Backups of the environment are an unsung hero of the security of servers and network devices. It’s not just about having a backup. You have to do the backups correctly. Don’t get me wrong; having some sort of backup is better than nothing. Just make sure you are securing your backups as well as your production servers. A good backup solution implements the Grandfather-Father-Son aspect but it also takes into consideration the location of those backups, how often they run, and making sure they are secured with encryption.
Let’s start with the basics. Plug in a USB hard drive, copy your files, and congrats you’ve got a backup! Technically yes but please please take it a few steps further after this. If your system becomes compromised, it’s not terribly difficult for a malicious actor to wipe the backup. At that point, if ransomware were installed, they would have removed your ability to restore. From a simple data availability standpoint, a USB drive could get you started but from a security perspective it is a very bad idea. What about just disconnecting the USB drive after you do your backup? Being air gapped is secure right? That depends on how you reconnect that drive. If your system is still compromised, plugging in the drive could wipe it or encrypt it too so you’d have to remember to not plug it in. Plus it’s your only copy of the data which is a separate problem.
Now what about an upgrade to sending your data to a different server. In this example we’ve decided to install backup software that sends our data to a backup server. Nice upgrade! This will secure your data from any local bad software that makes it onto your system. My next question; how did you send that data to the server? If it was simply over a SMB share, you might not be as safe as you think. If you’ve got access to it, so does the attacker. Make sure the backup software you install is placing it out-of-band to standard file sharing methods. If it can be deleted, your backups are not secure.
Having the backup server on-site is not a bad thing though. If you had to restore a server or data when your ISP is down or being very slow could be very problematic. Make sure your on-site backup server is secured into its own segment of the network. This could be via a simple SoHo router/NAT, separate segment of your Cisco routing with ACLs, or a network in-line firewall with specific firewall rules for backup only. The point is that you need to secure your backup server so that when it comes time to restore, you are actually able to restore. Quick note about offsites backups. You can also send your data offsite to keep multiple copies and locations but ensure the offsite location is also secure. There are a variety of ways you can accomplish multi-location backups but that’ll need to be a topic for another day. Just know that you’ll be in a better security posture by doing so.
The last thing that I want to touch on are making sure your data is secure. Every step of the data transmission needs to be reviewed to ensure things are not vulnerable. At a high level you’ve got the data being read from the disk, encrypted by software, sent over a network which should use encryption on the fly, and then written to a backup server in an encrypted format. I know that’s a lot but if any one of those vectors becomes compromised, you could be leaking data.