Page 82 - Cyber Defense eMagazine March 2024
P. 82

Access  architecture  is  immutable.  An  automation  engine  manages  the  entire  backup  infrastructure,
            ensuring the components carry out their tasks according to policy.



            What happens if I need to restore my data?

            No business seems to be immune from cyber attacks. In a worst-case scenario, a ransomware attack
            could get into Active Directory, gain all usernames and passwords, and wipe out all production data. And
            yet the data in the backup environment would still be safe because it lives in a Zero Access infrastructure.
            There is no bridge from the compromised credentials into the Zero Access environment because there
            are no logins. The only access to that infrastructure comes from the backup provider’s automation engine,
            which manages components and executes tasks according to the policies you’ve set.

            If hackers were to attack your business operations, you’d be able to restore a copy of your backup data
            thanks to Zero Access. Once you’ve started to rebuild the production system so that there's somewhere
            to restore to, you can start to install restore tools onto those systems that will be able to recover the data.
            Then you’d simply log in to the backup GUI and follow the recovery procedure. And remember: You’re
            only restoring a copy of the data; there’s no way to compromise or destroy the original backup  data,
            which remains safely locked away.

            While the zero-trust approach sounds great, and it plays an important role in protecting the business
            environment, it is not the pinnacle of security that some backup vendors make it out to be ... especially
            when it comes to precious backup data. You must protect your backup environment at all costs. The best
            way to keep bad actors out of your backup environment is to make sure there’s no access at all. And for
            that, Zero Access offers much higher security than zero trust. The best part is that Zero Access security
            protection for backup is available today.



            About the Author

            Greg Tevis, Vice President of Strategy at Cobalt Iron, has worked for 42 years
            in  the  storage  and  data  protection  market  helping  companies  develop  data
            protection  and  cybersecurity  solutions.  Tevis  is  recognized  as  an  industry
            expert in storage technologies, particularly storage management. He has 42
            U.S.  patents,  with  several  more  pending.  He  can  be  reached  at
            [email protected]       (linkedin.com/in/greg-tevis-10a5042).     More
            information about Cobalt Iron is available at cobaltiron.com.

            Zero Access® is a registered trademark of Cobalt Iron, Inc.













            Cyber Defense eMagazine – March 2024 Edition                                                                                                                                                                                                          82
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   77   78   79   80   81   82   83   84   85   86   87