Ransomware Protection
Ransomware Protection
How can I achieve Ransomware Protection in backup environment?
There is no such thing as "the" protection against ransomware. An improvement of the protection is achieved by several different starting points:
The 3-2-1 rule serves as a basis, i.e. 3 copies at 2 different locations, 1 of which is offsite. This can also be extended, e.g. Veeam has made it a 3-2-1-1-0 rule. Here, 1 immutable backup (a data set that cannot be changed) and 0 error restore (means regular restore tests) are added. But this alone is only a bundle of measures to protect against ransomware.
Protection of the backup environment also includes protection of the backup environment, i.e. separation of services and access to different accounts (just don't run everything under the admin user for convenience), as many attacks prefer to focus on Windows environments, run the backup servers under Linux, use network connections to the nodes only when needed and don't leave them open permanently.
Thinking that a successful backup would be sufficient is too short-sighted at this point. Only a well thought-out and structured backup in conjunction with considerations in the area of network security and user-specific access rights to data and services, plus the regular checking of backups and testing of restores, will lead here to the goal of protection against ransomware attacks.
Conclusion: Only a coherent concept offers protection!