Building Cyber Resilient Data Recovery Strategy
Building Cyber Resilient Data Recovery Strategy
resilient Data
Recovery Strategy
Building a Cyber-Resilient Data Recovery Strategy
Table of contents
Introduction 4
Sidebar: Exfiltration 15
© 2024 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 04242024
Building a Cyber-Resilient Data Recovery Strategy
Conclusion 20
© 2024 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 04242024
Building a Cyber-Resilient Data Recovery Strategy
Introduction
In today’s digital-first world, cybersecurity is a fundamental necessity. It’s not surprising that every
cybersecurity blog or whitepaper you read today inevitably revolves around ransomware. It’s tiresome
to hear about (we know!) but ransomware has become the biggest threat to organizations of all sizes
and targets our most critical infrastructure and industry sectors. It’s a game of cat and mouse, and
as new threats emerge, security teams must adapt to keep up. The pervasive digitization of business
operations, government functions, and personal activities has exponentially increased the volume
of sensitive data that’s stored and transmitted online. This shift has unfortunately also broadened
the attack surface for cybercriminals, which makes robust cybersecurity measures essential.
Cyberthreats, ranging from data breaches and ransomware attacks to sophisticated state-sponsored
cyber espionage, pose significant risks to the integrity of critical infrastructure, the privacy of your
personal information, even and the stability of global economies. Therefore, data security should be
at the forefront of every organization’s strategy since the threat of cyberattacks, primarily ransomware,
is a clear and present danger. Unfortunately, 85% of organizations have had at least one ransomware
attack in 20221. What’s even more alarming is the fact that today’s ransomware attacks aren’t just
locking organizations out of their data, they’re exfiltrating, stealing, selling or archiving that data for
use in other extortion schemes.
Preventing malicious access to this data should be the top goal of any cybersecurity plan. However, no
organization should assume that their defenses will always hold. So, having the ability to recover your
data is equally important. Of organizations affected by ransomware, 15% of production data was lost
on average2 which highlights the importance of having a well-designed and reliable data recovery plan.
Effective cybersecurity practices protect against unauthorized access to data, ensure the continuity of
operations, and maintain the trust between consumers and service providers. As cyber threats evolve
in complexity and scale, the importance of cybersecurity in safeguarding digital assets, protecting
individual privacy, and preserving national security cannot be overstated. It is a critical pillar in the
architecture of our digital society and ensures that we can navigate, innovate, and communicate in
this realm with confidence.
The recent update to the NIST Cybersecurity Framework (CSF) 2.03 marks a pivotal evolution in he
standard approach to cybersecurity and reflects shifting paradigms in a world where digital threats
are increasingly complex and pervasive.
This paper explores the updated NIST CSF Framework and discusses places where Veeam Software
can assist with implementing this framework.
1
https://go.veeam.com/wp-data-protection-trends-2024
2
https://go.veeam.com/wp-data-protection-trends-2024
3
https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf
© 2024 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 04242024
Building a Cyber-Resilient Data Recovery Strategy
CSF 2.0 extends its reach beyond just critical infrastructure sectors; it has been revised to benefit all
organizations, regardless of size or type, which makes this guideline more universally applicable.
The core of the CSF is organized around six main functions and when considered together, these
features create an all-encompassing recommendation based on the cybersecurity risk life cycle.
© 2024 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 04242024
Building a Cyber-Resilient Data Recovery Strategy
To improve clarity and relevance, the five original functions — Identify, Protect, Detect, Respond, and
Recover — have been retained and updated to reflect evolving cybersecurity threats and practices,
thus ensuring that organizations can effectively manage and reduce their cybersecurity risks in
a dynamic digital environment. Governance-related elements have also been transferred to the newly
created “Govern” function. Furthermore, each function’s primary objectives are now more clearly
stated. By recognizing that these tasks are not sequential but rather interdependent parts of an all-
encompassing cybersecurity strategy, this restructuring seeks to enable a more cohesive and linked
approach to cybersecurity.
A focus on cybersecurity supply chain risk management is also now more pronounced, with new controls
aimed at integrating supply chain risk management throughout an organization’s cybersecurity program.
Users of this framework are now provided with implementation examples4 and quick-start guides5
that are tailored to their specific needs as well. This includes a searchable catalog of references6,
accessed via the reference tool, that enable organizations to map guidance to over 50 other relevant
cybersecurity documents.
4
https://www.nist.gov/document/csf-20-implementations-pdf
5
https://www.nist.gov/quick-start-guides
6
https://csrc.nist.gov/projects/olir/informative-reference-catalog#
© 2024 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 04242024
Building a Cyber-Resilient Data Recovery Strategy
2. The addition of the “Govern” function is a significant enhancement in CSF 2.0. This function
elevates the core objectives of accountability and transparency while serving as a unifying
force to help organizations prioritize and achieve the goals outlined in the other five functions.
It emphasizes the integration of cybersecurity into overall enterprise risk management, rather
than just treating it as a standalone concern. The oversight component of the “Govern” function
is particularly useful for organizations in complying with regulatory frameworks, such as SEC
regulations, which stress increased accountability for the Board of Directors and senior
management when making decisions related to cybersecurity.
3. A heightened focus on supply chain risk management. CSF 2.0 places a stronger emphasis on
managing cybersecurity risks in the supply chain. New controls have also been introduced to
integrate supply chain risk management throughout an organization’s cybersecurity program.
This acknowledges the importance of securing your entire ecosystem of partners, vendors,
and service providers.
These enhancements within NIST CSF 2.0 provide organizations with a more comprehensive and
adaptable framework to help them navigate the complex cybersecurity landscape. By expanding
scope, introducing the “Govern” function, updating core functions, and emphasizing supply chain risk
management, CSF 2.0 equips organizations with the tools and guidance they need to strengthen their
cybersecurity posture and build resilience in the face of evolving threats.
Users of this framework are now also provided with implementation examples7 and quick start guides8
that are tailored to their specific needs. This includes a searchable catalog of references9, accessed
via the reference tool, that enables organizations to map guidance to over 50 other relevant
cybersecurity documents.
7
https://www.nist.gov/document/csf-20-implementations-pdf
8
https://www.nist.gov/quick-start-guides
9
https://csrc.nist.gov/projects/olir/informative-reference-catalog#
© 2024 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 04242024
Building a Cyber-Resilient Data Recovery Strategy
Veeam customers can accomplish these in a secure, orchestrated, and well-documented way with
Veeam Data Platform. By using the full suite, including Veeam Backup & Replication, Veeam ONE,
and Veeam Recovery Orchestrator, customers can accomplish data security goals that align to all
stages of the NIST Cybersecurity Framework and go well beyond data backup and recovery.
© 2024 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 04242024
Building a Cyber-Resilient Data Recovery Strategy
Similarly, the network and security tools used by the security team can create a list of systems in your
environment. Comparing these various systems will often uncover where your data is not properly protected
within each of the tools, ensuring your protection and recovery plans will be as complete as possible.
Once metadata is applied, the wizard-driven recovery planning within Veeam Recovery Orchestrator can be
used to create the recovery plan, which reduces the time it takes to develop. This plan can then be reviewed
with the business as another check to ensure its accuracy and completeness regarding business needs.
One of the flaws that can be identified through frequent testing is when systems are not being backed
up or have been left out. Reviewing these test results regularly and remediating any gaps will improve
organizational knowledge of what needs protecting.
© 2024 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 04242024
Building a Cyber-Resilient Data Recovery Strategy
Using multi-factor authentication (MFA) and having a separate, dedicated data protection Identity and
Access Management (IAM) system in place will ensure that your users and their credentials are properly
verified and harder to compromise. Implementing least-privilege access, like having separate admin
and operational accounts, will also prevent unintentional mistakes and minimize privilege escalation.
Finally, everything should be configured with the assumption that the rest of your infrastructure has
already been compromised. This means isolating backup components onto a segregated network and
restricting access to the Veeam Backup & Replication console itself via a VPN or remote connection.
Each level of your backup infrastructure should incorporate these approaches, but they may look slightly
different at each level. This means that operating systems, file shares, out-of-band management, and any
applications used to manage them should follow similar principles.
© 2024 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 04242024
Building a Cyber-Resilient Data Recovery Strategy
Immutability is a very old concept in computer science that has recently become a critical feature for
backups, especially for backups that need to remain without change or error to satisfy retention
requirements. Whether you use hardened repositories, object storage, third-party deduplication appliances,
or tape, Veeam backups can be stored in a state where even administrators cannot modify or delete
the data. As with any security system, there are often workarounds, so it is critical to consider your
entire stack — all the way to the data center floor — to ensure that these workarounds are eliminated
or tightly controlled.
It’s an old joke in cybersecurity that the most secure system is the one that is powered off, disconnected
from the network, and stored in a room no one can access. While the joke is completely accurate, truth is,
an inaccessible system has no reason to exist. This adage, however, can work well when considering
backup security. As long as it’s accessible, when necessary, a backup that is stored offline is the least
likely to be tampered with. Veeam provides several options to create this air-gapped approach to
backup storage that range from online systems that require different authentication to the ultimate
offline storage: Tape.
That said, no plan should ever rely on just one layer of protection. Therefore, Veeam Backup & Replication
enables a “four-eyes” principle to backup deletion. Similar to the old “nuclear keys” approach, this configuration
requires two administrators to authorize the deletion of a backup, thus protecting backups from accidental
or malicious deletion.
© 2024 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 04242024
Building a Cyber-Resilient Data Recovery Strategy
As part of a restorability test, SureBackup can also work with malware scanning tools to scan your restored
virtual machine (VM). This gives organizations the ability to use a secondary malware detection tool in
a “trust but verify” approach to detection. As an added benefit, the SureBackup scan occurs with zero
impact to the production workload, which potentially allows for a more thorough scan. SureBackup can
also mount individual disks to a test machine that can then scan files for malware, thus providing an even
faster and more resource-efficient malware scan whenever a full restore is not necessary.
If anything is found in these scans, then that particular restore point will be flagged as suspicious.
© 2024 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 04242024
Building a Cyber-Resilient Data Recovery Strategy
© 2024 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 04242024
Building a Cyber-Resilient Data Recovery Strategy
Secure restore is another function of Veeam Backup & Replication that allows for disks to be mounted
and scanned for malware before full restoration. Iterating this process until an uninfected point is
discovered makes it easier to find the point in time when malware first appeared on a given system
and helps you avoid reinfection by restoring a dormant piece of malware.
With Veeam Recovery Orchestrator, the secure restore process can be executed on the entire
environment with an orchestrated “clean room” approach. Not only does this add speed to checking
for clean restore points, but also can quickly add valuable information to the digital forensics of
a cybersecurity incident.
© 2024 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 04242024
Building a Cyber-Resilient Data Recovery Strategy
Sidebar: Exfiltration
If data was accessed and modified by malware, then it was likely stolen first. Exfiltrated data is data that is
sent from a victim’s environment back to the cybercriminals. It could then become information released or
sold by cybercriminals after a breach, which could lead to exposed corporate secrets, damaged reputations,
and stolen personal information that could lead to future fraud or cyberattacks.
© 2024 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 04242024
Building a Cyber-Resilient Data Recovery Strategy
To reduce the chances of restoring infected data and wasted effort, recovery efforts should work together
with the cyber forensics that occurs in the respond phase. A strong working partnership between IT, security,
and the business as a whole is critical to restoring the right data and not reintroducing malware.
Previously undetected malware could be found in earlier restore points when you’re utilizing fully up-to-date
malware detection tools as part of SureBackup and secure restore, so it’s important to not rely solely on
malware flags from earlier scans. In the event that clean restore points are further back in time than your
defined RPOs, file-level restores can also be used to restore individual pieces of key data, while avoiding
the malware that’s in the full backup.
Veeam Recovery Orchestrator was designed to prescribe the entire restoration process and make it as easy
as clicking a single button. By combining your restoration plan with infection flags, secure restore, storage
array snapshots, Instant Recovery, and application verification, Veeam has a combination of features that
can restore data quickly and efficiently while making sure your data is as malware-free as possible.
© 2024 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 04242024
Building a Cyber-Resilient Data Recovery Strategy
© 2024 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 04242024
Building a Cyber-Resilient Data Recovery Strategy
As a critical component of data security, your backup infrastructure needs to be demonstrably compliant
with company and governmental regulations. To properly “Govern” includes the documentation
of your organizations’ cybersecurity risk management strategy, including configuration and policies,
change tracking, and documenting the successes and failures of every test. This helps ensure that
expectations and policies are effectively communicated and monitored.
Beyond that, the number of reports possible out of Veeam ONE will provide you with a wealth of information
about your backup infrastructure and its health. Documenting the frequency of backups, change tracking
to backup configurations, and more are built-in reports that can be generated either manually or on
a schedule and then automatically sent to the proper recipients.
© 2024 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 04242024
Building a Cyber-Resilient Data Recovery Strategy
© 2024 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 04242024
Building a Cyber-Resilient Data Recovery Strategy
Conclusion
NIST CSF 2.0 represents a significant milestone in the evolution of cybersecurity risk management and
the fight against evolving threats. By building upon the solid foundation of CSF 1.1 and by introducing
key enhancements like the “Govern” function and a heightened focus on the supply chain, CSF 2.0
provides organizations with a more comprehensive and adaptable framework to help them navigate
their ever-changing cybersecurity landscape.
The expanded scope of CSF 2.0 ensures that organizations of all sizes and sectors can benefit from
its guidance, thus fostering a more inclusive and collaborative approach to cybersecurity. The updated
framework also recognizes that effective cybersecurity risk management requires the active involvement and
commitment of stakeholders across the organization, ranging from senior executives to front-line employees.
Ultimately, the success of implementing NIST CSF 2.0 relies on fostering a culture of cybersecurity
awareness, collaboration, and accountability. By investing in training and education programs,
organizations can empower their workforce to become active participants in the cybersecurity risk
management process. Clear communication and consistent reinforcement of cybersecurity policies
and best practices are essential to create a shared sense of responsibility and vigilance.
As we look forward, it is evident that cybersecurity will continue to be a critical priority for organizations
worldwide. The increasing sophistication and frequency of cyberthreats coupled with the growing reliance
on digital technologies underscore the need for robust and agile cybersecurity frameworks like
NIST CSF 2.0. By embracing this updated framework and committing to its ongoing implementation,
organizations can strengthen their resilience, protect their assets, and maintain the trust of their
stakeholders in the face of evolving cyber risks.
Building a cybersecurity program is no easy task these days. Threats are numerous and the value of
a breach to criminals is potentially huge, so organizations need to use every tool at their disposal to
create layers of security so they can maximize their effectiveness at every stage of the NIST Cybersecurity
Framework. Veeam can provide value to all stages of the NIST Cybersecurity Framework, improving your
organization’s overall cybersecurity program:
• The act of creating and regularly testing recovery plans can provide valuable data that you
can use in the identify phase to ensure critical data is identified and can be protected.
• Implementing documented best practices and native security capabilities will ensure that
the backups and backup infrastructure are addressed in the protect phase.
• Since backups touch all data across the infrastructure, they can serve as an important second
check for malware that may have been missed by endpoint observations in the detect phase.
• Fast access to different points in time and virtual “clean room” environments can be critical to
information gathering efforts in the respond phase.
• Backups that are proven to be restorable and malware-free will be available when needed and
restorable into a clean and useable state as quickly as possible to support the recover phase.
• Everyone plays a role in securing their organization and its data. Establishing, communicating, and
monitoring your organization’s cybersecurity strategy and policies is critical in the “Govern” phase.
© 2024 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 04242024
Building a Cyber-Resilient Data Recovery Strategy
© 2024 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 04242024