Recovery in the Bunker
Ransomware/hacker recovery
Daniel.Olkowski@dell.com
The most fresh ppt version of this document, you will find at:�http://backuprecoveryguy.blogspot.com/2022/07/backup-and-recovery-materials.html
Video covering Cyber Recovery:�https://youtu.be/jtgm2WHpFPk
Article about Cyber Recovery:
http://backuprecoveryguy.blogspot.com/2020/01/ransomware-attack-how-can-we-recover.html
© Copyright 2020 Dell Inc.
1
of 20
Internal Use - Confidential
Recovery in the Bunker
Ransomware/hacker recovery
Daniel.Olkowski@dell.com
© Copyright 2020 Dell Inc.
2
of 20
Internal Use - Confidential
Agenda
© Copyright 2020 Dell Inc.
3
of 20
Internal Use - Confidential
Introduction
© Copyright 2020 Dell Inc.
4
of 20
Internal Use - Confidential
Cyber Bunker – why is important?
Castle strategy
© Copyright 2020 Dell Inc.
5
Internal Use - Confidential
Cyber Bunker – why is important?
Castle strategy
Real time
protection
© Copyright 2020 Dell Inc.
6
Internal Use - Confidential
Cyber Bunker – why is important?
Ambulance strategy
© Copyright 2020 Dell Inc.
7
Internal Use - Confidential
Cyber Bunker – why is important?
Ambulance strategy
Cyber Bunker
© Copyright 2020 Dell Inc.
8
Internal Use - Confidential
Why Cyber Bunker?
© Copyright 2020 Dell Inc.
9
of 20
Internal Use - Confidential
Cyber Bunker answers for the following questions:
© Copyright 2020 Dell Inc.
10
Internal Use - Confidential
Cyber Bunker answers for the following questions:
© Copyright 2020 Dell Inc.
11
Internal Use - Confidential
Cyber Bunker answers for the following questions:
Do you have a plan in case your data was encrypted �by ransomware / hacker attack?
© Copyright 2020 Dell Inc.
12
Internal Use - Confidential
What does Cyber Bunker offer?
© Copyright 2020 Dell Inc.
13
Internal Use - Confidential
Gartner about �Cyber Bunker
© Copyright 2020 Dell Inc.
14
of 20
Internal Use - Confidential
What does Cyber Bunker offer?
© Copyright 2020 Dell Inc.
15
Internal Use - Confidential
What is Cyber Bunker?�Componentes
© Copyright 2020 Dell Inc.
16
of 20
Internal Use - Confidential
Cyber Recovery Requirements
Isolation
Physical & logical �separation of data
Immutability
Preserve original �integrity of data
Modern threats require modern solutions
Intelligence
ML & analytics �identify threats
© Copyright 2021 Dell Inc.
17
of Y
Cyber Bunker
A complete solution that allows recovery �after hacker/ransomware attack.
Isolated from production, with any frequency�Cyber Bunker keeps historical snapshots of all data �with no possibility to remove, change, encrypt by ransomware/hacker.
All the operations in Cyber Bunker - grabbing data, compliance protection, checking against virus, recovery – are fully automated.
Be safe!
Dell - Internal Use - Confidential
18
of Y
Internal Use - Confidential
IT Infrastructure
Any backup�software
Backup
Recovery
SITE A
IT Infrastructure
Any backup�software
SITE B
Disaster Recovery
1% data transfer
100% recovery
Data Domain
Air Gap
Cyber Bunker
Cyber
Recovery
Checking
ransomware
PLAN B – Secure data & Recovery
Compliance
No possibility to change data
Ransomware
protection
Secure
Historical
backups
Recovery
automation
Data Domain
Separation
from production
Cyber
Sense
Backup
software
Sandbox
Any tests
Ransomware
protection
Management
and automation
Data Domain
Dell - Internal Use - Confidential
19
of Y
Internal Use - Confidential
Is is it real?
Dell - Internal Use - Confidential
20
of Y
Internal Use - Confidential
IT Infrastructure
Data Domain
Any backup�software
Backup
Recovery
SITE A
IT Infrastructure
Any backup�software
Backup
Recovery
SITE B
Disaster Recovery
1% data transfer
100% recovery
Data Domain
Air Gap
Cyber Bunker
Cyber
Recovery
Checking
ransomware
PLAN B – Secure data & Recovery
Compliance
No possibility to change data
Ransomware
protection
Secure
Historical
backups
Recovery
automation
Data Domain
Separation
from production
Management
and automation
Cyber
Sense
Backup
software
Sandbox
Any tests
Ransomware
protection
1. Data Domain
- not changeable data (compliance) -> production copies
Dell - Internal Use - Confidential
21
of Y
Internal Use - Confidential
IT Infrastructure
Data Domain
Any backup�software
Backup
Recovery
SITE A
IT Infrastructure
Any backup�software
Backup
Recovery
SITE B
Disaster Recovery
1% data transfer
100% recovery
Data Domain
Air Gap
Cyber Bunker
Cyber
Recovery
Checking
ransomware
PLAN B – Secure data & Recovery
Compliance
No possibility to change data
Ransomware
protection
Secure
Historical
backups
Recovery
automation
Data Domain
Separation
from production
Management
and automation
Cyber
Sense
Backup
software
Sandbox
Any tests
Ransomware
protection
1. Data Domain
- not changeable data (compliance) -> production copies
2. Air gap
- Bunker is completely hidden to the world
Dell - Internal Use - Confidential
22
of Y
Internal Use - Confidential
IT Infrastructure
Data Domain
Any backup�software
Backup
Recovery
SITE A
IT Infrastructure
Any backup�software
Backup
Recovery
SITE B
Disaster Recovery
1% data transfer
100% recovery
Data Domain
Air Gap
Cyber Bunker
Cyber
Recovery
Checking
ransomware
PLAN B – Secure data & Recovery
Compliance
No possibility to change data
Ransomware
protection
Secure
Historical
backups
Recovery
automation
Data Domain
Separation
from production
Management
and automation
Cyber
Sense
Backup
software
Sandbox
Any tests
Ransomware
protection
1. Data Domain
- not changeable data (compliance) -> production copies
2. Air gap
- Bunker is completely hidden to the world
3. Cyber Recovery
- Automation / self run of the bunker
Dell - Internal Use - Confidential
23
of Y
Internal Use - Confidential
What can we do �in Cyber Bunker?
© Copyright 2020 Dell Inc.
24
of 20
Internal Use - Confidential
Air Gap
Cyber Bunker
Cyber
Recovery
Checking
ransomware
PLAN B – Secure data & Recovery
Compliance
No possibility to change data
Secure
Historical
backups
Recovery
automation
Data Domain
Separation
from production
Management
and automation
Cyber
Sense
Backup
software
Sandbox
Any tests
We have data
after cyber attack
Dell - Internal Use - Confidential
25
of Y
Internal Use - Confidential
Air Gap
Cyber Bunker
Cyber
Recovery
Checking
ransomware
PLAN B – Secure data & Recovery
Compliance
No possibility to change data
Secure
Historical
backups
Recovery
automation
Data Domain
Separation
from production
Management
and automation
Cyber
Sense
Backup
software
Sandbox
Any tests
We have data
after cyber attack
Check data �if compromised
Dell - Internal Use - Confidential
26
of Y
Internal Use - Confidential
Air Gap
Cyber Bunker
Cyber
Recovery
Checking
ransomware
PLAN B – Secure data & Recovery
Compliance
No possibility to change data
Secure
Historical
backups
Recovery
automation
Data Domain
Separation
from production
Management
and automation
Cyber
Sense
Backup
software
Sandbox
Any tests
We have data
after cyber attack
Check data �if compromised
Restore
Dell - Internal Use - Confidential
27
of Y
Internal Use - Confidential
Air Gap
Cyber Bunker
Cyber
Recovery
Checking
ransomware
PLAN B – Secure data & Recovery
Compliance
No possibility to change data
Secure
Historical
backups
Recovery
automation
Data Domain
Separation
from production
Management
and automation
Cyber
Sense
Backup
software
Sandbox
Any tests
We have data
after cyber attack
Check data �if compromised
Restore
Tests
Dell - Internal Use - Confidential
28
of Y
Internal Use - Confidential
Air Gap
Cyber Bunker
Cyber
Recovery
Checking
ransomware
PLAN B – Secure data & Recovery
Compliance
No possibility to change data
Secure
Historical
backups
Recovery
automation
Data Domain
Separation
from production
Management
and automation
Cyber
Sense
Backup
software
Sandbox
Any tests
We have data
after cyber attack
Check data �if compromised
Restore
Tests
…
Dell - Internal Use - Confidential
29
of Y
Internal Use - Confidential
Recovery architecture
© Copyright 2020 Dell Inc.
30
of 20
Internal Use - Confidential
IT Infrastructure
Backup
Recovery
SITE A
Air Gap
Cyber Bunker
Cyber
Recovery
Checking
ransomware
Recovery
automation
Management
and automation
Cyber
Sense
Backup
software
Sandbox
Any tests
Backup
Server
Dell - Internal Use - Confidential
31
of Y
Internal Use - Confidential
IT Infrastructure
Backup
Recovery
SITE A
Air Gap
Cyber Bunker
Cyber
Recovery
Checking
ransomware
Recovery
automation
Management
and automation
Cyber
Sense
Backup
software
Sandbox
Any tests
Logical
Data Domain
(mtree)
Logical
Data Domain
(mtree)
Backup
Server
Replication
on Data Domain level
No one knows that �we have Cyber Bunker
Dell - Internal Use - Confidential
32
of Y
Internal Use - Confidential
IT Infrastructure
Backup
Recovery
SITE A
Air Gap
Cyber Bunker
Cyber
Recovery
Checking
ransomware
Recovery
automation
Management
and automation
Cyber
Sense
Backup
software
Sandbox
Any tests
Production copy 4.02 15:00
Backup
Server
Production copy 4.02 15:00
Production copy 4.02 15:00
Production copy 4.02 16:00
Production copy 4.02 16:00
We have a lot of snapshots (copies) of production. We can have many snapshots of the same moment with or without compliance
Dell - Internal Use - Confidential
33
of Y
Internal Use - Confidential
IT Infrastructure
Backup
Recovery
SITE A
Air Gap
Cyber Bunker
Cyber
Recovery
Checking
ransomware
Recovery
automation
Management
and automation
Cyber
Sense
Backup
software
Sandbox
Any tests
Production copy 4.02 15:00
Backup
Server
Production copy 4.02 15:00
Production copy 4.02 15:00
Production copy 4.02 16:00
Production copy 4.02 16:00
One of the copies we can connect to Backup Server in that Cyber Bunker and automatically have access to all our data
Dell - Internal Use - Confidential
34
of Y
Internal Use - Confidential
IT Infrastructure
SITE A
Air Gap
Cyber Bunker
Cyber
Recovery
Checking
ransomware
Recovery
automation
Management
and automation
Cyber
Sense
Backup
software
Sandbox
Any tests
Logical
Data Domain
(mtree)
Logical
Data Domain
(mtree)
No one knows that �we have Cyber Bunker
PostgreSQL
dumps
Replication
on Data Domain level
Dell - Internal Use - Confidential
35
of Y
Internal Use - Confidential
IT Infrastructure
Backup
Recovery
SITE A
Air Gap
Cyber Bunker
Cyber
Recovery
Checking
ransomware
Recovery
automation
Management
and automation
Cyber
Sense
Backup
software
Sandbox
Any tests
Production copy 4.02 15:00
Production copy 4.02 15:00
Production copy 4.02 15:00
Production copy 4.02 16:00
Production copy 4.02 16:00
We have a lot of snapshots (copies) of PostrgeSQL environment. We can have many snapshots of the same moment with or without compliance
PostgreSQL
dumps
Dell - Internal Use - Confidential
36
of Y
Internal Use - Confidential
IT Infrastructure
Backup
Recovery
SITE A
Air Gap
Cyber Bunker
Cyber
Recovery
Checking
ransomware
Recovery
automation
Management
and automation
Cyber
Sense
Backup
software
Sandbox
Any tests
Production copy 4.02 15:00
Production copy 4.02 15:00
Production copy 4.02 15:00
Production copy 4.02 16:00
Production copy 4.02 16:00
One of the copies we can connect to Sandbox and tes / recover / …
PostgreSQL
dumps
Dell - Internal Use - Confidential
37
of Y
Internal Use - Confidential
Best practices
© Copyright 2020 Dell Inc.
38
of 20
Internal Use - Confidential
Air Gap
Cyber Bunker
Cyber
Recovery
Checking
ransomware
PLAN B – Secure data & Recovery
Compliance
No possibility to change data
Secure
Historical
backups
Recovery
automation
Data Domain
Separation
from production
Management
and automation
Cyber
Sense
Backup
software
Sandbox
Any tests
Data in the bunker not possible to change�As stones
Range of data sent to bunker:�at least production data
Dell - Internal Use - Confidential
39
of Y
Internal Use - Confidential
Air Gap
Cyber Bunker
Cyber
Recovery
Checking
ransomware
PLAN B – Secure data & Recovery
Compliance
No possibility to change data
Secure
Historical
backups
Recovery
automation
Data Domain
Separation
from production
Management
and automation
Cyber
Sense
Backup
software
Sandbox
Any tests
The frequency of sending data to bunker�At least once per day
Retention in the bunker – 1 to 6 months�Longer than time required to detect attack
Dell - Internal Use - Confidential
40
of Y
Internal Use - Confidential
Air Gap
Cyber Bunker
Cyber
Recovery
Checking
ransomware
PLAN B – Secure data & Recovery
Compliance
No possibility to change data
Secure
Historical
backups
Recovery
automation
Data Domain
Separation
from production
Management
and automation
Cyber
Sense
Backup
software
Sandbox
Any tests
Ensure bunker is fully automated
Dell - Internal Use - Confidential
41
of Y
Internal Use - Confidential
Cost
© Copyright 2020 Dell Inc.
42
of 20
Internal Use - Confidential
IT Infrastructure
Backup
Recovery
SITE A
Air Gap
Cyber Bunker
Cyber
Recovery
Checking
ransomware
Recovery
automation
Management
and automation
Cyber
Sense
Backup
software
Sandbox
Any tests
Logical
Data Domain
(mtree)
Logical
Data Domain
(mtree)
Backup
Server
Replication
on Data Domain level
Dell - Internal Use - Confidential
43
of Y
Internal Use - Confidential
Next step
© Copyright 2020 Dell Inc.
44
of 20
Internal Use - Confidential
Try yourself!
© Copyright 2020 Dell Inc.
45
of 20
Internal Use - Confidential
Materials
© Copyright 2020 Dell Inc.
46
of 20
Internal Use - Confidential
Links public
© Copyright 2020 Dell Inc.
47
of 20
Internal Use - Confidential
Materiały
© Copyright 2020 Dell Inc.
48
of 20
Internal Use - Confidential
Links public
© Copyright 2020 Dell Inc.
49
of 20
Internal Use - Confidential
Links public
© Copyright 2020 Dell Inc.
50
of 20
Internal Use - Confidential
Links public
© Copyright 2020 Dell Inc.
51
of 20
Internal Use - Confidential
Links public
© Copyright 2020 Dell Inc.
52
of 20
Internal Use - Confidential
DD6400
© Copyright 2020 Dell Inc.
53
of 20
Internal Use - Confidential
Links public
© Copyright 2020 Dell Inc.
54
of 20
Internal Use - Confidential
Links public
© Copyright 2020 Dell Inc.
55
of 20
Internal Use - Confidential
Daniel.Olkowski@dell.com
Questions
© Copyright 2020 Dell Inc.
56
of 20
Internal Use - Confidential