Cyberthreats are rapidly increasing in sophistication and persistence. As threats increase, cyberattacks are expected to double by 2025.1 What’s more, if an organization is attacked, the average cost of downtime for large enterprises is more than $11,600 per minute.2 Despite the increase in awareness and spending, it’s estimated that every 11 seconds, an organization will be hit with a ransomware attack.3 These statistics reinforce the importance of recovery readiness.
With cloud storage now a popular choice for offsite copies, data security becomes increasingly important, leading many data protection solutions to offer robust Write Once Read Many (WORM) and immutability options along with air gapping and isolation for stronger cloud protection and security.
Commvault protects access, privacy, and control of backup data residing across copies, including those in the cloud. Commvault immutable backup data uses a rich feature set and incorporates the AAA security framework principles:
Authentication controls provide and grant access to backup data. These gatekeeper features include certificate authentication, strong multi-factor authentication (MFA), and integration with multiple third-party identity providers using secure protocols such as LDAPS, SAML, and OpenID
Authorization controls determine what level of access is allowed on the Commvault CommCell. Once authentication is granted, Commvault applies various controls such as role-based access controls (RBAC), multi-tenancy, data privacy locks, command authorization, and privileged access management platform integration.
These features work in tandem to protect data from inappropriate access, retrieval, and deletion. Adding these gates create software isolation, where even administrators are blocked from deleting and accessing backup data as well as reversing security controls. Similarly, if a malicious actor steals access to the CommCell, backup data is secured from malicious activity within the Commvault platform.
Lastly, Commvault enforces accountability by auditing events and actions within the CommCell and providing a rich customizable interface and API with which to view this information. Hundreds of reports are readily available in the Commvault software store providing deep information on the operations, events, and actions of the CommCell.
Report information and dashboards are only visible to authorized users, allowing owners to view the same audit reports and dashboards as administrators without seeing resources they do not have permission to see. For continuous monitoring, Commvault leverages common protocols, platforms, and tools such as REST APIs, Syslog, Webhooks, SNMP, and SCOM – allowing support for any event monitoring system.
Native plugins for Splunk and ServiceNow are also available for even more seamless integration. This further expands the accounting and audit capabilities within Commvault and provides flexibility to integrate with whatever systems are already in place within the organization.
Commvault Complete Backup & Recovery provides on-premises backup immutability by combining AAA framework security controls, hardening, data encryption, and native HyperScale™ X file system immutability. However, when designing a solution to protect against ransomware and cyberthreats, offsite copies of data are imperative.
When using cloud storage, such as Amazon Web Services (AWS) or Microsoft Azure, immutability options are enabled at the storage level with the cloud vendor. The cloud destination is configured as a library within Commvault for secondary and/or tertiary copies. When cloud immutability is enabled, all stored assets are locked, and the contents cannot be modified or deleted for the specified immutability time frame. Using Commvault with immutable cloud storage has key advantages over other backup products:
Commvault security controls & hardening
Encryption & key management
Commvault leverages the most secure Identity Access Management role-based authentication methods for cloud configurations. This eliminates any concerns over access keys getting lost or stolen and prevents bad actors from gaining unauthorized access to cloud resources. From a backup management perspective, security controls applied as part of Commvault’s AAA framework protect against accidents and malicious attempts to destroy protected data. Data that is immutable will stay immutable!
When faced with sending multi-petabytes of data to the cloud, cost and bandwidth dominate the conversation. Commvault software global deduplication begins where the source data resides. Only changed blocks are sent to the cloud, drastically reducing the bandwidth required for copy operations. This also allows more backup cycles (both full and incremental) to be protected in the cloud while reducing the storage footprint. Commvault’s deduplication is applied globally across all servers and workloads within a policy, further optimizing the data footprint. Ultimately, Commvault deduplication allows backup copies to quickly get to the cloud, reducing recovery point objectives, increasing recovery readiness, and lowering storage footprint costs.
Cloud storage encryption protects data at rest from being useful if stolen. However, this does not address source-side encryption needs. Commvault’s FIPS 140-2 certified encryption module handles encryption at the source prior to sending data to the cloud. This ensures every block of data transmitted to the cloud is encrypted and secured. For more advanced security, encryption keys can be offloaded to external key management servers, including those from AWS, Azure, or any KMIP-compliant system.
Data isolation via air gapping is a great strategy for keeping data safe from laterally moving threats that may be active within your on-premises environment. Cloud storage is virtually air gapped by default since data is written and read to/from the cloud using authenticated API calls instead of using persistent network connections. Furthermore, with WORM/Object lock enabled on storage, data will remain unaffected from any changes in the event of compromised cloud management credentials.
Metallic Recovery Reserve makes it easy to adopt secure and scalable cloud storage in just minutes, allowing you to meet the needs of your organization’s hybrid cloud strategy without requiring additional cloud expertise within your organization. With Metallic Recovery Reserve, you can seamlessly adopt air-gapped cloud storage and gain predictable costs and reduced overhead. It can also be the foundation for improving your ransomware recovery strategy by leveraging a fully integrated, secondary cloud storage target for Commvault Backup & Recovery or Commvault HyperScale X.
Using cloud WORM and immutable storage options with Commvault helps organizations address SEC 17a-4(f), CFTC 1.31(d), FINRA, and other regulations related to the recording, storage, and retention requirements for electronic records. AWS4 and Azure5 are compliant storage options supported by Commvault, both designed to meet securities industry requirements for preserving records in a non-rewriteable and non-erasable format using their respective storage-locking technologies.
Regulatory compliance
Keep pace and mitigate risk – even while cyberthreats are increasing. With highly available cloud storage and greater security protection, it’s simple to start creating secondary and tertiary data copies. Without any extra costs, Commvault Complete Backup & Recovery will manage, analyze, and secure your backup data efficiently, while cloud immutability further locks data from cyberthreats – today and in the future. With Commvault, you have the security and protection to store and manage your data on-premises and in the cloud. Are you recovery ready?