Best Practice 8.3 – Secure your data recovery mechanisms to protect against threats
To help protect against malicious activities, follow the guidelines set out within
your organization’s security framework. Protecting against ransomware
-
SAP Note: 2663467 - Tips to avoid a Ransomware situation
[Requires SAP Portal Access] -
SAP Note: 2496239 - Ransomware / malware on Windows
[Requires SAP Portal Access]
Suggestion 8.3.1 – Secure backups in a separate account with additional controls
By securing backups in an account that is isolated from the primary copy of your data, either directly or using replication, it’s possible to minimize the risk of a compromised system also impacting your data recovery mechanisms.
The secondary account can be viewed as a “data bunker” with access requirements aligned to the use case.
For backups using Amazon S3, additional controls might include S3 Object Lock to store objects using a write-once-read-many (WORM) model or multi-factor authentication delete.
If using replication, understand the different options available, including delete marker replication (by default deletion markers are not replicated) and S3 Replication Time Control. To optimize costs, ensure that housekeeping is performed on both the primary and secondary buckets.
Consider AWS Backup Audit Manager
Suggestion 8.3.2 – Validate your ability to recover
Backups are the last line of defense when protecting your data from malicious activities, but might prove worthless if recovery is not possible due to incomplete backups or backups that are not valid. Recovery might not be possible if you are unable to access or decrypt backups. Consider how you protect encryption keys and credentials.
Perform recovery tests aligned with a malicious scenario, including a rebuild in an alternate account.
-
SAP Lens [Operational Excellence]: Best Practice 4.3 - Regularly test business continuity plans and fault recovery