1 of 56

Recovery in the Bunker

Ransomware/hacker recovery

Daniel.Olkowski@dell.com

The most fresh ppt version of this document, you will find at:�http://backuprecoveryguy.blogspot.com/2022/07/backup-and-recovery-materials.html

Video covering Cyber Recovery:�https://youtu.be/jtgm2WHpFPk

© Copyright 2020 Dell Inc.

1

of 20

Internal Use - Confidential

2 of 56

Recovery in the Bunker

Ransomware/hacker recovery

Daniel.Olkowski@dell.com

© Copyright 2020 Dell Inc.

2

of 20

Internal Use - Confidential

3 of 56

Agenda

  • Introduction
  • Why Cyber Bunker?
  • What is Cyber Bunker?
    • Components
  • What can we do in Cyber Bunker?
  • Recovery architecture
  • Costs

© Copyright 2020 Dell Inc.

3

of 20

Internal Use - Confidential

4 of 56

Introduction

© Copyright 2020 Dell Inc.

4

of 20

Internal Use - Confidential

5 of 56

Cyber Bunker – why is important?

Castle strategy

© Copyright 2020 Dell Inc.

5

Internal Use - Confidential

6 of 56

Cyber Bunker – why is important?

Castle strategy

Real time

protection

© Copyright 2020 Dell Inc.

6

Internal Use - Confidential

7 of 56

Cyber Bunker – why is important?

Ambulance strategy

© Copyright 2020 Dell Inc.

7

Internal Use - Confidential

8 of 56

Cyber Bunker – why is important?

Ambulance strategy

Cyber Bunker

© Copyright 2020 Dell Inc.

8

Internal Use - Confidential

9 of 56

Why Cyber Bunker?

© Copyright 2020 Dell Inc.

9

of 20

Internal Use - Confidential

10 of 56

Cyber Bunker answers for the following questions:

  • What if I am encrypted?
  • Am I being encrypted?
  • Who encrypts me?
  • How to stop being encrypted?
  • Which copy to use to recover?
  • How to recover?

© Copyright 2020 Dell Inc.

10

Internal Use - Confidential

11 of 56

Cyber Bunker answers for the following questions:

  • What if I am encrypted?
  • Am I being encrypted?
  • Who encrypts me?
  • How to stop being encrypted?
  • Which copy to use to recover?
  • How to recover?

© Copyright 2020 Dell Inc.

11

Internal Use - Confidential

12 of 56

Cyber Bunker answers for the following questions:

  • What if I am encrypted?
  • Am I being encrypted?
  • Who encrypts me?
  • How to stop being encrypted?
  • Which copy to use to recover?
  • How to recover?

Do you have a plan in case your data was encrypted �by ransomware / hacker attack?

© Copyright 2020 Dell Inc.

12

Internal Use - Confidential

13 of 56

What does Cyber Bunker offer?

  • Guaranted recovery after ransomware/hacker attack
  • Detection of attack
  • Procedure for recovery
  • Tests

© Copyright 2020 Dell Inc.

13

Internal Use - Confidential

14 of 56

Gartner about �Cyber Bunker

© Copyright 2020 Dell Inc.

14

of 20

Internal Use - Confidential

15 of 56

What does Cyber Bunker offer?

  • Isolated recovery environments (IREs) with immutable data vaults (IDVs) provide the highest level of security

© Copyright 2020 Dell Inc.

15

Internal Use - Confidential

16 of 56

What is Cyber Bunker?�Componentes

© Copyright 2020 Dell Inc.

16

of 20

Internal Use - Confidential

17 of 56

Cyber Recovery Requirements

Isolation

Physical & logical �separation of data

Immutability

Preserve original �integrity of data

Modern threats require modern solutions

Intelligence 

ML & analytics �identify threats

© Copyright 2021 Dell Inc.

17

of Y

18 of 56

Cyber Bunker

A complete solution that allows recovery �after hacker/ransomware attack.

Isolated from production, with any frequency�Cyber Bunker keeps historical snapshots of all data �with no possibility to remove, change, encrypt by ransomware/hacker.

All the operations in Cyber Bunker - grabbing data, compliance protection, checking against virus, recovery – are fully automated.

Be safe!

Dell - Internal Use - Confidential

18

of Y

Internal Use - Confidential

19 of 56

IT Infrastructure

Any backup�software

Backup

Recovery

SITE A

IT Infrastructure

Any backup�software

SITE B

Disaster Recovery

1% data transfer

100% recovery

Data Domain

Air Gap

Cyber Bunker

Cyber

Recovery

Checking

ransomware

PLAN B – Secure data & Recovery

Compliance

No possibility to change data

Ransomware

protection

Secure

Historical

backups

Recovery

automation

Data Domain

Separation

from production

Cyber

Sense

Backup

software

Sandbox

Any tests

Ransomware

protection

Management

and automation

Data Domain

Dell - Internal Use - Confidential

19

of Y

Internal Use - Confidential

20 of 56

Is is it real?

Dell - Internal Use - Confidential

20

of Y

Internal Use - Confidential

21 of 56

IT Infrastructure

Data Domain

Any backup�software

Backup

Recovery

SITE A

IT Infrastructure

Any backup�software

Backup

Recovery

SITE B

Disaster Recovery

1% data transfer

100% recovery

Data Domain

Air Gap

Cyber Bunker

Cyber

Recovery

Checking

ransomware

PLAN B – Secure data & Recovery

Compliance

No possibility to change data

Ransomware

protection

Secure

Historical

backups

Recovery

automation

Data Domain

Separation

from production

Management

and automation

Cyber

Sense

Backup

software

Sandbox

Any tests

Ransomware

protection

1. Data Domain

- not changeable data (compliance) -> production copies

Dell - Internal Use - Confidential

21

of Y

Internal Use - Confidential

22 of 56

IT Infrastructure

Data Domain

Any backup�software

Backup

Recovery

SITE A

IT Infrastructure

Any backup�software

Backup

Recovery

SITE B

Disaster Recovery

1% data transfer

100% recovery

Data Domain

Air Gap

Cyber Bunker

Cyber

Recovery

Checking

ransomware

PLAN B – Secure data & Recovery

Compliance

No possibility to change data

Ransomware

protection

Secure

Historical

backups

Recovery

automation

Data Domain

Separation

from production

Management

and automation

Cyber

Sense

Backup

software

Sandbox

Any tests

Ransomware

protection

1. Data Domain

- not changeable data (compliance) -> production copies

2. Air gap

- Bunker is completely hidden to the world

Dell - Internal Use - Confidential

22

of Y

Internal Use - Confidential

23 of 56

IT Infrastructure

Data Domain

Any backup�software

Backup

Recovery

SITE A

IT Infrastructure

Any backup�software

Backup

Recovery

SITE B

Disaster Recovery

1% data transfer

100% recovery

Data Domain

Air Gap

Cyber Bunker

Cyber

Recovery

Checking

ransomware

PLAN B – Secure data & Recovery

Compliance

No possibility to change data

Ransomware

protection

Secure

Historical

backups

Recovery

automation

Data Domain

Separation

from production

Management

and automation

Cyber

Sense

Backup

software

Sandbox

Any tests

Ransomware

protection

1. Data Domain

- not changeable data (compliance) -> production copies

2. Air gap

- Bunker is completely hidden to the world

3. Cyber Recovery

- Automation / self run of the bunker

Dell - Internal Use - Confidential

23

of Y

Internal Use - Confidential

24 of 56

What can we do �in Cyber Bunker?

© Copyright 2020 Dell Inc.

24

of 20

Internal Use - Confidential

25 of 56

Air Gap

Cyber Bunker

Cyber

Recovery

Checking

ransomware

PLAN B – Secure data & Recovery

Compliance

No possibility to change data

Secure

Historical

backups

Recovery

automation

Data Domain

Separation

from production

Management

and automation

Cyber

Sense

Backup

software

Sandbox

Any tests

We have data

after cyber attack

Dell - Internal Use - Confidential

25

of Y

Internal Use - Confidential

26 of 56

Air Gap

Cyber Bunker

Cyber

Recovery

Checking

ransomware

PLAN B – Secure data & Recovery

Compliance

No possibility to change data

Secure

Historical

backups

Recovery

automation

Data Domain

Separation

from production

Management

and automation

Cyber

Sense

Backup

software

Sandbox

Any tests

We have data

after cyber attack

Check data �if compromised

Dell - Internal Use - Confidential

26

of Y

Internal Use - Confidential

27 of 56

Air Gap

Cyber Bunker

Cyber

Recovery

Checking

ransomware

PLAN B – Secure data & Recovery

Compliance

No possibility to change data

Secure

Historical

backups

Recovery

automation

Data Domain

Separation

from production

Management

and automation

Cyber

Sense

Backup

software

Sandbox

Any tests

We have data

after cyber attack

Check data �if compromised

Restore

Dell - Internal Use - Confidential

27

of Y

Internal Use - Confidential

28 of 56

Air Gap

Cyber Bunker

Cyber

Recovery

Checking

ransomware

PLAN B – Secure data & Recovery

Compliance

No possibility to change data

Secure

Historical

backups

Recovery

automation

Data Domain

Separation

from production

Management

and automation

Cyber

Sense

Backup

software

Sandbox

Any tests

We have data

after cyber attack

Check data �if compromised

Restore

Tests

Dell - Internal Use - Confidential

28

of Y

Internal Use - Confidential

29 of 56

Air Gap

Cyber Bunker

Cyber

Recovery

Checking

ransomware

PLAN B – Secure data & Recovery

Compliance

No possibility to change data

Secure

Historical

backups

Recovery

automation

Data Domain

Separation

from production

Management

and automation

Cyber

Sense

Backup

software

Sandbox

Any tests

We have data

after cyber attack

Check data �if compromised

Restore

Tests

Dell - Internal Use - Confidential

29

of Y

Internal Use - Confidential

30 of 56

Recovery architecture

© Copyright 2020 Dell Inc.

30

of 20

Internal Use - Confidential

31 of 56

IT Infrastructure

Backup

Recovery

SITE A

Air Gap

Cyber Bunker

Cyber

Recovery

Checking

ransomware

Recovery

automation

Management

and automation

Cyber

Sense

Backup

software

Sandbox

Any tests

Backup

Server

Dell - Internal Use - Confidential

31

of Y

Internal Use - Confidential

32 of 56

IT Infrastructure

Backup

Recovery

SITE A

Air Gap

Cyber Bunker

Cyber

Recovery

Checking

ransomware

Recovery

automation

Management

and automation

Cyber

Sense

Backup

software

Sandbox

Any tests

Logical

Data Domain

(mtree)

Logical

Data Domain

(mtree)

Backup

Server

Replication

on Data Domain level

No one knows that �we have Cyber Bunker

Dell - Internal Use - Confidential

32

of Y

Internal Use - Confidential

33 of 56

IT Infrastructure

Backup

Recovery

SITE A

Air Gap

Cyber Bunker

Cyber

Recovery

Checking

ransomware

Recovery

automation

Management

and automation

Cyber

Sense

Backup

software

Sandbox

Any tests

Production copy 4.02 15:00

Backup

Server

Production copy 4.02 15:00

Production copy 4.02 15:00

Production copy 4.02 16:00

Production copy 4.02 16:00

We have a lot of snapshots (copies) of production. We can have many snapshots of the same moment with or without compliance

Dell - Internal Use - Confidential

33

of Y

Internal Use - Confidential

34 of 56

IT Infrastructure

Backup

Recovery

SITE A

Air Gap

Cyber Bunker

Cyber

Recovery

Checking

ransomware

Recovery

automation

Management

and automation

Cyber

Sense

Backup

software

Sandbox

Any tests

Production copy 4.02 15:00

Backup

Server

Production copy 4.02 15:00

Production copy 4.02 15:00

Production copy 4.02 16:00

Production copy 4.02 16:00

One of the copies we can connect to Backup Server in that Cyber Bunker and automatically have access to all our data

Dell - Internal Use - Confidential

34

of Y

Internal Use - Confidential

35 of 56

IT Infrastructure

SITE A

Air Gap

Cyber Bunker

Cyber

Recovery

Checking

ransomware

Recovery

automation

Management

and automation

Cyber

Sense

Backup

software

Sandbox

Any tests

Logical

Data Domain

(mtree)

Logical

Data Domain

(mtree)

No one knows that �we have Cyber Bunker

PostgreSQL

dumps

Replication

on Data Domain level

Dell - Internal Use - Confidential

35

of Y

Internal Use - Confidential

36 of 56

IT Infrastructure

Backup

Recovery

SITE A

Air Gap

Cyber Bunker

Cyber

Recovery

Checking

ransomware

Recovery

automation

Management

and automation

Cyber

Sense

Backup

software

Sandbox

Any tests

Production copy 4.02 15:00

Production copy 4.02 15:00

Production copy 4.02 15:00

Production copy 4.02 16:00

Production copy 4.02 16:00

We have a lot of snapshots (copies) of PostrgeSQL environment. We can have many snapshots of the same moment with or without compliance

PostgreSQL

dumps

Dell - Internal Use - Confidential

36

of Y

Internal Use - Confidential

37 of 56

IT Infrastructure

Backup

Recovery

SITE A

Air Gap

Cyber Bunker

Cyber

Recovery

Checking

ransomware

Recovery

automation

Management

and automation

Cyber

Sense

Backup

software

Sandbox

Any tests

Production copy 4.02 15:00

Production copy 4.02 15:00

Production copy 4.02 15:00

Production copy 4.02 16:00

Production copy 4.02 16:00

One of the copies we can connect to Sandbox and tes / recover / …

PostgreSQL

dumps

Dell - Internal Use - Confidential

37

of Y

Internal Use - Confidential

38 of 56

Best practices

© Copyright 2020 Dell Inc.

38

of 20

Internal Use - Confidential

39 of 56

Air Gap

Cyber Bunker

Cyber

Recovery

Checking

ransomware

PLAN B – Secure data & Recovery

Compliance

No possibility to change data

Secure

Historical

backups

Recovery

automation

Data Domain

Separation

from production

Management

and automation

Cyber

Sense

Backup

software

Sandbox

Any tests

Data in the bunker not possible to change�As stones

Range of data sent to bunker:�at least production data

Dell - Internal Use - Confidential

39

of Y

Internal Use - Confidential

40 of 56

Air Gap

Cyber Bunker

Cyber

Recovery

Checking

ransomware

PLAN B – Secure data & Recovery

Compliance

No possibility to change data

Secure

Historical

backups

Recovery

automation

Data Domain

Separation

from production

Management

and automation

Cyber

Sense

Backup

software

Sandbox

Any tests

The frequency of sending data to bunker�At least once per day

Retention in the bunker – 1 to 6 months�Longer than time required to detect attack

Dell - Internal Use - Confidential

40

of Y

Internal Use - Confidential

41 of 56

Air Gap

Cyber Bunker

Cyber

Recovery

Checking

ransomware

PLAN B – Secure data & Recovery

Compliance

No possibility to change data

Secure

Historical

backups

Recovery

automation

Data Domain

Separation

from production

Management

and automation

Cyber

Sense

Backup

software

Sandbox

Any tests

Ensure bunker is fully automated

Dell - Internal Use - Confidential

41

of Y

Internal Use - Confidential

42 of 56

Cost

© Copyright 2020 Dell Inc.

42

of 20

Internal Use - Confidential

43 of 56

IT Infrastructure

Backup

Recovery

SITE A

Air Gap

Cyber Bunker

Cyber

Recovery

Checking

ransomware

Recovery

automation

Management

and automation

Cyber

Sense

Backup

software

Sandbox

Any tests

Logical

Data Domain

(mtree)

Logical

Data Domain

(mtree)

Backup

Server

Replication

on Data Domain level

Dell - Internal Use - Confidential

43

of Y

Internal Use - Confidential

44 of 56

Next step

© Copyright 2020 Dell Inc.

44

of 20

Internal Use - Confidential

45 of 56

Try yourself!

  • https://democenter.dell.com/
  • Let me encourage you
  • Everything configured
  • Guide
  • Tests
  • Destroying
  • Trying…

© Copyright 2020 Dell Inc.

45

of 20

Internal Use - Confidential

46 of 56

Materials

© Copyright 2020 Dell Inc.

46

of 20

Internal Use - Confidential

47 of 56

Links public

© Copyright 2020 Dell Inc.

47

of 20

Internal Use - Confidential

48 of 56

Materiały

© Copyright 2020 Dell Inc.

48

of 20

Internal Use - Confidential

49 of 56

Links public

© Copyright 2020 Dell Inc.

49

of 20

Internal Use - Confidential

50 of 56

Links public

© Copyright 2020 Dell Inc.

50

of 20

Internal Use - Confidential

51 of 56

Links public

  • Performance in backup – public video: https://youtu.be/05fFtGH7YCQ

© Copyright 2020 Dell Inc.

51

of 20

Internal Use - Confidential

52 of 56

Links public

© Copyright 2020 Dell Inc.

52

of 20

Internal Use - Confidential

53 of 56

DD6400

© Copyright 2020 Dell Inc.

53

of 20

Internal Use - Confidential

54 of 56

Links public

© Copyright 2020 Dell Inc.

54

of 20

Internal Use - Confidential

55 of 56

Links public

© Copyright 2020 Dell Inc.

55

of 20

Internal Use - Confidential

56 of 56

Daniel.Olkowski@dell.com

Questions

© Copyright 2020 Dell Inc.

56

of 20

Internal Use - Confidential