

Organizations should ask their cloud storage providers a series of questions about the physical security of their data centers and the personnel who operate systems and applications within those environments. Any required legal and regulatory needs should be addressed early to make sure all storage and archival requirements meet industry and best practices requirements. As a result, security teams should focus not only on the types of data backed up, but any and all security controls available in the cloud to help protect this data. Infosec.The sensitivity of the data stored and replicated is critically important.For BCDR planning teams, the data should be aligned to standard metrics, such as mean time to recovery, recovery time objective, recovery point objective and others. IT operations teams should look at the types of data to back up and how long the data should be stored. To develop a cloud backup ransomware protection strategy, there are some distinct areas of the organization that should be involved in the planning phase: Requiring multiple administrators to collaboratively enter credentials and multifactor authentication information.Alternately, this isolated backup could be in a secondary or backup data center. Creating a new, isolated cloud-based backup using both on-premises and cloud-based network restrictions similar to those just mentioned.These rules are only relaxed when the data is needed or for replication. Building a new network segment within the organization's environment for these backups, with a "deny all" firewall protecting the segment.These are backups that aren't reachable or accessible from the core corporate environment without making infrastructure changes and/or requiring numerous administrative authentication/authorization adjustments.Ĭommon tactics for cloud backup ransomware protection include the following:

But the specter of ransomware is driving some organizations to consider isolated backups. Most mature enterprises have several tiers of backups and replicated data for business continuity and disaster recovery (BCDR) purposes.
