Page 122 - Cyber Defense eMagazine RSAC Special Edition 2025
P. 122

For one thing, backup contains copies of data from all other applications, making it a prime target for
            cyber attacks.

            The backup environment is also incredibly complex. Even small backup environments have numerous
            components,  and  in  larger  organizations  and  enterprises,  the  number  of  software  and  hardware
            components and the interactions between them is staggering. Each component typically requires access,
            creating  multiple  potential  vulnerabilities,  even  in  security-hardened  operations  that  use  zero-trust
            methods like multifactor authentication.

            Unfortunately, no organization is immune, as we saw in a recent attack against a large company with
            well-secured IT operations managed by an experienced provider. Even though the company did all the
            right things, it still lost its backup catalog, rendering data unrecoverable. This example highlights the
            difficulty in securing backup, especially since many backup products weren't designed to fend off cyber
            attacks.



            Why Zero Trust Alone Can’t Secure Backup

            Zero trust is crucial for improving cyber protection and is widely recommended for securing infrastructure
            and data. Everyone should use it wherever applicable. But backup and recovery environments need more
            security than zero trust can provide. That’s because zero trust has some limitations.


            1. Access is access: While zero trust makes access more difficult, the goal is still to grant access, which
            can be exploited if credentials are compromised. This is an unacceptable risk for backup systems.

            2. Multiple components = more vulnerability: The numerous components in a backup environment all act
            as potential attack vectors. Security is often managed separately for each component, thereby increasing
            the challenge.

            3. Inconsistent vendor adoption: Not all technology vendors fully embrace zero-trust principles in their
            product design and management. Even backup vendors that offer advanced security features typically
            can’t extend these protections to all components in a backup environment.

            4. Framework flaws: Legacy code and architectures could contain hidden vulnerabilities that zero-trust
            methods might not recognize. For example:

               o  SSH and OpenSSH, designed as secure replacements for remote login protocols, can serve as
                   backdoor entries into some backup products.
               o  Log4j, commonly used for monitoring and logging events, has been the target of attacks like
                   Log4Shell,  which  exploits  openings  in  the  software.  Patching  these  vulnerabilities  across  all
                   systems remains a challenge.

            5. Lack of cyber resilience for backup: Originally designed to counter hardware failures and human errors,
            backup now plays a crucial role in recovering from cyber attacks. To be truly cyber resilient, backup
            environments need advanced protection that is designed to withstand sophisticated attacks and maintain
            integrity when other systems are compromised. Zero-trust methods don’t do that.







                                                                                                            122
   117   118   119   120   121   122   123   124   125   126   127