Redp 5744
Redp 5744
Hybrid Cloud
Redpaper
Draft Document for Review January 14, 2025 3:54 pm 5744edno.fm
IBM Redbooks
December 2024
REDP-5744-00
5744edno.fm Draft Document for Review January 14, 2025 3:54 pm
Note: Before using this information and the product it supports, read the information in “Notices” on page v.
This edition applies to IBM Storage Defender Data Protect Version 7.1.1 and 7.1.2 and IBM Storage
Defender Data Resiliency Service 2.0.9.
Contents
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .v
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Authors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Now you can become a published author, too! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Stay connected to IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Chapter 1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 What is Defender Data Resilience Service (DRS)? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 IBM Storage Defender Overview and Vision. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2.1 Why Defender? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3 Defender components and functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Notices
This information was developed for products and services offered in the US. This material might be available
from IBM in other languages. However, you may be required to own a copy of the product or product version in
that language in order to access it.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area. Any
reference to an IBM product, program, or service is not intended to state or imply that only that IBM product,
program, or service may be used. Any functionally equivalent product, program, or service that does not
infringe any IBM intellectual property right may be used instead. However, it is the user’s responsibility to
evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The
furnishing of this document does not grant you any license to these patents. You can send license inquiries, in
writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive, MD-NC119, Armonk, NY 10504-1785, US
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may make
improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time
without notice.
Any references in this information to non-IBM websites are provided for convenience only and do not in any
manner serve as an endorsement of those websites. The materials at those websites are not part of the
materials for this IBM product and use of those websites is at your own risk.
IBM may use or distribute any of the information you provide in any way it believes appropriate without
incurring any obligation to you.
The performance data and client examples cited are presented for illustrative purposes only. Actual
performance results may vary depending on specific configurations and operating conditions.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the
capabilities of non-IBM products should be addressed to the suppliers of those products.
Statements regarding IBM’s future direction or intent are subject to change or withdrawal without notice, and
represent goals and objectives only.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to actual people or business enterprises is entirely
coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the sample
programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore,
cannot guarantee or imply reliability, serviceability, or function of these programs. The sample programs are
provided “AS IS”, without warranty of any kind. IBM shall not be liable for any damages arising out of your use
of the sample programs.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines
Corporation, registered in many jurisdictions worldwide. Other product and service names might be
trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright
and trademark information” at https://www.ibm.com/legal/copytrade.shtml
The following terms are trademarks or registered trademarks of International Business Machines Corporation,
and might also be trademarks or registered trademarks in other countries.
Enterprise Design Thinking® IBM Research® Redbooks (logo) ®
IBM® IBM Spectrum® X-Force®
IBM Cloud® IBM Z® z/OS®
IBM FlashCore® QRadar®
IBM FlashSystem® Redbooks®
The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive
licensee of Linus Torvalds, owner of the mark on a worldwide basis.
Ansible, Red Hat, are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the United
States and other countries.
UNIX is a registered trademark of The Open Group in the United States and other countries.
VMware, and the VMware logo are registered trademarks or trademarks of VMware, Inc. or its subsidiaries in
the United States and/or other jurisdictions.
Other company, product, or service names may be trademarks or service marks of others.
Preface
This IBM Redpaper publication describes IBM’s new cyber resiliency solution, IBM Storage
Defender – Data Resiliency Services (DRS). This IBM Redpaper publication will help you set
up, tailor and configure this new offering. By doing this, users will be able to leverage new
detection mechanisms for their environment to detect threats early, get a full view of the
infrastructure by connecting both primary storage arrays like IBM FlashSystem® as well as
secondary storage solutions for backup like Defender Data Protect and Storage Protect.
Additionally, users can set up governance profiles to ensure their data is meeting internal or
regulatory standards
Authors
This paper was produced by a team of specialists from around the world working with IBM
Redbooks.
Christian Burns is a Principal Worldwide Storage Data Resiliency Architect and IBM
Redbooks Platinum Author based in New Jersey. As a member of the Worldwide Storage
Technical Sales Team at IBM, he works with clients, IBM Business Partners, and IBMers
around the globe, designing and implementing solutions that address the rapidly evolving
cyber and data resiliency challenges facing enterprises today. He has decades of industry
experience in the areas of sales engineering, solution design, and software development.
Christian holds a BA degree in Physics and Computer Science from Rutgers College.
Erin Farr is a Senior Technical Staff Member in the IBM Storage CTO Office where she
explores new technology for future products and shapes strategy in anticipation of industry
trends. Her area of focus is Cybersecurity and Cyber Resiliency. She was instrumental in
forming the vision for IBM Storage Defender and is passionate about helping customers
prevent and recover from cyberattacks. Before joining Storage in 2021, she was the team lead
for the IBM Z® Center for Secure Engineering for z/OS®. She also enjoyed product
development for the majority of her career, in areas such as z/OS UNIX, analytics,
virtualization management, and Open Source.
Phillip Gerrard is a a Project Leader for the International Technical Support Organization
working out of Beaverton, Oregon. As part of IBM for over 15 years he has authored and
contributed to hundreds of technical documents published to IBM.com and worked directly
with IBM's largest customers to resolve critical situations. As a team lead and Subject Matter
Expert for the IBM Spectrum® Protect support team, he is experienced in leading and
growing international teams of talented IBMers, developing and implementing team
processes, creating and delivering education. Phillip holds a degree in computer science and
business administration from Oregon State University.
Meghan Grable is a global Growth Product Manager specializing in data management and
resilience solutions, both SaaS and software-based, with a strong focus on Product-Led
Growth (PLG) strategies. With over five years of experience, she has led cross-functional
teams to develop cutting-edge technologies that empower organizations to exceed their
compliance goals and enhance their cyber resilience against threats like cyberattacks, natural
disasters, and human errors. Based in Raleigh, North Carolina, Meghan holds a degree in
Service Design from the Savannah College of Art and Design. Her expertise in Service
Design, enterprise design thinking, and PLG enables her to create innovative,
customer-focused products that drive business success and growth directly through user
engagement and product experience.
Juan Carlos Jimenez is the World-Wide Data Resiliency Product Manager based in Dallas,
Texas. He is focused on defining roadmap, initiatives, and strategy within the various data
resiliency software products that he manages alongside his team. Juan Carlos brings an
end-to-end view to cyber resilience leveraging his expertise in both storage and security. Juan
Carlos developed the IBM Cyber Resiliency Assessment Tool which has been helping
numerous enterprises identify and close gaps in their IT environments. He holds a
Management Information Systems Degree from the University of Arizona.
Alexis Kojic is a Storage Technical Sales Specialist based in Canada. With two years of
experience in the IT storage and Cyber Resilience field, he holds a degree in Computer
Engineering BEng from Toronto Metropolitan University.
Ranjith Rajagopalan Nair is a Software Architect at IBM India. He has worked in IBM for
past 20 years, and working on IBM Systems storage for the past 10 years. Ranjith’s current
responsibility includes the development and delivery of IBM Storage Insights. Ranjith holds a
Masters degree in Computer Science from University of Kerala.
Daniel Paulin is a Storage Software Architect at IBM Croatia. An IT professional since 1997,
he has worked as a system engineer for two financial companies in Croatia. In 2003, he
joined IBM, where he gained comprehensive experience in designing, developing, and
deploying architectures and infrastructure for various storage and server solutions. Currently,
Daniel is focused on IBM's storage solutions, particularly the IBM Storage Defender. His work
is part of IBM’s broader initiative to enhance cyber resiliency and storage security, ensuring
data protection across diverse IT infrastructures. Daniel plays a crucial role in promoting
these innovations within the NCEE region, especially in storage management and
safeguarding against data breaches.
Ramakrishna Vadla is a Senior Technical Staff Member (STSM) and Lead Architect for IBM
Storage Insights and IBM Spectrum Control. He is responsible for developing and designing
the IBM Storage Insights product, which monitors storage systems. With over 20 years of
experience, he has worked on large-scale distributed systems across various technologies,
including AIOps, microservices architecture, storage management, cloud-native services, and
middleware systems. He has spoken at multiple technical forums, including the SNIA Storage
Developer Conference and IBM global conferences, and has contributed to the open-source
community. He holds a Master of Technology degree in Computer Science from the
International Institute of Information Technology, Hyderabad, India.
Christopher Vollmar is the Principal, World Wide Storage Data Resiliency Architect.
Christopher is an IBM Certified IT Specialist (Level 3 Thought Leader) and Storage Architect.
He is focused on helping customers design solutions to support Operational and Cyber
Resiliency on primary and backup data to complement their Cyber Security practices. He is
Special thanks to the following people for their contributions to this project:
Christian Burns
Principal WW Storage Developer / Architect - Data Resilience, IBM
Find out more about the residency program, browse the residency index, and apply online at:
ibm.com/redbooks/residencies.html
Comments welcome
Your comments are important to us!
We want our papers to be as helpful as possible. Send us your comments about this paper or
other IBM Redbooks publications in one of the following ways:
Use the online Contact us review Redbooks form found at:
ibm.com/redbooks
Send your comments in an email to:
[email protected]
Mail your comments to:
IBM Corporation, IBM Redbooks
Dept. HYTD Mail Station P099
2455 South Road
Poughkeepsie, NY 12601-5400
Preface ix
5744pref.fm Draft Document for Review January 14, 2025 3:54 pm
https://www.redbooks.ibm.com/subscribe
Stay current on recent Redbooks publications with RSS Feeds:
https://www.redbooks.ibm.com/rss.html
Chapter 1. Introduction
In this chapter we introduce the new IBM Storage Defender – Data Resiliency Service.
Additionally, we share this solution’s overview and vision for the future. Later in this
document, we will also cover the different functionalities of the solution, how to set them up,
configure them, and run them in order to drive the most value.
In this chapter:
IBM Storage Defender Data Resilience Service (DRS) is a purpose-built cloud-based data
resilience platform designed to help organizations quickly restart essential business
operations in the event of a cyberattack or other unforeseen catastrophic event. DRS provides
data resilience and compliance, early threat detection, and safe and fast recovery
orchestration for data stored across primary and secondary storage. The DRS software helps
to detect and respond to cyber threats, such as malware and ransomware attacks, and allows
for rapid recovery of data in case of a security breach or data loss. This allows administrators
to take quick and effective action to minimize the risks of massive financial losses or damage
to a company’s reputation.
DRS offers features such as data backup, data management, disaster recovery, and data
isolation to help organizations protect their data from cyber threats and unexpected
disruptions. Additionally, it provides rapid recovery of data and applications in the event of a
disaster or data loss, minimizing downtime and ensuring business continuity.
Note: The term ‘secondary storage’ used above denotes a secondary or backup storage
location that provides the ability to leverage and use copies of data in place prior to the
data being recovered.
With the combination of security operations, storage, and infrastructure tools, DRS provides
the capability to monitor end to end data movement and quickly supply critical information
allows for teams to make the most intelligent decision on recovery strategies. DRS presents
data resilience and recoverability options across primary and secondary storage, bringing
internal teams together with a comprehensive single pane of glass view and simplifying the
orchestration of business recovery processes.
In addition, while an enterprise might practice their DR recovery, our research showed that
very few were practicing Cyber Recovery, which includes aspects outside of traditional DR
such as:
Playbooks to ensure seamless interaction with Incident Responders
Antivirus scanning during recovery to avoid re-introduction of dormant malware
Practicing identification of good data copies at scale. Cyber attacks aren’t as
instantaneous as a power outage for example, and the actual points of impact may vary
across available recovery points.
The industry has responded to some of these threats with solutions that provided additional
protections such as air gap or immutability. Initially many secondary storage vendors also
added threat detection to their solutions, which led Gartner to coin the term "CyberStorage".
Solutions with threat detection can be pure software or a dedicated appliance, but the trend is
that threat detection and response capabilities are getting added into Storage across the
industry. At first, only secondary storage vendors were providing this capability, but IBM saw
a need for detection in primary storage as well.
1
Source: 1. Ransomware 2024. If we have backups, why are we still paying a ransom?. IDC. March 2024. IDC
Survey - Doc Document number:# US51941924
Source: 2. 2022 Gartner Hype Cycle report
Chapter 1. Introduction 3
5744ch01.fm Draft Document for Review January 14, 2025 3:54 pm
However, as IBM investigated this trend, it quickly became apparent there were a series of
concerns which needed to be addressed:
If an attack is detected, who is expected to respond? Nobody expects storage admins or
data protection teams to suddenly become Incident Responders.
Disparate solutions make it difficult to identify and locate the last good copy. Recovery
points can be primary storage snapshots or secondary storage backups. Often these are
managed not only by different tools, but by different teams. Also, if an incident is actively
occurring, a storage admin or incident responder may not have a holistic view across both
primary and secondary storage.
If an enterprise takes backups once a day, would backup-based detection (only) be fast
enough to detect issues?
How to determine the scope of damage? Which systems were impacted? The timeline?
While storage-based threat detection is important, it is unlikely that someone would swap
out their current solution just to get access to threat detection. How can this need for
additional features be met?
The vision of IBM Storage Defender is one that meets all of these needs. Storage Defender
DRS is a SaaS management pane, designed and intended to integrate with and sit above an
enterprise's existing storage system investments. DRS allows for this holistic view across
primary and secondary storage, while providing advanced ransomware detection and
recovery features that are needed to address modern threats in storage environments.
DRS has a centralized dashboard to promote cross department visibility. Within the
dashboard, recovery groups, resource summary, and usage monitoring are readily available
in a simplified format. Additionally, recovery groups, governance profiles, resources, and
integrated configurations can be created and updated within this dashboard.
DRS deploys AI-powered sensors to quickly detect threats and anomalies from backup
metadata, array snapshots, and other relevant threat indicators. Signals from all available
sensors are aggregated to increase detection paths for a fast response.
IBM Defender Data Protect offers an immutable secondary storage solution that incorporates
backups with rapid recovery, policies to lock data even from administration removal and
two-person integrity checking. It features a scale out clustered architecture with deep
integration into databases and hypervisors and a robust global management structure.
By integrating DRS with an SEIM like Splunk or QRadar, advanced notification aggregation
allows for crucial information to be available and used for initiating the next steps between
infrastructure and security operations (SecOps) teams. Providing needed information use
when deciding whether recovery plans should be implemented immediately or how best to
address threats.
Clean room isolation provides the ability to ensure the backups are clean and malware free
prior to returning them to a production environment. As a customer managed resource, DRS
provides guided testing workflows to recover, test, and isolate backups before pushing to
production systems ensuring the ability to confirm clean recovery data is present.
DRS also brings in data from various points to help organizations become proactive in their
approach to data resilience. Identifying threats early helps to ensure the availability of
business operations, this is essential to building operational resilience and trust. DRS is an
advanced solution that helps organizations build operational resilience by bringing together
multiple levels of threat detection and data protection that serve as a base when building out
advanced lines of defense across primary and secondary storage. This technology allows
users to effectively detect and respond to cyberattacks and other unforeseen threats to
storage environments. When put together these features allow Defender DRS to help provide
the peace of mind needed to successfully navigate unpredictable events and ensure the
continuity of vital business operations and processes.
Chapter 1. Introduction 5
5744ch01.fm Draft Document for Review January 14, 2025 3:54 pm
The architecture will show you how DRS fits into IBM Storage Defender and what are the
elements that makes the architecture. This chapter describes the following elements:
IBM Storage Defender Connection Manager
Data Sources
Recovery Locations
Sensors
Recovery Groups
Clean Room
DRS is a combination of cloud-based SaaS managed by IBM and an on-premises agent that
manages communications from your data center. The data center agent is called the IBM
Storage Defender Connection Manager, and collects telemetry about your primary and
secondary data, and data sources like VMware, while the data itself stays on premises. The
telemetry data is communicated to the DRS which helps secure and recover the data that is
important to you.
DRS can surface and aggregate the detection of operational threats on your production data.
Currently this includes the following system level detections:
Detection on the file system level using IBM Storage Defender Sensor technology
Detection on the storage block level using IBM Storage FlashSystem - FlashCore Module
technology and statistical analysis to identify threat patterns
DRS introduces the concept of Recovery Groups which are used to group resources together
within the DRS. The combination of resources allows DRS to perform automated test
recoveries and to verify automatically if the protection policies setup in the related data
protection application meets the requirements for a cyber-resilient environment. In DRS,
multiple Recovery Groups can be defined. The key parts of a Recovery Group are the
protected resources, for example virtual machines, the Clean Room Profile that defines the
environment which can be used for automated test recoveries, and the Governance Profile
that specifies the requirements for cyber-resiliency within each Recovery Group that is
defined.
DRS is designed to enhance data resiliency protect against events like: hardware failures,
human errors, sabotage, natural disasters, ransomware and more. By consolidating key parts
of the existing IBM Storage portfolio into a single solution, this allows for the use of new
detection and protection capabilities to be applied to your data. DRS includes the following
capabilities:
Supports software protection for multiple operating systems inside a VMware
environment.
Deploy anomaly based sensor agents on VMware VMs (Defender Sensors).
Integrates and aggregates the hardware detection capabilities of IBM Storage FlashSystem
to provide the ability to receive alerts from IBM Storage Insights and with Storage
Defender. These alerts that can be sent out through integration with QRadar and Splunk
SIEM solutions.
Provides the capability to recover data from a more recent point in time by creating a
SafeGuarded Copy (immutable hardware snapshot) on IBM Storage FlashSystem.
Provides the ability to recover IBM Defender Data Protect backups into the clean room for
testing as part of the Recovery Group’s collection of recovery points.
Gives clients a dashboard that can help them to better understand inconsistencies
between their primary storage copies and backup copies for the same workload or
application.
Additional dashboard features include:
– Ability to create and define recovery groups, which are a collection of data resources
that should be backed up and recovered as a unit
– A summary of connected resources like virtual machines, data sources, recovery
locations, and connection managers
– A license usage overview highlighting the number of recovery groups and deployed
sensors
IBM Storage Defender Connection Manager provides on-prem data center connections to the
following resources:
Data Sources (IBM FlashSystem, IBM Storage Defender Data Protect, VMware vCenter)
Recovery locations
Sensor control nodes and IBM Storage Defender Sensors
The Data Sources and Recovery locations that are connected to the IBM Storage Defender
Connection Manager are inventoried automatically and IBM Storage Defender Sensors
observe the systems on which they are installed.
The Connection Manager must be installed in an on-prem Data Center or cloud instance and is
provided in an OVA format which to be deployed in your local VMware vCenter. Inside the
Connection Manager, Red Hat Enterprise Linux is used as the underlying operating system but
is part of the installation. The Connection Manager software is built to become active and get
connected to your local resources and the IBM Storage Defender DRS that runs in the cloud
quickly with less initial configuration prior to initial use.
It can be deployed from OVA or on a bare metal server, you can login to Connection Manager
and begin to add Connections.
Connections in Connection Manager include Data Sources, Recovery locations and Sensor
control nodes. Typically, only one Connection Manager should be deployed at each physical
location. Data sources must be registered to the Connection Manager instance located in the
same physical location.
Connection Manager also includes Job manager which communicates internally with various
workload agents running in Connection Manager, and also catalogs Safeguarded Copies for
IBM FlashSystem.
By using built in SIEM agent, Connection Manager integrates with on-premise IBM QRadar
and Splunk installations to log security events from IBM Storage Defender.
For IBM FlashSystem, Connection Manager gathers inventory, catalogs Safeguarded Copies
and recovery tasks and restores from backup snapshots.
For IBM Storage Defender Data Protect clusters and VMware vCenters, Connection Manager
scans for VMs and protected systems and sends scan results to IBM Storage Defender DRS.
It also coordinates recovery of VMs protected by IBM Storage Defender Data Protect.
The Figure 2-5 on page 12 shows and example of the relation between your production
environment and the Recovery Location.
The sensor control node hosts the sensor software and distributes it to the virtual machines
that have sensors installed. These sensors observe the systems they are installed on and can
detect cyberattacks, like a ransomware attack, in real time. When the sensor detects a
cyberattack, the sensor alerts you by sending messages to the on-premises Connection
Manager and IBM Storage Defender DRS.
Connection Manager comes with a built in control node so you can start adding sensors right
away. However, if you'd like to use your own control nodes, you can add them through the
Connection Manager and use the provided Ansible playbooks to manage the sensors.
A high level example of the workflow and data path for DRS sensors is shown in Figure 2-7 on
page 14.
IBM Storage Defender DRS uses the sensor information in the following ways:
1. When installed, the sensors use file system and operating system interfaces to collect
information about operations on file system objects
2. The IBM Storage Defender Connection Manager reports the sensor data that is collected
on premises to the IBM Storage Defender DRS.
3. DRS correlates the information with recovery groups in your tenant.
4. When sensor heartbeat information is missing or when an anomaly is detected for file
system, a case is opened for the related recovery group.
5. Depending on your notification settings, notifications are sent out about the new case.
For example, if a recovery group is assigned with VM1, VM2, VM3, and VM4 then IBM
Storage Defender DRS determines whether it can find backup snapshots for these VMs in the
secondary data sources within the same location (data center). When IBM Storage Defender
DRS correlates the primary and secondary resource data for the assigned VM’s, it proceeds
to test the recovery group based on the policy and clean room profile settings.
In the IBM Storage Defender DRS dashboard you can find the details about recovery group.
The Figure 2-8 shows Recovery Group details.
Profiles
The governance and clean room profiles are used to define and set recovery objectives of
recovery groups and “recovery target environments.
Governance profiles are created and applied to the recovery group and allow for specific
recovery objectives to be defined and associated with one or more groups. These recovery
objectives are composed of preset points in time for the recovery points and the preset
minimum retention time for the recovery points. The governance profile also allows you to
specify a threshold time that must be elapsed before the next recovery test will be performed
for the recovery group. The separate recovery objectives can be defined for IBM Storage
FlashSystem and IBM Storage Defender Data Protect independently.
The governance profile definition allows one of the following three use case definitions:
Observation of the recovery objectives for IBM Storage FlashSystem recovery points
(safeguarded snapshot copies)
Observation of the recovery objectives for IBM Storage Defender Data Protect recovery
points
Observation of both the recovery objectives for IBM Storage FlashSystem recovery points
and IBM Storage Defender Data Protect recovery points
The test frequency objective is optional for all use cases. Figure 2-9 shows an overview of
recovery objectives configured in the governance profile.
The clean room profiles connect the recovery groups that belong to resources in the
production environment with configuration and resources that are defined in IBM Storage
Defender DRS. The connected resources are IBM Storage FlashSystem, IBM Storage
Defender Data Protect, and the clean room environment. This resource configuration defines
how IBM Storage Defender behaves during a recovery event.
Figure 2-10 on page 17 illustrates the logical connection between the different components.
Figure 2-10 Clean Room objectives configured in the Clean Room profile
To ensure the successful recovery of the recovery group that is assigned to the specific clean
room profile, configuration requirements must be met. The configuration of a clean room
profile allows the usage of the profile for one of the following three different use cases:
1. Recovery from IBM Storage FlashSystem safeguarded snapshots
2. Recovery from IBM Storage Defender Data Protect backup copies
3. Recovery from both IBM Storage FlashSystem safeguarded snapshots and IBM Storage
Defender Data Protect backup copies.
Important: If these requirements are not met, the recovery of the virtual machines that
belong to the specific recovery group will fail for clean room recoveries.
In addition to the conceptual dependencies between the clean room profile and other IBM
Storage Defender components, consider that the same clean room profile can be reused for
different recovery groups. In cases where a clean room is associated with multiple recovery
groups, the different recovery groups may have different requirements for their recovery. This
is specifically important when recovering from IBM Storage FlashSystem, as the
requirements for network infrastructure, mapping of volumes, or SAN zoning may be different.
Therefore, it may be beneficial to implement multiple clean room profiles with different
configurations to provide you with more flexibility for the recovery scenarios that you want to
implement for different recovery groups.
Resources
All available resources that are managed by IBM Storage Defender DRS and that are
inventoried with Connection Manager, are shown in IBM Storage Defender DRS GUI. DRS
supports the following resources:
Virtual Machines
Connection Managers
Data Sources
Clean Rooms
Resources are added to Recovery Groups during its creation, and are checked during
inventories by Connection Manager.
Protected virtual machines are able to be recovered into the associated Clean Room for
verification prior to recovery into a production environment. IBM Storage Defender is
connected to each VM instance and provides observation and assistance with this process.
A Clean Room environment setup has several similarities with a standard vCenter setup.
Apart from the recovery groups that are restored by using datastores that are mapped from
data protection solutions, a DMZ is implemented to allow access to the isolated portions of a
clean room. Figure 2-11 displays the high-level structure of a Clean Room environment.
Infrastructure isolation
The isolation of the infrastructure is an important aspect of a clean room environment.
Isolation for physical resources refers to physical separation in the from of a set of computer
hardware that is used for a hypervisor independent from any production environment. When a
cloud service provider is used, isolation refers to a logical separation configured using
different cloud accounts.
Logical separation and subnetting: In addition to the recovered virtual machines, the clean
room environment contains systems that are used for tools and management. You need to
separate groups of systems into network segments to prevent the breakout of malware from
infected systems. If multiple recovery groups are recovered into the same clean room to
establish a temporary production environment, you must use a dedicated VLAN for each
recovery group. Apart from the breakout prevention, the positive impact on the administrative
separation of duty is another important benefit to this planning step.
Access control and firewalls: Use firewalls and access control lists (ACLs) to control and
monitor traffic between network segments. In addition, enhance security by enforcing rules
that are based on source, destination, and port.
Security zones and critical infrastructure protection: Establish security zones, including a
De-Militarized Zone (DMZ), to separate public-facing servers and protect critical infrastructure
components by limiting potential attack vectors.
Monitoring, encryption, and regular auditing: Implement network monitoring tools and
centralized logging to ensure visibility and timely detection of security incidents. In addition,
implement secure communication between recovery groups in the same clean room. If
applications require interaction, you can use VPNs and encryption. If the clean room is used
for temporary production, conduct regular security audits to confirm all security measures are
still valid and providing the expected protection.
The logical separation of administrative roles for the production system and the clean room
environment and, strict limits on the user’s permissions prevent a user from influencing both
environments.
The implementation of auditable logging for all operations in the clean room makes sure that
any operation on the recovered data is traceable. This includes the creation and configuration
of the clean room, clean room operations such as recovery, data masking, anonymization, or
temporary production usage of the data.
analysis or development and can be used to document events or actions taken, while a
comprehensive review of this documentation can be used to help audit the regulatory
compliance status of a company and confirm if requirements are being met.
For further information, there is a detailed blueprint for a clean room available here:
https://www.ibm.com/support/pages/ibm-storage-defender-clean-room-environments
Figure 2-13 on page 21 shows the Connection Manager dashboard, from here you can add
resources from the Connections menu.
From the Connections dashboard data sources, recovery locations and sensor control nodes
can all be added to the DRS configuration.
Enter the Hostname or IP address of the data source and click Next. (Figure 2-15 on page 22)
Review the certificate details and click Next. (Figure 2-16 on page 22)
In the following window enter the credentials that will be used by Connection Manager to
access this data source. (Figure 2-17 on page 23)
Click Add. Once complete the new data source will be added to Connection Manager as
shown in Figure 2-18.
Review the certificate details and click Next. (Figure 2-20 on page 24)
Enter the dedicated credentials with the required permissions and desired level of access to
the environment for this recovery location and click Add. (Figure 2-21 on page 25)
Figure 2-22 show the new recovery location is successfully added to the Connections list.
To add a control node in the Connections dashboard, select the Sensor control nodes tab and
click "Add control node"(Figure 2-23 on page 26). The wizard will open in the right side of the
window. Enter the Ansible control node hostname and click Next.
In the following step (Figure 2-24 on page 26) enter credentials created on the Ansible control
node during the Defender sensor setup and click Add.
New sensor control node will be added to Connection Manager. (Figure 2-25 on page 27)
To create a Governance profile, select the Governance tab and click "Create profile" and the
Create governance profile window will open (Figure 2-26). Under the Details tab, enter the
name for a governance profile and description. Click Next.
When creating a Governance profile, the Immutable snapshots tab allows you to select
thresholds for immutable snapshot recovery points available from the IBM FlashSystem
(Figure 2-27). You can select the check box to enable the point in time verification and the
retention time verification for specified time interval. Click Next.
Under the Backups tab, you can select thresholds for backup copy recovery points available
from IBM Storage Defender Data Protect (Figure 2-28). Select the check box to enable the
point in time verification and the retention time verification for specified time interval. Click
Next.
In the Recovery testing tab select the thresholds for successful recovery testing. Select the
check box to enable the test frequency verification and specify time interval (Figure 2-29 on
page 29).
To create Clean Room profile, select Clean Room tab and click Create profile (Figure 2-31 on
page 30).
On the Create clean room profile window, under the Details tab, specify the name for a clean
room profile and you can also provide description of the clean room profile (Figure 2-32).
Click Next.
Under the Clean room settings tab, you can enter the clean room location and recovery
preferences (Figure 2-33 on page 31). The settings under this tab are global in the context of
the profile and influences the recovery from IBM Storage FlashSystem and IBM Storage
Defender Data Protect. Click Next.
Under the Immutable snapshot recovery tab, you can enter recovery preferences when
recovering from immutable snapshots with IBM Storage FlashSystem (Figure 2-34 on
page 32).
Under the Backup recovery tab, specify the recovery preferences when recovering from IBM
Storage Defender Data Protect (Figure 2-35 on page 33). If you plan to recover from a
backup, select the vSphere resource pool from the drop-down list that can be used for
recovery. The default resource pool on each vCenter is the pool that is called Resources. In
addition, you can have other resource pools that you have created in your vCenter. All
available resource pools can be selected for the recovery. In addition you can select the
desired vCenter datastore from the drop-down list that you wish to be used for recovery with
this policy. Click Create to create a clean room profile with the specified values.
The clean room profile is created under the Clean room tab (Figure 2-36).
By creating the governance and clean room profiles, recovery objectives of recovery groups
and recovery target environments are configured.
ransomware in less than a minute, which helps ensure that your business is protected before
a cyberattack is able to be executed.
These ransomware alerts generated by IBM Storage Insights Pro for a monitored IBM
FlashSystem can be auto forwarded to IBM Storage Defender to trigger cyber resiliency
workflows, and protect your systems as soon as possible. For a customers subscribing to IBM
Storage Insights Pro and IBM Storage Defender, this will enable enhanced protection from
ransomware attacks with simply and easy integration.
With IBM Storage Virtualize software 870 and FCM’s with FCM firmware 4.1, the ransomware
threat detection is further improved by the following process:
IBM FlashCore modules collect and analyze detailed ransomware statistics from every I/O
with no performance impact.
IBM Storage Virtualize runs an AI engine on every FlashSystem that is fed Machine
Language (ML) models developed by IBM Research® trained on real-world ransomware.
The AI engine learns what’s normal for the system and detects threats using data from
FCM.
IBM Storage Insights Pro collects threat information from connected FlashSystems, alerts
trigger SIEM/SOAR software to initiate a response.
Statistics are fed back to IBM to improve ML models.
2.4.2 Integration between IBM Storage Defender Data Resiliency Service and
IBM Storage Insights PRO
operational efficiency, and proactively manage storage resources. IBM Storage Insights Pro
brings a lot of AIOPS capabilities which will help the customers to plan for the future, and
manage their infrastructure more efficiently.
For IBM FlashSystems running firmware version 8.6.3 and later, FlashCore modules (FCM4
with firmware 4.1) can detect ransomware threats in the data path and send threat details to
IBM Cloud® Call Home. IBM Storage Insights Pro monitors ransomware threats detected on
all monitored IBM FlashSystems and generates alerts accordingly. These alerts are sent to
the storage administrator via email and are also displayed in the IBM Storage Insights Pro
user interface. Additionally, IBM Storage Insights Pro identifies affected volumes, marking
them as having detected ransomware threats.
The basic working principle of the integration between the two services is as follows:
IBM FlashCore® Module version 4 technology is built in the IBM Storage FlashSystem
that is used.
The IBM Storage FlashSystem is registered in IBM Storage Insights Pro. When the
system is registered, the IBM FlashCore Module starts reporting the detected anomalies
and ransomware threats to your IBM Storage Insights Pro tenant.
The IBM Storage FlashSystem needs to be registered in IBM Storage Defender Data
Resiliency Service. This registration is done in the user interface of Connection Manager.
The IBM Storage Insights Pro communicates with Data Resiliency Service. The health
status of your IBM Storage FlashSystem is sent to the Data Resiliency Service so that if
Storage Insights Pro stops monitoring it, it can be made known to the users.
IBM Storage Defender correlates the information that is received from the storage system
to recovery groups.
When the IBM FlashCore Module detects an anomaly for block level data operations, a
case is opened for the related recovery group.
Depending on your notification settings you are notified about the new case. This could
include alerts being sent to a connected SIEM.
alert is received, IBM Storage Defender Data Resiliency Service correlates the volume in the
alert to the datastore, and opens a case for the recovery group where the VM using the
datastore resides. The newly opened cases can be viewed on the IBM Storage Defender
DRS, and a recovery plan can be activated to recover to the last copy, or last best copy
available.
This section describes the IBM Defender sensors that are used for detecting threats against
live data in near real-time.
If each of these criteria are met, an event is raised to Defender's Data Resiliency Service
indicating a possible malware event and a "case" is opened, as shown in Figure 3-1
In the details for the specific event (Figure 3-2 on page 39) both informational and actionable
information is provided at a glance, this includes (in our example):
The type of event, which in this case is a “Possible malware event” of ransomware.
The date and time the event was detected, which can help with later pinpointing clean
copies for recovery as well as initial forensic analysis.
The Virtual Machine impacted (in this case sts-pok-dsn-2-rhel) and its Vcenter.
The suspected malicious process: python3 ./filesEnc.py
The number of files affected (235) for this specific window of detection.
The source (originator) of the event, in our case a Defender sensor. Flashsystem-related
events may also be raised from Storage Insights Pro.
You can also drill down further and review detailed information for the event by choosing View
sensor logs. A sample sensor log is shown in Figure 3-3.
This shows additional actionable information such as the hostname (FQDN) of the VM and
the Process ID (pid) which can be used to identify and kill the suspicious process. It also
shows the user ID (uid) which would allow an admin with appropriate rights, to lock out that
user. Detailed logs can also be useful information for incident responders as the absolute
pathnames of every impacted file are also shown.
A summary of the impact is provided at the end of the log, including the total number of files
(Figure 3-4 on page 40 shows suspected malicious accesses event details). Regardless of
the number of files impacted, recovery would happen at a volume level and all files can then
be recovered to an earlier, unimpacted state.
Note: Currently, the encryption detection identifies encryption only on files > 4K, so it is
likely that if specific files are identified as impacted, it’s probable smaller files in these
locations are too.
The sensors also send regular heartbeats to the Data Resiliency Service to indicate that both
the sensors and dependent network connections are healthy. If a heartbeat is missed, an
event is raised as shown in Figure 3-5.
For any of these events, a case is opened so actions can be reviewed and easily
communicated between team members and teams. For example, once an event is analyzed
by and admin or responder, information from the event is reviewed and the cause can be
addressed or confirmed. Once appropriate remediation is taken to resolve the issue, the case
can be closed. When a case is closed the corresponding event messages as shown in
Figure 3-5 are cleared.
However, past events can still be viewed from the Detection panel as shown in Figure 3-6 on
page 41.
After closing the case, the DRS dashboard will continue to allow access to historical events
and includes the ability to search on previous threat events, as well as drill down to review
details of those events.
Install the sensor control software on the sensor control node by completing the following
steps:
1. Log in to the system that you want to use as a sensor control node.
2. Copy the sensor download package to a working directory.
The script requires the following input values, use unique names for each entity in the
environment:
Hostname: FQDN of the Connection Manager.
Username: Define a username that is to be used to register IBM Storage Defender
sensors that are installed on virtual machines for the sensor control
node.
Password: Define a password that is related to the username.
Vault password: The username and password that is defined before is stored and
encrypted in a local Ansible vault. This password is used to protect the
access to the vault.
Note: Multiple sensor control nodes can use the same username and password for sensor
installation or registration. In this case, only one control node needs to be added through
the steps listed above. If you attempt to add more than one control node using the same
username, the following error will occur in the UI:
Error getting source native ID: User name already in use. Please select a different user
name.
3. In the table that lists all the sensor control nodes, scroll to the sensor control node of
interest.
4. In the row of the sensor control node, click the overflow menu (shown below), and then
click Remove. This action opens a dialog box.
5. In the dialog box, click Remove to confirm that you want to remove the sensor control
node from the Connection Manager.
The process to install an IBM Storage Defender sensor on one or more systems requires
executing the following these steps:
1. Log in to IBM Storage Defender.
2. Click the hamburger menu (three horizontal lines) in the upper left corner of the page.
3. Navigate to Data Resiliency > Recovery Groups.
4. From the list of recovery groups, select the row for the recovery group you wish to install
the sensor on.
5. In the Overview panel, locate the Defender sensors tile and click Get started.
Note: If you have previously installed sensors, you will see the Manage button on
the Defender sensors tile.
6. In the Manage sensors pop-up window, select one or more virtual machines (VMs) by
checking the corresponding boxes.
7. Click Add sensor + in the title bar.
8. Enter either the username and password or the SSH key for the VM.
Note: All the selected VMs must have the same login credentials.
Note: Monitor the Notification menu to check for completed or failed notifications for each
sensor. If the status is TIMEOUT, the installation request was accepted but did respond for
15 minutes. For the FAILED status, check the detailed error message in the notification.
Once installation is complete, the sensor will automatically begin monitoring file access
activity on the system. If it detects any unusual access patterns, such as those associated
with ransomware attacks, the sensor will generate an alert. This alert is sent to the
on-premises Connection Manager, which securely forwards it to the IBM Storage Defender
Data Resiliency Service (DRS). The sensor also periodically sends heartbeat messages
through the Connection Manager to confirm it is operating normally.
To install an IBM Storage Defender sensor on one or more systems, follow these steps:
1. Log in to the system that is being used as the sensor control node.
2. Navigate to the working directory where the sensor control software is installed.
Note: This is the directory you specified when downloading and installing the sensor
control software.
Note: You can use a different file for the sensor inventory list. If you choose to do this, use
the `-i /your-directory/your-file` argument in the next step.
5. Add the FQDNs for the sensor hosts to the hosts file:
Under the `[defender_sensor_hosts]` tag, list the FQDN of each system, one per line.
[defender_sensor_hosts:vars]
ansible_ssh_common_args='-o StrictHostKeyChecking=no'
ansible_connection=ssh
ansible_ssh_pass=<ssh password>
ansible_ssh_user=<ssh username>
all:
vars:
ansible_connection: ssh
ansible_ssh_user: <ssh username>
ansible_ssh_pass: <ssh password>
ansible_ssh_common_args: '-o StrictHostKeyChecking=no'
children:
defender_sensor_hosts:
hosts:
<FQDN1>:
<FQDN2>:
<FQDN3>:
Note: To avoid saving passwords in the hosts file, use the arguments `--ask-pass
--ask-become-pass` to provide the SSH and sudo passwords during playbook execution.
After installation, the sensor will automatically monitor file access activities on the system. If
any unusual access patterns resembling ransomware attacks are detected, the sensor will
send alert messages to the on-premises Connection Manager, which forwards these alerts
securely to the IBM Storage Defender Data Resiliency Service (DRS). The sensor also sends
periodic heartbeat messages to the DRS via the Connection Manager, indicating normal
operation.
Note: The Connection Manager uses FQDNs to perform sensor installation and
uninstallation. You cannot select the following VMs for sensor uninstallation:
VMs without an FQDN
VMs using "localhost" as the FQDN
VMs with duplicate FQDNs
Any changes to VM network configurations will be reflected in the UI after the next
inventory scan, which occurs automatically every hour or can be manually triggered.
Note: All selected VMs must share the same login credentials.
Tip: If the status shows TIMEOUT, the request was accepted but did not receive a
response for 15 minutes. For a FAILED status, check the detailed error message in the
notification.
Important: If you are trying to uninstall a sensor associated with a Connection Manager
that has been destroyed or improperly backed up and restored during a Connection
Manager OVA upgrade, the uninstallation will fail. For troubleshooting, refer to the guide
on "Resolving an IBM Storage Defender sensor uninstallation failure."
Once uninstallation is complete, the IBM Storage Defender sensor service will be removed
from the selected VMs.
Note: You can use a different file for the sensor inventory list. If you choose to do this, use
the `-i /your-directory/your-file` argument in the next step.
4. Add the FQDN or IP address of all systems that you want to equip. Add one per line under
the tag [defender_sensor_hosts].
5. Run the following Ansible playbook command:
Once the playbook is executed the sensor will be removed from the host.
Note: To install python311, the Python3 module must be enabled. For details on enabling
modules, refer to the SUSE Linux Enterprise Server documentation.
This dashboard containers several elements that enable users to leap out to additional
information and context. These capabilities include;
Resiliency Monitoring - IBM Storage Defender Connection Managers
Actions that can be performed, which include “open cases, assigned actions, required
updates and other issues”
Recovery Groups status
Governance Profiles status
Recovery Posture status
This provides the ability to denote locations, see the state/status and drill in deeper on the
managed connection managers. The ‘view all’ link, enables the user to see the Connection
Managers tab of the Resources page. This highlights the Connection Managers, their state,
their type, Host name, version and if an update is required as depicted in Figure 4-3.
Figure 4-4 shows the Actions which can be taken. This includes open cases, assigned
actions, required updates and other issues
Figure 4-5 on page 52 is the view available when clicking on the actions panel. This will lead
to a deeper view of the actions in order to review recommendations and resolve issues, see
pending actions or view the history.
If users select recovery groups on the left of the dashboard, they will be brought to the
recovery group list (Figure 4-7), where users can drill down on any recovery group previously
created or create a new one.
Users can create and modify their existing governance and clean room profiles within the
Profiles tab.
Users can navigate to the Resources tab (Figure 4-11) by clicking on “Resources” in the left
side column of the GUI. Within this view, users can gather more information on their available
resources, available copies, connections, and connection managers.
Step by step instructions and more information on this can be found here:
QRadar -
https://www.ibm.com/docs/en/storage-defender/base?topic=integrations-integrating-d
ata-resiliency-qradar-siem
Splunk -
https://www.ibm.com/docs/en/storage-defender/base?topic=integrations-integrating-d
ata-resiliency-splunk-siem
Figure 4-14 shows recovery group status of Ready and the details of governance for the
policy.
The testing of recovery points for a recovery group establishes the recovery plan. This plan is
then used if needed, in response to the occurrence of a cyber event. From the recovery points
of selected recovery group, you can choose a recovery point which is required for testing. To
select recovery point go to recovery group details, and from the Protection menu you will see
all recovery points (Figure 4-15).
These recovery points can be used to test or activate recovery plan. Figure 4-16 on page 57
shows the options that can be selected for each recovery point.
Use “Test recovery point” to test a recovery of the the virtual machines that belong to the
recovery group. These VM’s are then recovered by using the information that is stored in the
clean room profile associated with the recovery group. Depending on the configuration of the
clean room profile, the virtual machines are started and connected to the defined network or
not. When the test recovery is finished successfully the status of the recovery point will be
updated from Recovery in progress to Awaiting validation as shown in Figure 4-17.
Once the Recovery Point has been recovered to the clean room and is ready for validation a
blue box will appear across the top of the page with a link to confirm that validation pass or
failed testing Figure 4-18 on page 58.
Figure 4-19 highlights the ability to validate the recovery point following the restoration of the
Recovery Group to the clean room. It allows user to identify the use case of bringing up the
recovery and to define the status of the action as ‘Test Only’ or if the activity was part of a
‘Recovery Plan’ resulting from a Cyber incident. Then to be able to mark it as valid or not.
Figure 4-20 on page 59 allows the user to confirm the results of the recovery to the clean
room and confirm the results.
Once it has been determined if the recovery point is valid, the user is able to mark that as
‘Valid’ or ‘Not Valid’As part of the validation process, the recovery points are kept in the
history of the recovery group until their policies expire them from the inventory of their
supporting services.
Depending on the decision that you make the status of the recovery point will be updated
from Awaiting validation to Validated or Not valid. Figure 4-21 shows the different
categorizations of a recovery point.
Once the recovery test data is verified, if the cleanup option is selected in the test results
dialog panel as shown in Figure 4-22 on page 60 the data will be confirmed as validated and
the system will then cleanup the VM data that was restored as part of the validation test. If
clean up is not selected, the VMs will remain in the clean room and can be removed manually
at a later time.
In contrast to the manual recovery test, the activate recovery plan process provides the
flexibility to specify a new clean room profile for the given recovery point. With this option, you
can use a dedicated recovery environment to test the recovery point again and prepare a
recovery point for a downstream promotion into your production environment.
Figure 4-23 on page 60 shows the Activate recovery plan options where you select required
recovery plan.
In the next step you specify a clean room profile (Figure 4-24). After you review the profile
settings (Figure 4-25 on page 61) click Done and wait for the recovery to complete.
Once confirmed, the Recovery in Progress panel in the Recovery Group’s Overview panel will
show the progress as seen in Figure 4-26 on page 62 and Figure 4-27 on page 62.
Figure 4-26 Recovery progress information in Recovery Group Overview panel example 1
Figure 4-27 Recovery progress information in Recovery Group Overview panel example 2
From here, once the recovery process is completed, the user is able to access the Virtual
Machines that were recovered to the clean room environment and return them to production
as needed.
REDP-5744-00
ISBN
Printed in U.S.A.
®
ibm.com/redbooks