Introduction
The Security of an I.T. system is a paramount requirement. No deployment of any hardware or software component can be considered complete without considering its security. Cyber Security is simply something nobody can afford to ignore. Hacks and data breaches regularly affect organizations of all sizes, and these incidents can significantly impact the affected organizations in multiple ways:
- interruption and damage of business operations;
- data loss;
- financial loss (for both business interruptions or ransoms);
- reputational damage.
Keeping today’s data centers available 24/7 and secured at the same time requires more than just backup and recovery tools; that’s why Veeam moved to a more comprehensive approach called Data Resilience. Veeam Data Resilience has several founding principles:
- Backup and recovery
- Redundancy
- Disaster Recovery planning
- Cybersecurity measures
- Testing and maintenance
While some concepts of Data Resilience like Backup and recovery or Redundancy are developed in our Veeam Backup & Replication Best Practices, in this dedicated document we will focus more on Security-specific topics.
Another concept we will follow in this document is Zero Trust Data Resilience (ZTDR). Zero Trust has historically been applied to an organization’s entire ecosystem but their backup environment. Veeam’s Zero Trust approach, focuses on expanding Zero Trust principles to include an organization’s backup environment. This philosophy is foundational to our approach to data protection and an organization’s cyber resilience strategy.
The core principles of Zero Trust Data Resilience are key elements in protecting data:
- Separation of backup software and backup storage: Minimize attack surface and blast radius
- Multiple resilience zones: 3-2-1 backup rule
- Immutable and encrypted backup storage: Protect backup data from modification or deletion
Scope
Veeam portfolio is extensive. However, in this document we will focus on Veeam Backup & Replication, part of the Veeam Data Platform.
Feedback
This is a living documentation, you are welcome to leave any enhancements suggestions using the contact form.