KISS: "Keep It Simple, Stupid" is a timeless phrase that underscores the importance of simplicity. During a workshop on Negotiation Strategy, Prof. Deepak Malhotra (Harvard) introduced me to the bias of "curse of knowledge." Ever since, in my job (which revolves in large part around communication), I have tried to step back and look at the situation from the other point of view - the "other" being the person who might not have all the information I might have. The resulting empathy makes it easier to communicate, understand the immovables, and make progress towards a common ground. Simplicity in design, products, and services is all about having empathy - empathy for the CIOs, for the IT leaders, for the IT practitioners - all of whom are figuring out how best to support their businesses in this new COVID world. In addition to managing internal initiatives and operations, they have to continuously deal with a range of externalities, including ransomware attacks.
The international police organization INTERPOL recently warned that it “has detected a significant increase in the number of attempted ransomware attacks against key organizations and infrastructure engaged in the virus response. Cybercriminals are using ransomware to hold hospitals and medical services digitally hostage, preventing them from accessing vital files and systems until a ransom is paid."
Time for a disclaimer: there is no silver bullet when it comes to protecting against ransomware. It is a vast and expansive topic that can encompass many aspects of your IT infrastructure, including network, compute, memory, storage, and disaster recovery, among others. Let's focus on one of the critical aspects, though - protecting your data and rendering ransomware attacks on them ineffective.
How do ransomware attacks affect organizations' data? There are two typical strategies:
To understand the protection strategies against (2) above, let's take a look into what an encryption process consists of. An in-place encryption process comprises three steps:
The challenge in all this of course is that this process is occurring completely out of band, unbeknownst to the applications that are happily going about their business. That is, up until the ransomware has done its job and encrypted the whole data set.
So how do you protect against something like this? Well, the usual solutions are to keep snapshots or to take backups and keep such backups away from the primary infrastructure. They work in select cases - you can recover from a snapshot if snapshot data has not yet been encrypted; you can recover from backups if the attacker has not yet infiltrated your secondary backup environment. You might not want to tie your peace of mind to those "ifs."
Enter WORM - Write Once Read Many. A properly designed WORM system would ensure that no matter what, all data would be protected for a set period of time against all write/update and delete requests, regardless of who is requesting that operation. Let's break that down one more time.
WORM, as described above, has been natively built into Nutanix Objects since day 1. With a design where security is one of the three guiding principles, we decided to focus on WORM since the early stages of Nutanix Objects development.
How and where can you use Nutanix Objects WORM? Consider these three opportunities:
Important to note: Even if your virtualized application does not talk S3 APIs, this is a way for you to protect its contents using Objects WORM. Just enable backup of your application using a bucket from Nutanix Objects. Then, protect that bucket using WORM.
Nutanix Objects supports WORM for buckets regardless of their versioning state (enabled or disabled). In other words, regardless of your applications’ versioning requirements, you can protect its contents. This is useful since many applications do not work with version enabled buckets (yet).
Finally, as I noted before, protection against (or recovery from) ransomware is only possible when you deploy a slew of strategies. Safeguarding your data against ransomware is one of the most salient capabilities of Nutanix Objects WORM. There are additional considerations pertaining to networking best practices, microsegmentation, access controls, and backup and disaster recovery, that may be useful to you. To learn more about how Nutanix can help with your ransomware defense strategy, check out our Ransomware Threat Tech Brief.
© 2020 Nutanix, Inc. All rights reserved. Nutanix, the Nutanix logo and the other Nutanix products and features mentioned herein are registered trademarks or trademarks of Nutanix, Inc. in the United States and other countries. All other brand names mentioned herein are for identification purposes only and may be the trademarks of their respective holder(s). This post may contain links to external websites that are not part of Nutanix.com. Nutanix does not control these sites and disclaims all responsibility for the content or accuracy of any external site. Our decision to link to an external site should not be considered an endorsement of any content on such a site.
This post may contain express and implied forward-looking statements, which are not historical facts and are instead based on our current expectations, estimates and beliefs. The accuracy of such statements involves risks and uncertainties and depends upon future events, including those that may be beyond our control, and actual results may differ materially and adversely from those anticipated or implied by such statements. Any forward-looking statements included in this post speak only as of the date hereof and, except as required by law, we assume no obligation to update or otherwise revise any of such forward-looking statements to reflect subsequent events or circumstances.