8-Point Security Checklist For Your Storage & Backups – 2024.

On September 27th, Johnson Controls International announced a massive ransomware attack, that encrypted many of the company devices, including VMware ESXi servers. This impacted the company’s and its subsidiaries’ operations.

The company serves clients in the government, healthcare, and naval sectors, and they believe sensitive Department of Homeland Security (DHS) information may have been compromised in this attack.

What was unique about this incident was the ransom note sent by Dark Angels, the ransomware group, which included the following details: “Files are encrypted. Backups are deleted”.

While this isn’t the first time ransomware groups have successfully breached their victim’s backup environments (See recent News Headlines) it is one of most publicized attacks.

Your 8-Point Checklist To Secure Your Backups.

ransomware attack is a horrible time to discover that your backups are not secure, so to help, here’s an 8-point checklist to determine whether your backups are sufficiently secured, and whether data is fully protected by start your assessment.

1. Do your security incident-response plans include cyberattacks on your backups? If so, what’s included:

  • Recovery from a complete wipe of a storage array
  • Recovery from a complete corruption of the SAN fabric configuration
  • Recovery from ransomware

2. Is there a complete inventory of your storage and backup devices, that includes the current security status for each one?

  • All backups, archive environments, storage arrays (block, file, object), and SAN switches
  • Storage software versions (storage OS, firmware deployed), and, in particular: patching status, known CVEs, and actual resolution status
  • What is backed up? Where? How?
  • Which storage & backup protocols are allowed? Are all obsolete and insecure protocols disabled

3. Is there comprehensive and secure event logging and auditing of your backups?

  • Including: central log services, redundant and tamper-proof records, and redundant and reliable time service

4. Are you able to audit the configuration changes?

  • E.g., what changed and when – in device configuration, storage mapping, and access control? 

5. Is there a well-documented, and enforced separation of duties for your backups?

  • E.g., Separate admins for storage, backup, and disaster recover in each environment.

6. Are all storage and backup administrative-access mechanisms documented?

  • E.g., which APIs are open, how many central storage management systems can control each storage device, and are there any servers or OS instances that can control storage.

7. Are existing mechanisms for ransomware protection, air-gapping, and copy-locking used?

  • Is there an audit process to verify they are correctly deployed at all times?

8. Is the security of your backups regularly audited?

  • Does this audit process include: SAN communication devices, storage arrays (block, file, object), server-based SAN, and backup?

Take the 2-minute Cyber Resiliency Assessment for Backups, and get your own maturity score and practical recommendations – to help protect your data, and ensure recoverability.

Posted in Cybersecurity

Leave a Comment

Your email address will not be published. Required fields are marked *