IBM Global Technology Services Technical White Paper September 2012 A “how-to” guide on using cloud services for security-rich data backup By Karin Beaty and Chris Bode Executive summary Contents 1 Executive Summary 2 Technology Advances 4 Service Management Best Practices 5 Standards-based Processes and Policies 6 Managing Physical Security 7 Analyzing your risks with data protection analysis 7 Summary The tremendous growth of data has created unprecedented challenges for businesses today. Although data growth can help improve efficiencies and expand market reach, it can also expose a business to more risks, such as data theft, fraud and service interruptions. With data becoming increasingly dynamic, in addition to business resilience and security, risk management has emerged as a top priority for best standards and practices in many organizations. In the September 2012 IBM Global CIO Study, with input from over 400 IT and C Suite managers, 37 percent of respondents cited data loss and 61 percent cited data breach as causing reputational harm. “IT...is like the heart pumping blood to the whole body, so any failure could threaten the whole organization's survival.” —IT manager, French IT and technology company Successfully balancing opportunity and reputational risk requires a strategy that includes a solid business resiliency plan along with dependable backup and restore policies for systems and processes. This also helps address the need for better security of data and applications, using advanced technology and analytical capabilities. IBM Global Technology Services Technical White Paper September 2012 Institutions Examination Council (FFIEC) standards. This capability is delivered through IBM® Tivoli® Key Lifecycle Manager software (TKLM), which supports 256-bit Advanced Encryption Standard (AES) data encryption and allows users to implement and manage a revolving set of keys that can be scheduled to automatically change on a calendar basis. For offsite backups requiring the highest standards of protection, optional Federal Information Processing Standard (FIPS) Publication 140-2 Level 1 certified encryption services are available. This white paper discusses how you can: ●● ●● ●● ●● ●● ●● Use IBM’s integrated technologies to help protect servers both in physical and virtual environments and more effectively use advanced techniques to help reduce data redundancy Act as a “virtual extension” of your backup environment with trained specialists who employ leading practices designed to provide around-the-clock support for backup and restoration services Help restrict access to data by independent users through data segregation Help improve data management by using stronger policies and procedures based on standards and industry-leading best practices Offer physical security to an organization’s data center environment to help protect network and servers and allow restricted access to data Help deliver a more thorough and unbiased assessment of an organization’s information technology (IT) infrastructure and backup processes, along with related business processes and organizational risk through data protection analysis TKLM is an optional robust tape encryption feature available for data at rest through Tivoli Key Lifecycle Manager software. The TKLM software can provide security-rich tape drive encryption and a user-managed interface for configuring and administering keys and certificates, along with a relational database (IBM DB2®) to help maintain metadata on keys and certificates and information on devices. For some configurations, customers may prefer client-side encryption, which provides encryption in flight and allows the customer to generate a one-time encryption key per protected server. It is supported for most backup types. The data is encrypted using customer-controlled keys prior to crossing the demarcation between IBM and the customer. In addition, the white paper helps determine if the protection of physical and virtual servers is key to improving business continuity and resilience, and looks at more effective ways to gain visibility to the backup and restore operations. Also, it examines the capabilities that would help manage ever-expanding data, while helping detect if your data security and backup are vulnerable. Server protection IBM SmartCloud Managed Backup provides integration with VMware’s vStorage API for Data Protection (VADP) technology in order to allow backups of virtualized environments in a much more efficient manner than if they were treated as physical environments. Both the Storage Area Network (SAN)-based transport method and the Network Block Device (NBD)-based transport method are supported to allow the solution to be flexible enough to fit a wider variety of customer environments. IBM’s aggressive integration with VMWare can significantly reduce the amount of time and effort system administrators are required to spend in order to prepare systems for restore, while simultaneously providing greater flexibility to the customer. In traditional recovery scenarios, physical machines for restores must be identified and either have their operating systems reinstalled or recovered using a system-imaging or bare metal restore (BMR) product before the core applications can be recovered and brought online. These traditional procedures are tightly coupled to the exact hardware make and model of the original machine, which may not be available at the time of recovery. By integrating with VMware, the need to first recover Technology advances to help better secure your data backup Without proper security measures, data that is being transferred over a network, or is “in flight,” can be susceptible to unauthorized access or “eavesdropping.” IBM SmartCloud Managed Backup offerings utilize leading data encryption and deduplication technologies to help protect data both in flight and at rest. Encryption IBM SmartCloud Managed Backup can provide 128-bit clientside file-level data encryption and allows users to generate an encryption key of up to 63 characters in length to provide in-f light encryption. SmartCloud Managed Backup can also provide an optional enhanced encryption capability for data at rest on tape that is designed to comply with Federal Financial 2 IBM Global Technology Services Technical White Paper September 2012 12 KB in size—as well as the index information needed to tie them together are spread across as many disks as possible in the system and each is concatenated onto other random data chunks. Only the IBM SmartCloud Managed Backup administration system can determine the distribution algorithm and then tie the relevant chunks together to make the information readable. the operating system by either a reinstall or through system imaging or BMR product is reduced. Instead, the restore of the operating system, data and application can be accomplished in a single pass without requiring intervention from the systems administrator. As a result, this integration allows enhanced flexibility in how the systems are recovered. During the restore process, IBM has the capability to reconfigure many aspects of the virtual machine during the single-pass restore, such as converting to thin provisioning or changing the network configuration. The net result is that the data stored in the system (as well as the indices) is distributed across the system. In addition, the need for the backup server to “rehydrate” the data means that even an unauthorized user who has gained physical access to a disk under false pretenses would, worst case, see only concatenated “shreds” of unrelated data strung together. With data deduplicated prior to leaving the protected host, less bandwidth is needed, helping you to protect more data over existing bandwidth and for longer periods. Increased resiliency with software-based data deduplication Data deduplication, an advanced compression technique, helps prevent others from reading data at the remote vault location. Data deduplication can identify redundant data at the source and store only unique chunks of information across files, file systems and servers. These data chunks—on average less than Smar tCloud Managed Backup Common Service Architecture and Management Centralized Backup Infrastructure Multiple Locations Managed Private Cloud, Dedicated Hosted Cloud and/or Shared Cloud Servers Media Libraries Unified Backup Domain Wide area network (WAN) Primary backup infrastructure VPN Centralized Management Monitoring Backup devices 3 IBM Global Technology Services Technical White Paper September 2012 Service Management Best Practices The solution has client-side deduplication integrated into the service. It removes redundant data at the source and can lead to reduced central processing unit (CPU), memory and input/output (I/O) utilization rates. It applies to flat file data, database and applications that are supported by the service. In virtual environments, one can offload the deduplication functionality to an alternate backup client to reduce the impact of backup on the virtual client. In addition, the IBM SmartCloud Managed Backup service infrastructure includes the IBM System x® 3650 M3 server, which is well suited to manage this load due to the availability of multiple CPU sockets and high-performance x86-based CPUs. Service Management Support Structure IBM SmartCloud Managed Backup support consists of a large team of trained specialists, who are located around the world, including: ●● ●● ●● By using a software-based deduplication engine, IBM can provide a single integrated and highly flexible deduplication solution. IBM can choose the location of deduplication occurrence on a per-backup-event basis, allowing multiple datasets within a single client to receive individualized treatment. Because the implementation is software based, the backups taken using one deduplication method are restorable using either deduplication method. This can identify duplicate data across datasets, regardless of how they are handled. Additionally, the software-based engine allows IBM to tightly couple the application and deduplication metadata during replication, allowing replicated backups to become immediately available. This coupling represents a significant improvement over previous replication techniques that required the storage to be indexed or the metadata to be manually manipulated— raising concerns about the timeliness and reliability of replicated backup events. IBM can also use the integration afforded by a software-based approach to tune the deduplication engine based on the type of backup being performed to help provide the optimal balance of data reduction and throughout. ●● ●● Steady State Global Support Center—Operates around the clock and helps monitor all infrastructure and services at Tier 1 and Tier 2 levels Global Transition and Deployment—Focuses on transition and deployment support, as well as asset management support services at Tier 3 Infrastructure and Network Support Services—Helps integrate virtually all production infrastructure and services, configures and maintains all network devices and covers security-related software and configuration Services Management—Focuses on client care and governance, new service rollouts, documentation and training Project Management Office—Supports large contract and major upgrade implementations, as well as providing project management for service offering improvements The service is complimented by a robust reporting capability, offering our clients increased management views of performance, usage and billing integration. Monitoring Re so lut ion Governance process and meetings Communication Document of understanding 4 ity Reporting l ibi Client-side deduplication allows IBM to help significantly reduce network utilization by decreasing the need to repeatedly retransmit data, which can result in fewer load data protection places on the network. When used in concert with IBM’s file system journal integration, which allows the backup software to process only changed files, backup runtimes are also dramatically reduced without as much impact on the customer’s machines. Vis ex p er t ise Service execution IBM Global Technology Services Technical White Paper September 2012 Service Management Support Governance IBM believes that communication is key to organizing and using that power for your benefit. With effective communication, IBM can demonstrate value as an extension of your IT team helping to protect your data. Data from each host that IBM helps protect retains its association with the originating host throughout its lifecycle. No other host within any segment of a customer’s organization can access another host’s data unless that permission has been specifically granted on a per-host basis. By controlling access to backups taken on a per-host basis, IBM can help protect your data not only from outside threats but also from unauthorized internal access by members of the customer’s organization who may not have administrative access to the host in question. Finally, IBM has automated auditing tools available that can track the origination of all restore events in order to correlate them with a valid customer request. Better efficiencies in customer data segregation Establishing standards-based processes and policies IBM SmartCloud Managed Backup allows for user data separation on a shared platform. For example, using Tivoli Storage Manager Collocation allows for the segregation of data by tape and by user. With collocation enabled, the server keeps files belonging to a group of user nodes on a reduced number of sequential-access storage volumes assigned to those nodes only. Collocation not only allows the segregation of data by user but can also reduce the number of volume mounts required when common users restore, retrieve or recall a large number of files from the storage pool. Collocation thus can also decrease the amount of time required for these operations. Each registered user server is placed into a specific “collocation group” that tells IBM SmartCloud Managed Backup to direct the specific data for each group to their respective common set of tapes. Proper management of your data starts with establishing policies and procedures based on time-tested standards and industry-leading best practices, such as IT Infrastructure Library (ITIL). However, first and foremost, IBM’s policy is to manage your data per your requirements, which set the parameters for handling and protecting your data. As part of those requirements, IBM works to provide the right levels of access and authentication, whether to a network, server or physical data center. Striking the right combination of user-based privileges and conservative data access control helps perform backup and restore tasks with optimal efficiency and f lexibility without sacrificing data security. A key factor for success is open and frequent communication between the customer and IBM SmartCloud Managed Backup. This communication comes through regular governance meetings and reporting as well as notifications of service impacting activity (backup failures, maintenance events and outage notifications). Access and authentication IBM SmartCloud Managed Backup can provide three levels of authentication and access control. The first level is designed to authenticate user or administrator access to the system. Although most enterprise backup and restore systems operate around a model of authenticating only a machine and not the human user, the solution works on the concept that both hosts and users must be authenticated. Registration establishes an Deduplication devices store data in one aggregate volume in order to realize global commonality and are designed to make better use of available storage. Although most customer data will reside on the same aggregate disk, no customer can access another customer’s data because the data is stored based on a unique client name and server definition properties configured during the client installation process. When retrieving data, each client must authenticate using the backup server, validate its internet protocol (IP) as the correct source for that client, and then can only browse the data it wrote. 5 IBM Global Technology Services Technical White Paper September 2012 identity for each client with the server. Once the server identifies the client, it assigns a unique client ID, which is passed back to the client for activation. Client activation passes the client ID back to the client, where it is stored in an encrypted file on the file system, effectively completing the cycle. Whenever remote client operations are performed, this ID is used to validate the client with a challenge or response mechanism. In addition to client activation, each user is provided with a unique account and password that must be individually authenticated before he or she can restore data from the system. connectivity—and only those hosts subscribed to the VLAN can be granted access. Each host subscribing to the backup service is provided with a unique node-name. The unique node-name is used much like a login ID, requiring a unique user-generated password that the administrator creates during the initial setup. Using this node-name and password combination allows access to your data and helps verify that no other data is visible. Industry-standard IP tables filter all incoming packets, allowing only a narrow range of communication ports assigned to the service on the incoming stream from the client to the server. All unneeded services are disabled, with the exception of those required to run reporting, monitoring and backups. With IBM SmartCloud Managed Backup, support staff access is granted based on Lightweight Directory Access Protocol (LDAP) authentication. Each user must have a valid login on the backup server, a registered token, and a validated and registered LDAP password. IBM follows a strict ITCS104 security policy for each backup server. The IBM security scan runs once a day to validate compliancy and a compliancy script is run on the server daily to help provide adherence to the security policy. The solution also includes installed firewalls for remote VPN access and blocked in-bound Internet traffic. Your service is provisioned on separate VLANs, and access control lists (ACLs) are applied to each VLAN interface, protecting each customer. Software firewalls run on each backup server, and system-level intrusion detection monitors file changes. Physical Security Physical access to data Protecting your networks and servers Stringent security controls and mechanisms also help control access to physical data centers, and support personnel are trained, certified and routinely audited to help manage data compliance with these procedures. Access to IBM data centers follows International Data Corporation (IDC) best practices and grants individual access requests only to support personnel authorized to access each specific backup infrastructure. Access can be granted on an as-needed basis by support personnel for anyone else requiring access. IBM personnel in our data centers are bound by policies including ITCS104 for physical security requirements, as well as strictly enforced IBM Business Conduct Guidelines and other legal and corporate mandates. Blocking threats and unauthorized access to your network and servers from internal and external sources is a critical aspect of data protection. Managed backup cloud offerings incorporate extensive firewall implementations and security-rich solution designs combined with access control software technology. IBM SmartCloud Managed Backup includes a private internal management network that can provide IBM support staff with remote access to each backup infrastructure. The management network facilitates the automation of the site—monitoring for alerts, backup validation and data collection. This network is protected through a security-rich firewall and virtual private network (VPN) that permits only specific hosts to gain access and even then only after they enter the proper validation sequence. This same VPN is used to provide a security-rich replication service between sites. If the IBM SmartCloud Managed Backup infrastructure is hosted in the IBM cloud and housed in our world-class IBM Business Continuity and Resiliency Services (BCRS) data center, then certain physical conditions may apply. IBM SmartCloud Managed Backup infrastructures can consist of either a locked rack on the data center floor or a dedicated data center locked cage containing one or more racks. Installed biometrics can further restrict access to raised-floor areas or In addition to using the private management network described above, the solution also uses a private backup network that connects your server to the backup server using Virtual Local Area Networks (VLAN) connectivity. The private backup network is a dedicated, isolated Ethernet network with no external 6 IBM Global Technology Services Technical White Paper September 2012 requirements, including the National Nuclear Security Administration (NNSA) Policy Letter NAP-14.x and Department of Defense (DoD) 5220.22-M scrubbing. areas where client data might be present, and personnel do not have the necessary login to the vault, nor is administrative access to vault data permitted. IBM can also restrict access by: ●● ●● ●● ●● ●● ●● Analyzing your risks with data protection analysis Overwriting client recovery device operating systems between events to remove access to operating system image, existing logins, application layer and all middleware that could be used to view, transmit or interpret data Prescribing a dual-control approach of operating and observing when running scripts on your behalf Reinforcing adherence to cleanup checklist by using another tool to perform a low-level delete of the desk to change the geometry of the device Utilizing numbered containers, digital container photos and scanned barcodes for media handling and in accordance with the capabilities and policies of the local courier service provider Performing frequent unannounced audits and daily site readiness meetings to enforce adherence to processes Applying strict controls to what IT equipment may be brought in and taken out of any IBM facility As part of the IBM SmartCloud Managed Backup portfolio, the data protection analysis tool can provide a more objective review of your current backup and restore environment. IBM specialists can use a nonintrusive data- gathering process to analyze metadata from your backup environment and to help you identify potential risks of exposure and alert you to any infrastructure or backup problems. Exhaustive centralized reporting includes identified locations, devices, servers, clients and backup network. Also, our data protection analysis tool is highly transparent to—and accessible by—a simple laptop configured for this purpose. You can remove the laptop and uninstall the backup agents at virtually any time. Although you have visibility of the metadata that is being collected, your data will not be readable because there is no available authentication information. Moreover, the node will be deleted from the laptop after the completion of the analysis. (Note: If the IBM SmartCloud Managed Backup infrastructure is deployed on your premises instead of an IBM data center, then you are responsible for the physical security of the data.) Summary In addition, safeguards are in place after data reaches the end of the retention period. If a backup set is deleted—for example, overwriting the data during daily maintenance—or if test data has been generated during a recovery test in the provisional data center, we can erase the old data, and in many cases, deliver the log from the erased job. Business complexities have rendered organizations susceptible to risks from data loss and corruption, and mitigating these risks is an immediate priority. As an industry-leading provider of cloud-based resiliency services, IBM combines best-of-breed hardware, software and services to provide you with an expansive cloud solution. Our highly trained specialists make it possible for your IT personnel to focus on more important business priorities. IBM can demonstrate the use of advanced technology for an effective backup system, along with service management best practices, physical security measures and wide reporting and analytics capabilities for enhanced security review. We have extensive experience managing thousands of information protection clients with more than 1 million backups per month, which can increase your confidence in our ability to safeguard your information. When tapes have reached the end of their lifecycle, they are destroyed on-premise by a tape services provider. A certificate of destruction is furnished by the provider in order to better manage compliance for secure destruction. Depending on the customer’s preference, the destruction may be witnessed by both IBM SmartCloud Managed Backup personnel and customer personnel. Similarly, disk devices storing customer data are subjected to a data scrub in order to completely sanitize the disks prior to being removed from service. Several different disk scrub types are available based on the customer’s specific 7 For more information To learn more about the IBM SmartCloud Managed Backup, please contact your IBM marketing representative or IBM Business Partner, or visit the following website: ibm.com/services/continuity © Copyright IBM Corporation 2012 IBM Global Services New Orchard Road Armonk, NY 10589 Produced in the United States of America September 2012 IBM, the IBM logo, ibm.com, SmartCloud, Tivoli, and System x are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency which is now part of the Office of Government Commerce. ITIL is a registered trademark, and a registered community trademark of The Minister for the Cabinet Office, and is registered in the U.S. Patent and Trademark Office Not all offerings are available in every country in which IBM operates. This document is current as of the initial date of publication and may be changed by IBM at any time. THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. The client is responsible for ensuring compliance with laws and regulations applicable to it. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the client is in compliance with any law or regulation. Actual available storage capacity may be reported for both uncompressed and compressed data and will vary and may be less than stated. Please Recycle BUW03021-USEN-02
© Copyright 2024