii and via our broad partner ecosystem guarantee
• Immutable backups in a hardened repository
immutability (the inability to delete or change data for
a prescribed time). These options include our Veeam The Veeam Platform includes a complete set of ransomware
Hardened Repository, which delivers a robust immutable remediation capabilities in its core product that are easily
option for your on-premises backups. If you prefer to keep customer-deployable, and flexible enough to work with any
your data in the cloud, Veeam provides immutability using infrastructure, on-premises or in the cloud.
Veeam
Amazon S3
Repository
Amazon S3 Glacier
Dedupe
S3 Compatible
Appliance
- air-gapped immutability
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 5
Ransomware: 6 Capabilities Enterprises Need for Rapid Recovery
Some Veeam customers seek to implement immutability Other digital hygiene best practices include:
via a double or triple immutability approach. This can include
• Unique passwords for every login source. This way
leveraging the Veeam Hardened Repository for on-premises,
you can ensure that if one password or machine gets
first level backups, then leveraging the immutability capabiltiy
breached, the stolen password won’t give hackers access
in the automatically managed Veeam Capacity Tier with S3
to other accounts.
Object Lock for cloud or on-premises object storage, and/or
automatically writing backups to WORM (write one, read many) • A password manager. A robust password manager can
physical tape media; noting that Veeam natively supports help manage all of your login information, making it
physical tape without the need for third party integrations. easier to create and use strong, unique passwords.
While immutability, whether implemented as a single, double • Multi Factor Authentication (MFA). You can configure
or triple immutable approach is very helpful in remediating multi-factor authentication for additional security of
cyberthreats, it is only the beginning of a comprehensive your accounts, which will require continual secondary
ransomware protection practice. validation at every login.
Encryption end-to-end is needed to fend of data exfiltration. • Remove unused devices, applications and non-essential
Today, one of the fastest rising cyberthreats is data leakage and programs and utilities from all servers.
data exlfiltration, whereby a ransom must be paid in order to
• Patch management — make sure all software, hardware
avoid sensitive data from being shared on the dark web.
and firmware in use are running up-to-date software
Proper authentication, and ‘digital hygiene’ regarding levels that have shored up any known vulnerabilties.
least privilige access, are needed to remediate against
data injection. Data also needs to be protected against
being altered such that records and entries that appear
valid have not been maliciously changed to be invalid.
© 2021 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 6
Ransomware: 6 Capabilities Enterprises Need for Rapid Recovery
2. Backup Verification
A robust, comprehensive cyber defense strategy always Veeam SureBackup® pioneered automated backup
starts with valid backups. Reliable, verified and tested verification, and it’s a key capability in our ransomware
backups are the first step to any successful recovery resiliency best practices. SureBackup automatically brings up
success. Busy IT teams need a way to automatically servers and applications in a network-isolated environment and
verify the integrity of backup data as backups are taken. executes health checks that include many built in application
If there is any issue, another backup can be taken while verification means, such as executing specific Active Directory
production data is still available, thus ensuring that there or SQL commands to verify application integrity. This
are no issues in data availability that are discovered after automated testing capability can be extended and customized
the production data is no longer available, has been to fit your requirements and can be scheduled to execute
compromised or is deemed to be untrustworthy and when you feel it is most appropriate, sending a status
lacking integrity. report to your mailbox once the testing has concluded.
3. 3-2-1-1-0 Rule
Veeam recommends following the 3-2-1-1-0 backup rule, which This recommendation is imperative for becoming resilient
is our enhancement to the well-known industry 3-2-1 rule. against ransomware.
For many years, Veeam has advocated for the 3-2-1 Rule The modern application to the 3-2-1-1-0 rule addresses
as a general data management strategy. The 3-2-1 Rule the need for the resilient copy requirement and is one
recommends that there should be at least three copies of of the most important concepts that an organization
important data, on at least two different types of media, can implement to be better prepared to fend off and
with at least one of these copies being off site. The 3-2-1 remediate against cyberthreats.
Rule does not dictate or require any specific hardware and is
Offline copies of data are needed to combat insider
versatile enough to address nearly any failure scenario.
threats, including destruction of data. Insider threats
As the threat of ransomware has advanced, Veeam are a rising concern, with some analyst firms stating that
has emphasized that at least the “one” copy of data the majority of cyber threats over the next three years
be resilient (i.e., air-gapped, offline or immutable). could come from employees of the business.
Three different Two different media One offsite copy Of which is: No errors after
copies of data offline air-gapped automated backup
or immutable testing & recoverability
verification
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 7
Ransomware: 6 Capabilities Enterprises Need for Rapid Recovery
Before ransomware, enterprises typically only restored as VMware vSphere, Microsoft Hyper-V, and Nutanix
3-5% of their backed-up data over a one-year time frame. AHV), even migrating from one hypervisor to another
But in a ransomware attack, 100% of your production data automictically, with just two mouse clicks
may be encrypted or contaminated with malware, and you
• Providing the ability to recover physical and virtual files
need to get it all back, fast. Fast access to data is critical,
and servers to a cloud environment (such as AWS, Azure
with the goal being more of a resume than a restore for all
and Google Cloud Platform), with just two mouse clicks
vital operations.
• Providing the ability to instantly recover key enterprise
Veeam pioneered instant recovery of data in 2010 and has
applications, such as Oracle and SQL Server databases for
refined and extended this capability ever since. Today Veeam is
immediate use
optimized to quickly restore multiple machines simultaneously
to handle even the largest enterprise recovery needs. • Providing the ability to rollback entire Network Attached
Storage (NAS) and file shares to a known good, pre-
Veeam delivers instant recovery of data:
infected state so that your business gets back to normal
• Without requiring costly, proprietary appliances or solid- operations quickly
state drives
Instant recovery of data, that can leverage a portable data
• Without being limited to only the most recent
format to deliver cross platform access to data ensure fast
backup data
recovery, when and where you need it. From AHV, Hyper-V,
• Providing the ability to recover physical and virtual or vSphere to physical Windows or Linux, to Azure, AWS or
files and workloads to a virtualized environment (such GCP, the Veeam Platform has you covered.
Instant
Physical 2
servers disk recovery
File
shares
Instant
4
Compressed NAS NAS recovery
backup files
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 8
Ransomware: 6 Capabilities Enterprises Need for Rapid Recovery
Ransomware dwell times (the time an adversary is on Secure Restore is fully configurable through PowerShell,
a victim’s network before activating an attack) can be many which means that if you automate recovery processes via
months. Because of this, you need automation to ensure a third-party integration or portal, that you are also able to
that you never restore malware back into your cleansed or take advantage of this capability to ensure that threats are
new environment. not reintroduced into your production environment.
One of the versatile aspects of a SureBackup job (described This powerful capability is useful for:
above in item #2) is the ability to leave the job running so
that additional verification and forensics can be performed • Detecting “sleeping” ransomware in backup data and
on the system from the backup restore point. This can invoking anti-virus remediation to disinfect data before it
include doing a manual inspection to see if the ransomware lands back into the production environment
threat is still in place, investigating specific files.
• Verifying backups from locations with less IT control,
Building upon the Instant Recovery capability mentioned such as remote and branch offices (ROBO), prior to
earlier, Veeam integrates with leading anti-malware solutions restoring them into the primary data
to deliver an automated recovery process to check and clean
infected backup data, ensuring that backup data recovered into • Scanning backup data with additional anti-virus solutions
production is free of cyberthreats, eliminating re-infections. to better detect rare or zero-day malware
Veeam Secure Restore provides users an optional, fully As with all Veeam Platform capabilities, implementing
integrated anti-virus scan step as part of any chosen recovery Secure Restore is fast and easy to configure with only
process. This feature addresses the problems associated a couple of mouse clicks:
with managing malicious malware by providing the ability to
assure any of your copy data that you want or need to recover
into production is in a good state and malware free. Secure
Restore was another industry first, patent-pending method
of remediating an attack arising from malware hidden in your
backup data. Secure Restore provides additional confidence
that a threat has been properly neutralized and no longer
exists within your environment.
3. Anti-virus check
Veeam
Backup & Replication
Backup Mount
repository server 4b. Infection found, proceed to
recovery but disable network
2. Mount disks directly from adapters.
backup file to mount server
©© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
9
Ransomware: 6 Capabilities Enterprises Need for Rapid Recovery
6. DR Orchestration
Make no mistake, cyberattacks are disasters. In an emergency, Veeam’s industry leading Veeam Disaster Recover
your team needs automated, repeatable results. Your tool set Orchestrator (VDRO) lets you fully automate and
must allow regular tests and audits of how quickly you could document complex workflows, including non-disruptive,
recover from a disaster, including automated testing of server large-scale recovery testing with dynamic documentation.
and application accessibility and usability post-restore. And Incident response/recovery documentation can also be
the testing process and results should be self-documenting updated with non-Veeam information, such as contact lists
to satisfy management and external security auditors. and other mission-critical response information.
Most organizations have many types of Business Continuity (BC) plan will improve. The true purpose of a test is to find out if
and Disaster Recovery (DR) plans. Here are a few examples: your plan works or not.
• Application-level failure Cyber resiliency, and ransomware remediation need
• Site-level failure to be part of your overall disaster recovery plan. One
of the clearest ways you can prepare for cyber security
• Infrastructure component failure
incidents is to draw up an incident response plan. Creating
• Mission-critical applications a clearly defined incident response plan will enable you to
• Dev/test applications outline procedures for detecting, communicating, controlling
Much like automated backup verification, such as and remediating security incidents so that employees know
Veeam’s SureBackup, is important in daily backup how to respond to cyber security events in case they happen.
operations, so too is regular testing of your overall cyber Further, this plan needs to be capable of being automatically
resiliency recovery plan. After creating a recovery plan, tested, dynamically updating critical documentation, and
the most important thing you can do is test it. You need to allow for integration with other necessary tools and workflows
know if the plan you put together works. There is a tendency that will ensure resumption of critical business operations.
to not fully test disaster recovery plans, or not test them at
all. At best, most organizations partially test their DR plans
once or twice a year.
Continuous testing is important, especially since applications 1-click site recovery
are constantly changing. To respond to changes and and DR testing
configuration drift, recovery plans must be updated any time
a change is made to an application, such as adding more Veeam Disaster Recovery
servers for additional capacity, or removing older servers. Orchestrator
When testing, be sure to pay special attention to what did
not go as desired. This is the only way your disaster recovery
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 10
Ransomware: 6 Capabilities Enterprises Need for Rapid Recovery
• Veeam ONE
A detailed, long form technical white paper of ransomware best practices and
in-depth coverage of Veeam’s cybersecurity capabilities is available at:
https://www.veeam.com/wp-protection-yourself-from-ransomware.html?wpty.
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 11
Ransomware: 6 Capabilities Enterprises Need for Rapid Recovery
Chris’ career has been deeply rooted in cyber security with over
15 years of diverse technical experience. He is currently driving
the Security and Data Protection Marketing effort at Veeam. Before
joining the team, Chris has held various engineering, sales, and
product management roles. During his career, he’s helped numerous
organizations manage cyber risks by designing solutions that align with
industry frameworks, programs, and compliance mandates.
i https://www.infosecurity-magazine.com/news/cybersecurity-skills-shortage-1/
ii Technical certifications for immutable storage came in response to the world of financial industry
regulation. Numerous government rules are designed to ensure that regulated organizations retain unaltered
copies of financial records for a prescribed time (for example in the US, see SEC Rule 17a-4(f), FINRA Rule
4511 and CFTC Rule 1.31 (c)-(d)). Fortunately, the same control certifications that guarantee financial probity
can also guarantee undeletable and unalterable backup data.
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 12