Eb Modern Data Protection For DB
Eb Modern Data Protection For DB
12 Managing Recoveries
16 Key Takeaways
Rubrik is a cybersecurity company, and our mission is to secure the world’s data. We pioneered Zero Trust Data Security™ to help
organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud,
powered by machine learning, secures data across enterprise, cloud, and SaaS applications. We help organizations uphold data integrity,
deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with
their data when infrastructure is attacked.
Organizations depend on the data in their databases for some of their most foundational
operations. Budgeting, inventory tracking, order fulfillment, maintenance, and more all depend
on databases to function.
Because this information is so essential, an organization can’t afford to be without its database
data for even brief periods of time.
Backups are the last—and best—line of defense aimed at keeping data safe and available to
the people who need it. However, sophisticated cybercriminals have caught on to this fact and
now target backups, so they can’t be used to recover data.
Some of the greatest minds in cybersecurity have helped make significant strides in
infrastructure and perimeter security, and those technologies do amazingly well at stopping
the vast majority of cyberattacks. But they’re not foolproof.
Evolving Risks
Cybercriminals have also made significant advances in their technologies and attack
methods, often preying on individual users’ curiosity and base desires to get access to an
organization’s systems. And all it takes is one mistake for an attack to succeed.
Recent data demonstrates just how vulnerable organizations still are despite heavy
investments in infrastructure and perimeter security. A recent Rubrik Zero Labs report based
on a survey of more than 1,600 IT and security leaders revealed that 92 percent of them are
concerned they wouldn’t be able to maintain business continuity in the event of a cyberattack.
They also believe that one-third of boards have little to no confidence in their organization’s
ability to recover critical data and business applications in the event of a cyberattack.1
1 “The State of Data Security by Rubrik Zero Labs,” Rubrik, accessed December 13, 2022, https://www.rubrik.com/zero-labs.
However, these protection tasks are often managed by multiple people across multiple
teams. And because these teams all use separate tools to do their work and track their
progress, they often struggle to work together to achieve their protection, backup, and
recovery goals.
Couple the number and type of databases in an organization with the number of people
and tools used to protect them, and something is bound to go wrong. And it often does.
Databases get left unprotected or not backed up as often as they should be—all of which
can put an organization out of compliance and result in fines. Or worse, in the event of a
cyberattack, natural disaster, or operational failure, it can leave an organization without the
data it needs to keep operations running.
2 “Open Source Data Management Software,” Percona, accessed December 13, 2022, https://www.percona.com/open-source-data-
management-software-survey.
This guide explores what Zero Trust Data Security for databases entails and examines the
difference between Zero Trust Data Security and legacy approaches to database protection.
Legacy
Because cybercriminals have evolved their attack strategies to include backups,
organizations’ backup strategies and methods also need to evolve.
The legacy protection solutions that organizations generally use today consist of loosely
coupled backup hardware, software, and secondary storage systems—offering a large
attack surface for cybercriminals to exploit. Over the years, cybercriminals have gotten
more sophisticated in their ability to find weaknesses, making it even more important for
organizations to limit their attack surfaces.3
The volume and diversity of the databases these systems protect has also mushroomed,
creating a corresponding increase in the amount of work teams need to put in to keep
databases secure.
3 Katie Terrell Hanna, “What Is an Attack Surface and How to Protect It?,” WhatIs.com (TechTarget, September 24,
2021), https://www.techtarget.com/whatis/definition/attack-surface.
With a Zero Trust Data Security solution, still connected to a network, but
and managing backups, replication, and including encryption, hashing, and role-
backups, so it’s extremely difficult—if not that the owner always has access to a
database backups.
Role-based access-controlled
By using Zero Trust Data Security principles backups are only accessible to the
will have a clean backup of their data readily absolutely need access to do their
4 “What Is an Air Gap and Why Is It Important?,” Rubrik, accessed December 13, 2022, https://www.rubrik.com/insights/what-is-an-air-
gap-and-why-is-it-important.
5 “What Is Immutable Data Backup?,” Rubrik, accessed December 13, 2022, https://www.rubrik.com/insights/what-is-immutable-
data-backup.
Legacy
Adding a new database to the backup schedule using legacy data protection is a multi-step,
manual process. Each new backup job has to be created using native scripting, which not only
requires writing the script (or modifying an existing one), but also installing it on the server and
scheduling it to run—for instance, using cron on Linux or the SQL Server Agent job scheduler.
Skilled backup administrators can do these tasks with relative ease when they only have a few
database instances to take care of. But any more than that, and things can quickly get out of
hand—not only in terms of volume but also in the variety of databases, locations, and control
planes in play.
To further complicate matters, backup administrators often do their work using separate
processes and tools than DBAs. This division of labor helps each role make the best use of
their skills during the backup process. But it closes off an important line of sight for DBAs, who
need to work closely and quickly with backup administrators during recovery scenarios.
All these steps are time consuming, but the complexity also leaves the door open for errors
that could result in:
At best, these mistakes can cost organizations untold hours of lost productivity. At worst,
an overlooked yet critical database could be hit with ransomware and bring basic business
operations to a halt.
When organizations use legacy backup processes with a variety of scripts and schedules
deployed to different servers, there’s no central repository that shows all the backups and
their statuses or throws up an alert when something goes wrong.
In traditional database environments, visibility into what’s going on in the data protection
domain is largely restricted to DBAs. Managers only know what DBAs tell them or what they
can find out from spreadsheets and sporadic reports.
Zero Trust
Database protection solutions based on Zero Trust Data Security principles use SLA policy
engines to automate the manual tasks associated with database protection. Once the software
knows which servers run databases, it automatically discovers new instances, assesses
their unique characteristics, and protects them using previously established custom policies,
eliminating the need for error-prone and time-consuming manual scripting and scheduling.
Zero Trust Data Security-based solutions also create and execute optimized backup
schedules based on an organization’s operational constraints to prevent the risk of too
many jobs running at once and causing problems.
With centralized dashboards and reports, managers can see what’s happening firsthand,
organizations can better show how they’re satisfying compliance requirements, and teams
can easily identify and correct any problems before a crisis occurs.
A Zero Trust Data Security solution also makes verifying recoverability a much lighter weight
activity. It can be as simple as quickly mounting an existing backup and verifying that it’s
readable—no additional storage required. Plus, with full APIs, important verification tasks can
be automated to ensure they don’t get overlooked.
With the visibility provided by a Zero Trust Data Security solution, everyone can sleep better
knowing that critical databases are protected according to predetermined requirements.
Teams not only save hours upon hours of time manually scripting, negotiating, and
troubleshooting, they also sidestep possible errors that can lead to catastrophic outcomes
and keep various teams updated on backup status and recoverability.
Legacy
Anytime a database goes down, it’s an emergency. DBAs and backup administrators need to
work together swiftly to get the database working again as soon as possible. Unfortunately,
restoring databases using legacy processes and solutions can be just as, if not more, time
consuming than backing them up.
Oftentimes legacy recovery methods force DBAs to recover entire workloads even if only
specific datasets actually need to be recovered. Because legacy recovery tools can’t recover
just the data that’s needed, the DBA, and the organization, loses valuable time copying over
data that might not need to be recovered.
These factors combined can lead to missed recovery time objectives (RTOs) and more serious
consequences, such as potential lost revenue for the organization.
Given the critical nature of database applications, DBAs often leverage other tools ahead of
backups to ensure high availability. They also test their restore processes regularly to make
sure everything goes according to plan. But should a DBA be faced with a scenario where they
need to use a backup, these hurdles can exacerbate a crisis.
In order to create these copies, DBAs using legacy solutions have to go through all the steps
and cross-team negotiations that they would do if they were doing a traditional restore.
Because the DBA has to make a full copy of the database, storage often becomes the limiting
factor in determining how many copies can be made, which affects the business if there is
significant demand for various database copies.
Plus, once the user no longer needs the copy, someone has to clean up that storage, and it
may sit idle until it’s needed for the next project.
Organizations can also use APIs to automate the fulfillment of requests for database clones
and refreshes. The user would simply request what they need from a service catalog and the
API would help create it immediately instead of waiting for a DBA to personally respond to
their request.
Zero Trust Data Security backup and recovery capabilities protect an organization’s
entire database operation—potentially including thousands of database instances—from
cyberattacks, while simplifying data management and compliance and giving precious time
back to DBAs and backup administrators.
Rubrik for Databases delivers Zero Trust Data Security, ensures your critical databases—
and all your data—are protected from cyberattacks, and gives you the ability to quickly and
surgically recover data.
Rubrik for Databases enables you to protect mission-critical databases across on-premises
and cloud from cyber threats, while unifying backup, replication, archival, and recovery into a
single converged software platform.
With Rubrik for Databases, you’ll be able to take immediate advantage of advanced
features, including:
To find out how Rubrik can help you enhance data protection for your database environment
and increase the productivity of your entire team, visit rubrik.com