Security Architects & Cloud Backup Strategies
Cloud security architects should understand well-established backup concepts and patterns—such as RTO, RPO, and the Grandfather–Father–Son pattern—and newer ones, such as immutable backups. They should also know the relevant cloud-native backup features for the storage and database services in use by their organization.
However, understanding these features alone does not make a great security architect. These features are merely the cards he holds in his hand ?(alongside features of third-party backup solutions, whether already in place or under consideration). The game starts afterward. Security architects have to elaborate a comprehensive backup strategy and establish concrete guidelines, helping application teams to implement standard patterns across the overall application landscape rather than each team trying to figure out what makes sense from their perspective.
The primary objective of these guidelines and standards is, of course, to meet business needs. Answering the following key questions can help clarify those more efficiently and quickly:
The final step is matching business requirements with the backup capabilities in the cloud. The main challenge here is the diversity of storage and database services with their varying backup features across cloud providers and among services within the same cloud platform. Do you want to retain monthly backups for a year while ensuring point-in-time recovery across all of your storage and database services for the last seven days? Even the clouds do not fulfill all imaginable backup requirements out of the box without additional tooling or scripting efforts.
Defining clear backup service levels (e.g., a "silver" tier might specify an RTO and RPO of eight hours) is essential to establish clear and actionable guidelines. The next step is determining the best way to implement these service levels for each specific cloud service across the cloud platforms. It is essential to be aware that, in some cases, certain workloads may not be compatible with available backup features for specific cloud services, so these services cannot be used.
Solving this puzzle can be complex, but it should also be fun and exciting for security architects!
P.S.: Didn’t read my previous articles on backups? Here is a list…
?
?
Expert Security Consultant
2 周Great article - very insightful - thank you for sharing. What is your point of view concerning “completely” logically/physically separating backup infrastructure from the infrastructure being backed up, i.e. in a separate AD island to reduce risk of compromize such as encryption of backups if (when) the primary is encrypted by ransomware? Obviously the backups need to be enough secured against compromize on its own (don’t want malicious actors hto get access to backups of your AD.