Top Considerations For Implementing Secure Backup and Recovery
Top Considerations For Implementing Secure Backup and Recovery
465 S. Mathilda Ave., Suite 300 • Sunnyvale, CA 94086 • t: 1-888-496-2632 • email: [email protected] www.zmanda.com
A similar concern exists in the opposite direction. Is your backup server providing
data for recovery to the appropriate system? Or is someone forcing a system to
masquerade as a backup client?
465 S. Mathilda Ave., Suite 300 • Sunnyvale, CA 94086 • t: 1-888-496-2632 • email: [email protected] www.zmanda.com
Amanda Enterprise encryption program is gpg.
Of course, without good key management the data cannot be recovered. Amanda
Enterprise does not provide a key management solution on its own but rather
works with any key management solution mandated by your IT policy.
The openness and flexibility of encryption options allows Amanda Enterprise to fit
well into security policies and processes of most IT environments including
organizations with strict security requirements.
465 S. Mathilda Ave., Suite 300 • Sunnyvale, CA 94086 • t: 1-888-496-2632 • email: [email protected] www.zmanda.com
A consideration about this approach is the number of ports the backup software
requires. Your backup software should not use too many ports, since it is difficult
enough to get one or two ports opened up in your firewall. Some commercially
available closed-source backup products use dozens of ports per backup server.
Amanda has the ability to use a few administrator-defined ports for the backup
server and client to communicate with. This ability makes it well-suited to backup
through a firewall.
465 S. Mathilda Ave., Suite 300 • Sunnyvale, CA 94086 • t: 1-888-496-2632 • email: [email protected] www.zmanda.com
open source product. Even if such a back door were included, it would mostly
likely be quickly found and removed.
Additionally, open source software can be easily inspected for both quality and
security. There are both commercial and freely available open source tools for
analyzing software code for security vulnerabilities. Some of these are:
• Rough Auditing Tool for Security (RATS)
• ITS4 by Cigital
• Flawfinder by David A. Wheeler
These tools are freely available, and able to scan a variety of programming
languages. Bogosec (http://bogosec.sourceforge.net/index.html) is a wrapper
around these tools, and can predict security concerns in software. However,
without available source code for backup software, these tools are useless.
When it comes to information security these are very real concerns for any
backup package. When selecting a backup package you have to make sure there
are no known security flaws in the software. Amanda, the leading open source
backup package, has been tested with a variety of tools and by several
organizations. For example, Coverity (http://scan.coverity.com), a collaborative
effort between Stanford University and the open source community, tested
Amanda code quality. When bugs were discovered the Amanda community
quickly corrected them and reduced the count to zero. This compares to an
average defect rate of 20 to 30 bugs per 1000 lines of code for commercial
software, according to Carnegie Mellon University's CyLab Sustainable
Computing Consortium.
465 S. Mathilda Ave., Suite 300 • Sunnyvale, CA 94086 • t: 1-888-496-2632 • email: [email protected] www.zmanda.com
Backup Security Checklist
Yes No
Is there a strong authentication of backup server and
backup clients?
Is there encryption on a client for securing data in
transit?
Is there encryption on a backup server for securing
data on a backup media, e.g. tape?
Can you choose between different encryption methods
and take advantage of new encryption algorithms?
Is there role-based access control for administration,
backup and recovery?
Can you open just a few ports (ideally only one port)
for backup through a firewall?
Is there support for SELinux?
Did you verify security of backup software
configuration files that store passwords for file-,
database- and application servers?
Did you verify that US-CERT has no alerts about your
backup software?
Are there independent reports about quality and
security of code for your backup software?
465 S. Mathilda Ave., Suite 300 • Sunnyvale, CA 94086 • t: 1-888-496-2632 • email: [email protected] www.zmanda.com
Conclusion
Since your backup is a copy of your most valuable digital assets, backup security
is a critical consideration. Implementing truly secure yet financially viable backup
policies requires a thorough understanding of the associated trade-offs. However,
any organization can find a reasonable compromise to establish secure backup
policies that it can afford. The important thing to remember is that backup security
is not a project, but a process that requires constant monitoring and
improvement.
Now that you understand these concepts, we invite you to try Amanda Enterprise.
Contact [email protected] to request a demo.
465 S. Mathilda Ave., Suite 300 • Sunnyvale, CA 94086 • t: 1-888-496-2632 • email: [email protected] www.zmanda.com