Hi folks.
Speaker:This week, I learned something new.
Speaker:We talk about sheltered Harbor certification, which is a framework for
Speaker:financial institutions to make sure that they can recover after a cyber attack.
Speaker:I think there's a lot to learn for all of us, not just financial institutions.
Speaker:Hope you enjoy the episode.
W. Curtis Preston:Hi, and welcome to Backup Central's Restore It all podcast.
W. Curtis Preston:I'm your host, w Curtis Preston, AKA Mr.
W. Curtis Preston:Backup.
W. Curtis Preston:And I have with me my dust collector consultant Prasanna
W. Curtis Preston:Malaiyandi how's it going?
Prasanna Malaiyandi:am good, Curtis.
Prasanna Malaiyandi:I do have to let you know I have a pretty bad allergy to
Prasanna Malaiyandi:dust, so I may not be the right
Prasanna Malaiyandi:person.
, W. Curtis Preston:that makes you the perfect, but, but, but, but I have to
, W. Curtis Preston:say, you're not doing a very good job because I keep buying and buying the
, W. Curtis Preston:wrong, like I gotta connect this to that.
, W. Curtis Preston:And the thing with the thing cuz
Prasanna Malaiyandi:know, you.
W. Curtis Preston:you
Prasanna Malaiyandi:You know what you really need to do.
Prasanna Malaiyandi:So for the listeners, this is Curtis is, has his wood shop up and running.
Prasanna Malaiyandi:He has a bunch of tools which produce a lot of dust, and therefore he's
Prasanna Malaiyandi:trying to build like a dust collection system to spare me from dying.
Prasanna Malaiyandi:So, um, one of the things though is like each one has a different size adapter.
Prasanna Malaiyandi:Some are one and a half inches, some are two inches
W. Curtis Preston:One and
Prasanna Malaiyandi:and some,
W. Curtis Preston:two and a half, four.
W. Curtis Preston:Uh, and, and then non-standard sizes.
W. Curtis Preston:There's also non-standard sizes.
W. Curtis Preston:Yeah.
Prasanna Malaiyandi:Yeah.
Prasanna Malaiyandi:So what you need to do, Curtis, and I think this will help you a lot, is you
Prasanna Malaiyandi:need to draw a picture on a piece of paper with your various equipment pieces
Prasanna Malaiyandi:with the size of those, so then you can figure out what you need and what you have
W. Curtis Preston:Yeah.
W. Curtis Preston:The, you know, what's that
Prasanna Malaiyandi:planning?
W. Curtis Preston:Yeah.
W. Curtis Preston:Well, it's not just that, like I recently found out that D DeWalt makes.
W. Curtis Preston:on purpose makes non-standard sized dust ports on some of their machines because
W. Curtis Preston:they sell a dust collection system.
W. Curtis Preston:And so they're like, well, it works with the DeWalt dust collection system, right?
W. Curtis Preston:Which I don't even see for sale anywhere.
W. Curtis Preston:I'm sure it is for sale somewhere, but so like half of my tools have
W. Curtis Preston:standard size ports, although they're not all the same size.
W. Curtis Preston:And then some of my tools like the table, and the, the sander has
W. Curtis Preston:a total non-standard, uh, port.
W. Curtis Preston:Um, and so this is what is, is apparently this is a problem being
W. Curtis Preston:solved by 3D printers and Etsy
Prasanna Malaiyandi:yep.
Prasanna Malaiyandi:Oh, I could totally see.
W. Curtis Preston:Yeah.
W. Curtis Preston:Yeah.
W. Curtis Preston:It's a little cottage industry of people selling, you know, the thing to the thing.
W. Curtis Preston:Um,
Prasanna Malaiyandi:You should get into this business, Curtis.
Prasanna Malaiyandi:I bet you can get a 3D scanner, right?
Prasanna Malaiyandi:3D scan?
Prasanna Malaiyandi:No, no, no.
Prasanna Malaiyandi:First you need a 3D scanner so you can scan the dust port collectors, right?
Prasanna Malaiyandi:That you have already, and then you use that to build the adapters.
W. Curtis Preston:you know, what I do is I go down to Lowe's and,
W. Curtis Preston:and, you know, use a caliper.
W. Curtis Preston:, can't you just use a caliper?
W. Curtis Preston:Right.
W. Curtis Preston:Um, I think I could make it happen, but yeah.
W. Curtis Preston:Uh, this is a thing.
W. Curtis Preston:Um, but, uh, yeah, so these are the problems that I have with my
W. Curtis Preston:expensive, my new expensive hobby.
W. Curtis Preston:Um, but so, you know, our, our guest that, uh, we're having on, he's a,
W. Curtis Preston:he's a repeat guest and last time.
W. Curtis Preston:we were talk, you know, we had him on the podcast.
W. Curtis Preston:He threw out this phrase, and, you know, we were immediately
W. Curtis Preston:like, what, what is, what is that?
W. Curtis Preston:What is that thing?
W. Curtis Preston:And so we decided to have him back, uh, just to talk about that.
W. Curtis Preston:We'll talk about that in a minute.
W. Curtis Preston:He's been in the industry for over 30 years, um, and, um, he
W. Curtis Preston:is now the enterprise architect at Presidio Network Solutions.
W. Curtis Preston:Welcome to the podcast, Eric Bursley.
Eric Bursley:All right, Thank you Curtis, and thank you Prasanna.
W. Curtis Preston:So
Prasanna Malaiyandi:Glad to have you back
W. Curtis Preston:Yeah.
W. Curtis Preston:So this little phrase that you threw out was this Sheltered Harbor
W. Curtis Preston:certification, which, you know, I think, I think you threw a little
W. Curtis Preston:shade at me saying that, you know, you were a little surprised that, uh, Mr.
W. Curtis Preston:Backup didn't know about this, backup centric, uh, thing.
W. Curtis Preston:Uh, so why, why don't we back up a little bit and.
W. Curtis Preston:Sort of set the stage in terms of what, you know, I always want to know
W. Curtis Preston:how, you know, how did we get here?
W. Curtis Preston:Um, so first off, maybe let's do what real quick, like a, you
W. Curtis Preston:know, a 20-second overview of what Sheltered Harbor certification is.
Eric Bursley:So Sheltered Harbor Certification is a,
Eric Bursley:first of all, sheltered Harbor is a nonprofit organization.
Eric Bursley:It is an independent organization that provides.
Eric Bursley:Um, a financial institution with an assurance that they can provide back
Eric Bursley:to their users, their customers, that their data is resilient
Eric Bursley:against a ransomware attack.
Eric Bursley:So, um, with that, it it, it's supposed to, um, provide them with more confidence
Eric Bursley:that if something happens to my bank through a ransomware attack, What
Eric Bursley:data I had available to me yesterday will be available to me once they
Eric Bursley:recover, typically within 24 hours.
Prasanna Malaiyandi:and.
Prasanna Malaiyandi:Because it's Sheltered Harbor certification.
Prasanna Malaiyandi:I'm guessing, do they actually own the data and the processes and everything
Prasanna Malaiyandi:else, or are they just sort of like NIST or some of these other organizations where
Prasanna Malaiyandi:they're like, Hey, here are the standards.
Prasanna Malaiyandi:Here's like the best practices.
Prasanna Malaiyandi:Here are the things you should be following in order to be able to do.
Prasanna Malaiyandi:It's kind of like how, if you're doing credit card transaction, right, you have
Prasanna Malaiyandi:to do like P C I certification, right?
Prasanna Malaiyandi:In order to be able to handle credit cards.
Prasanna Malaiyandi:Is that kind of how this.
Eric Bursley:So yeah, Shelton Harbor is more of a framework , um, in
Eric Bursley:place, they make some recommendations, um, that if followed, um, you
Eric Bursley:can apply for certification.
Eric Bursley:And if you follow their framework, um, strictly, they would be able to
Eric Bursley:provide you with that certification saying that, yes, you are good.
Eric Bursley:Um, and that, um, you can, uh, put our name on your website
Eric Bursley:that your data is gonna be safe.
Eric Bursley:Um, so what is the.
Prasanna Malaiyandi:And that is, when you say that you can get that
Prasanna Malaiyandi:certification, is that a customer, like a bank in your example, or is that
Prasanna Malaiyandi:like a vendor who provides the service?
Eric Bursley:It's typically the, the bank gets the certification, the bank
Eric Bursley:is applying for the certification.
Eric Bursley:Um, now in order to achieve that certification, the bank has to have
Eric Bursley:certain things already in place.
Eric Bursley:Um, the first of which is a data vault.
Eric Bursley:For their backup data.
Eric Bursley:Um, so, you know, following the traditional 3 21 rule, um, that offsite
Eric Bursley:copy would be an immutable copy that is operationally air gapped, um, and
Eric Bursley:also scanned for any vulnerabilities so that you would be able to determine a
Eric Bursley:specific point in which you are clean.
Eric Bursley:To restore, um, into an integrated recovery environment or an i r e.
Eric Bursley:Um, so it, it's a set of processes.
Eric Bursley:It's not just, I have tape which tape is traditionally immutable, um, but
Eric Bursley:I am also actively scanning my data vault that is immutable so that I know
Eric Bursley:which restore points I can restore.
W. Curtis Preston:So, uh, yeah, so, so a lot of questions that come up there.
W. Curtis Preston:So the first would be, what is it about banks?
W. Curtis Preston:that make them want to be to, to, to achieve a certification like this.
W. Curtis Preston:What you know, why isn't this just for everybody?
Eric Bursley:Well, the, the process.
Eric Bursley:Could be applied for everybody.
Eric Bursley:Um, but sheltered Harbor is focusing on the financial industry in particular.
Eric Bursley:Um, mostly because if we don't have access to our money, we can't do anything.
Eric Bursley:Um, so that was their primary target around this.
Eric Bursley:But the process that they have, it's solid for all in.
Eric Bursley:and, and Presidio recommends this for all industries as well.
Eric Bursley:Um, and, and one of my feature workshops I talk about, um, data immutability.
Eric Bursley:And that that, uh, third copy of your data, that offsite copy should be
Eric Bursley:in a separate authentication domain so that it is protected against
Eric Bursley:any sort of credential compromise.
Eric Bursley:It's immutable, but it Shelter Harbor adds onto that and says it's also
Eric Bursley:verifiable that you know when to restore and how are you going to restore into
Eric Bursley:a a disaster recovery environment.
Prasanna Malaiyandi:Interesting.
Prasanna Malaiyandi:So, yeah, like Curtis said, I have a ton of questions just like
Prasanna Malaiyandi:popping up in my head right now.
Prasanna Malaiyandi:Um, you talked about, one aspect that I wanna go back to is
Prasanna Malaiyandi:like that operational air gap.
Prasanna Malaiyandi:Right.
Prasanna Malaiyandi:And sort of how do they define that?
Prasanna Malaiyandi:Because I know I've heard about, okay, strict air gap where it's
Prasanna Malaiyandi:like physical isolation completely.
Prasanna Malaiyandi:Sometimes we talk about virtual air gaps.
Prasanna Malaiyandi:Is operational air gap different in some way or has some unique characteristics?
Eric Bursley:So one of the unique characteristics is that
Eric Bursley:it's typically firewalled.
Eric Bursley:From the production environment, um, typically through some natted
Eric Bursley:firewall that allows from the protected environment outbound to pull the
Eric Bursley:data back into the environment.
Eric Bursley:So it's not a, it's never a push, uh, environment from production
Eric Bursley:into the backup because that has a potential for compromise.
Eric Bursley:But if it's a pull.
Eric Bursley:In the environment, that is schedulable.
Eric Bursley:No firewall ports need to be opened up at any time from production in, because
Eric Bursley:it's an outbound connection and it's able to log in to the production environment
Eric Bursley:and through that process, pull in a specific restore point, scanning it in
Eric Bursley:the process for known vulnerabilities, and then continually scanning it in
Eric Bursley:the future for future vulnerabilities.
Prasanna Malaiyandi:Gotcha.
Prasanna Malaiyandi:And when you talk about the pull mechanism, that totally makes sense.
Prasanna Malaiyandi:When it lands in the vault, is it sort of in an isolated spot?
Prasanna Malaiyandi:Like, I'm just wondering in my head like it's kind of like you wanna make
Prasanna Malaiyandi:sure whatever's in the vault is sort of.
Prasanna Malaiyandi:valid has been verified that there are no compromises in it and you
Prasanna Malaiyandi:can't necessarily trust the production not to have any, because you don't
Prasanna Malaiyandi:know what the state is there.
Prasanna Malaiyandi:And so I guess when you're transferring the data, are you sort of transferring
Prasanna Malaiyandi:it into an isolated bucket inside of the vault that then gets scanned
Prasanna Malaiyandi:and verified before it's sort of marked as verified, and valid.
Prasanna Malaiyandi:So nothing bad can happen of that.
Eric Bursley:So it is a continual process.
Eric Bursley:The initial pull is scanned, uh, against the current known vulnerabilities
Eric Bursley:using machine learning, ar artificial intelligence, but then future restore
Eric Bursley:points are also scanned at those points.
Eric Bursley:, but it's also scanned during a recovery operation, which it, it's critical to
Eric Bursley:have that integrated recovery environment that's separate from production.
Eric Bursley:Okay.
Eric Bursley:Um, and through that integrated recovery environment, again, it's
Eric Bursley:network isolated from production, you can actually determine a safe point.
Eric Bursley:to bring things back up.
Eric Bursley:You may be able to have, um, a, a particular application server restored
Eric Bursley:two point B, but then pull clean data in from production to bring it more current.
Eric Bursley:So it, it just provides you that specific point that you
Eric Bursley:can be assured that you are.
W. Curtis Preston:Yeah.
W. Curtis Preston:You know, th this brings up a, a topic that I've been looking
W. Curtis Preston:at a lot lately, which is I, if.
W. Curtis Preston:We're going to, um, cuz it's one thing.
W. Curtis Preston:I don't know, there's a lot of things going on in my head.
W. Curtis Preston:All right.
W. Curtis Preston:So, uh, you know, I, I, I hear you talking about pre-scan and
W. Curtis Preston:post-scan and that all sounds great.
W. Curtis Preston:Um, I'm gonna throw out a little shade and say if the pre-scan at the
W. Curtis Preston:backup finds the ransomware, why didn?
W. Curtis Preston:Like some regular virus scanning tool.
W. Curtis Preston:Find it already.
W. Curtis Preston:I don't, I, I don't, I don't know why that, why one would work
W. Curtis Preston:and the other would not work.
W. Curtis Preston:Um, but I'm not saying it's not a good idea to do it.
W. Curtis Preston:I'm just, it's just, that popped up in my head.
Eric Bursley:Well, that that speaks to the maturity model of the
Eric Bursley:organization's security infrastructure.
Eric Bursley:Some organizations don't have a SEIM in place.
Eric Bursley:They don't have a current, um, Antivirus that it includes, um, artificial
Eric Bursley:or AI ml into those technologies.
Eric Bursley:So based on the NIST framework, they're not preventing the infection from coming
Eric Bursley:in, and it's up to the recovery process of the NIST framework to bring you back.
Eric Bursley:Preferably, it is a multi-faced approach like NIST calls.
W. Curtis Preston:Yeah, it is just that, you know, as big of a fan as I
W. Curtis Preston:am, a backup, if you're relying on your backup system to let you know you got
W. Curtis Preston:a virus or malware of any kind, uh, I don't know what to tell you anyway.
W. Curtis Preston:I, yeah, but I'm not saying that that doesn't happen.
W. Curtis Preston:I'm just saying I'm not sure I agree with that plan.
W. Curtis Preston:Um, There's been a thought that I've been thinking a lot about lately and, and, and
W. Curtis Preston:it comes from the fact that we know, based on the stuff that's been published, that
W. Curtis Preston:the average dwell time or the mean dwell time of malware is well over 60 days.
W. Curtis Preston:So if, if, if the malware has been in your environment for, for a long time, and,
W. Curtis Preston:and maybe it hasn't deployed, maybe it hasn't done anything, maybe it hasn't,
W. Curtis Preston:um, um, you know, encrypted any data, and then it doesn't generally wreak
W. Curtis Preston:havoc until it starts encrypting data.
W. Curtis Preston:Um, and, but you, meanwhile you've probably created weeks and weeks
W. Curtis Preston:and weeks of backups of the machine with the malware still on it,
W. Curtis Preston:which you didn't notice, right.
W. Curtis Preston:You can scan all you want.
W. Curtis Preston:Some of this stuff isn't noticeable or, or you know, it's
W. Curtis Preston:easy once you find it, right.
W. Curtis Preston:Once you find it, you get the signature and then you can um, right, you can then
W. Curtis Preston:you can scan for that specific signature.
W. Curtis Preston:But a general scan doesn't necessarily pick it up.
W. Curtis Preston:So then my question is, well, what does the organization do?
W. Curtis Preston:And you know, what would be my recommendation?
W. Curtis Preston:Um, you know, and of course then they're, they're free to do whatever they want.
W. Curtis Preston:I know some people have talked about, well, I need to restore
W. Curtis Preston:from before I even got infected.
W. Curtis Preston:That is an option.
W. Curtis Preston:But to me that if, if the dwell time is 60 days, or, or it could be, it
W. Curtis Preston:could be as much as 120 days from what I've seen, um, that doesn't
W. Curtis Preston:seem like a viable option to me.
W. Curtis Preston:To start from a greenfield, restore the, the VM image from 121 days ago,
W. Curtis Preston:and then somehow bring it, right?
W. Curtis Preston:Because, um, it just, it gets, and you, and then you look at the, um, the
W. Curtis Preston:complications involved with, um, all of the, um, different ways in which we.
W. Curtis Preston:OSS and non oss, you know, things like containers, um, and applications, and we
W. Curtis Preston:have VMs and we have physical servers and on-premise VMs on, uh, cloud-based VMs.
W. Curtis Preston:This is just like deciding that, making that decision.
W. Curtis Preston:Um, it just seems really, uh, a difficult one that I think
W. Curtis Preston:environments have to decide.
W. Curtis Preston:I know there was, there was no question anywhere in that
Prasanna Malaiyandi:I was waiting.
Prasanna Malaiyandi:I was like, should I tell Curtis he's on a rant?
Eric Bursley:Right.
Eric Bursley:So
Eric Bursley:that, that's essentially where a partner like Presidio can come in.
Eric Bursley:We can help advise, um, specifically leveraging a tool that, um, I help
Eric Bursley:produce called our ransomware workshop.
Eric Bursley:It is a free offering that we offer our clients, two and a half
Eric Bursley:hours of discussion with one of our cybersecurity analysts, a data
Eric Bursley:center analyst, which focuses on primary storage and backup recovery.
Eric Bursley:And working with a C level as well as the engineers at a specific customer
Eric Bursley:identify potential problems such as you don't have a SEIM in place, you don't
Eric Bursley:have a current antivirus solution in place such as CrowdStrike or cyber reason.
Eric Bursley:Um, you don't have a, a good initial protection of that.
Eric Bursley:And then, , you know, from a backup recovery standpoint, what are you using?
Eric Bursley:How are you backing up your data?
Eric Bursley:Are you following the 3 21 rule?
Eric Bursley:Do you have an operationally air gap vault for that offsite copy?
Eric Bursley:Those are the questions that we bring up, and then we can help address some
Eric Bursley:of those problems over time, whether it's a financial customer or not.
Eric Bursley:Okay.
Eric Bursley:This.
Eric Bursley:Offered to everybody.
Eric Bursley:Um, and then once we understand the direction you need to go with
Eric Bursley:that vision, um, that we provide, um, we can then start chipping away
Eric Bursley:at those questions that you have.
Eric Bursley:Um, and we do that as an diagnostic type of service.
Eric Bursley:So, um, outside of the vendors, we may bring up vendors in the conversation,
Eric Bursley:but we're trying to solve that business, uh, problem and then aligning.
Eric Bursley:Those requirements to a technology vendor,
Prasanna Malaiyandi:I think having that process, that
Prasanna Malaiyandi:approach totally makes sense.
Prasanna Malaiyandi:And just going back to Curtis's rant, quote unquote rant, right?
Prasanna Malaiyandi:I think honestly, it's going to depend, right?
Prasanna Malaiyandi:I don't think you can say that we will always go back 121 days,
Prasanna Malaiyandi:or the best option is always to go pick the latest copy, right?
Prasanna Malaiyandi:I think it is going to depend on the value of the data, how long it takes to recover
Prasanna Malaiyandi:the importance of that application, right?
Prasanna Malaiyandi:All of these things, and I think it's sort of a recovery.
Prasanna Malaiyandi:Right.
Prasanna Malaiyandi:And hopefully you've already planned this ahead of time.
Prasanna Malaiyandi:Right.
Prasanna Malaiyandi:And you know, okay, this is the importance of this data, but it's sort of one of
Prasanna Malaiyandi:those things that at recovery time, you execute your plan in your runbook that you
W. Curtis Preston:yeah, I think it was a rant because I see a lot of people
W. Curtis Preston:talking about, Well, we're just gonna scan, you know, we, we, our, we have
W. Curtis Preston:backup software that will, you know, we, we can identify the, the hash, we
W. Curtis Preston:can give the hash to the backup product.
W. Curtis Preston:It can scan for that, you know, we know where the malware is.
W. Curtis Preston:And then we'll just restore from before the malware hit.
W. Curtis Preston:And, and I just wanna say, um, to 121 days ago that, that's what, that's
W. Curtis Preston:why I just, it, it, you're right.
W. Curtis Preston:It's not simple.
W. Curtis Preston:Um,
Eric Bursley:It's not
Prasanna Malaiyandi:and I think Eric had brought it up earlier.
Eric Bursley:yeah.
Eric Bursley:You don't necessarily have to restore to 120 days ago.
Eric Bursley:You can restore from the latest copy of just the data that is clean.
Eric Bursley:Okay.
Eric Bursley:Um, not everything on the system is encrypted, so you need to pull the
Eric Bursley:data prior to the full encryption that ransomware is going to.
Eric Bursley:That is a point, then you can start saying, okay, how did it get in looking
Eric Bursley:for the executable in that environment and then removing it or deactivating it.
Eric Bursley:And it's critical to look not just for static files, but also um, Shell less,
Eric Bursley:or I should say, um, script, less sort of, um, vulnerabilities because
Eric Bursley:they're able to actually execute some of these processes in memory
Eric Bursley:without writing anything out to disk.
Prasanna Malaiyandi:Yeah.
Prasanna Malaiyandi:I think the other thing is when you're also doing that recovery, sort of
Prasanna Malaiyandi:doing it in an isolated fashion, right?
Prasanna Malaiyandi:Where
Prasanna Malaiyandi:maybe you don't have that network connectivity, right?
Prasanna Malaiyandi:So they can't call out to their C N C servers, right?
Prasanna Malaiyandi:Their command and control servers and get additional
Prasanna Malaiyandi:information and kickstart things.
Eric Bursley:E.
Eric Bursley:Exactly.
Eric Bursley:And there are OEMs that offer these types of solutions and, and
Eric Bursley:Presidio can recommend them all.
Eric Bursley:And these are not a limited list of solutions either.
Eric Bursley:Um, but they're, um, solutions that can become safe Harbor
Eric Bursley:certified when deployed.
Eric Bursley:Um, they're not in itself guaranteeing safe harbor.
Eric Bursley:You still have to implement them, right?
Eric Bursley:You still have to create your run.
Eric Bursley:Um, and any sort of automation around it.
Eric Bursley:Um, but they definitely give you a leg up, uh, around achieving that certification.
Prasanna Malaiyandi:and would you get that certification?
Prasanna Malaiyandi:, that's for a point in time.
Prasanna Malaiyandi:Right.
Prasanna Malaiyandi:Is there sort of audits done things you have to show, like
Prasanna Malaiyandi:as your environment changes, as things happen to keep up to date?
Prasanna Malaiyandi:Or is it sort of a one and done thing?
Eric Bursley:You do have to get re certified.
Eric Bursley:Um, over time, um, this is because policies do change,
Eric Bursley:recommendations do change.
Eric Bursley:Um, technologies do change, you know, containers, for example.
Eric Bursley:Um, how are you protecting your container workload?
Eric Bursley:It's.
Eric Bursley:Regardless of what the original intent of immutable containers are, people are
Eric Bursley:persisting data in their containers.
Eric Bursley:How are you protecting those?
Eric Bursley:The data as well as the ecosystem of your Kubernetes or your Docker, uh,
Eric Bursley:automation system that goes into it.
Eric Bursley:There are strategies around that.
Prasanna Malaiyandi:I'm gonna take Curtis's favorite question that he
Prasanna Malaiyandi:loves to ask in topic, actually, which is, Does Safe Harbor Certification
Prasanna Malaiyandi:talk Anything about SaaS applications?
Eric Bursley:It is.
Eric Bursley:I would say that it doesn't necessarily, um, Dictate one way or the other.
Eric Bursley:It does say that you are protecting your data in this fashion.
Eric Bursley:So if you're using a SaaS uh provider such as Microsoft 365, are you backing it up?
Eric Bursley:And then are you storing that data in a vault?
Eric Bursley:Um, and that you can actually do an operational recovery?
Eric Bursley:You know, same, same thing with salesforce.com.
Eric Bursley:They just started implementing backup through their API for salesforce.com.
Eric Bursley:Are you protecting that data, storing it in a vault and that becomes
Eric Bursley:that, that, you know, sort of.
Eric Bursley:Ecosystem that that pattern.
Eric Bursley:So they're not dictating SaaS, they're not dictating on-prem,
Eric Bursley:they're not dictating cloud.
Eric Bursley:What they are saying is that you have a copy of your data in a vault
Eric Bursley:that is operationally air gapped.
Prasanna Malaiyandi:Yeah, I was referring also mainly to like SaaS applications.
Prasanna Malaiyandi:But you covered it, Eric, like Microsoft 365.
Prasanna Malaiyandi:Because a lot of times Right, people are, Curtis, you and I hear this all
Prasanna Malaiyandi:the time, it's like, Hey, Microsoft 365, there's no need to back it up.
Prasanna Malaiyandi:Right.
Prasanna Malaiyandi:And I know that's one of, uh, Curtis's big pet peeves.
Eric Bursley:It, it's one of mine too.
Eric Bursley:I hear a lot.
Eric Bursley:Um, every one of my customers are not backing up their
Eric Bursley:Microsoft 365 environment.
Eric Bursley:And I advise them that they should.
Eric Bursley:And then I describe the differences between archive, which they do
Eric Bursley:provide any true backup solution, which they don't provide.
W. Curtis Preston:So, um, I should probably take notes
W. Curtis Preston:so that I can keep track.
W. Curtis Preston:, my questions are coming in various, in various ways, but the
W. Curtis Preston:one that's in my head right now.
W. Curtis Preston:So I know that you have this, this concept of, um, uh, alliance partners and I do
W. Curtis Preston:see, you know, a couple of companies on there, obviously that I recognize.
W. Curtis Preston:There's only one that says endorsed.
W. Curtis Preston:Um, and I'm, and it's Dell.
W. Curtis Preston:And it says, uh, they, they can help your financial institution expedite sheltered
W. Curtis Preston:Harbor Data Protective certification with long name the first turnkey data
W. Curtis Preston:vaulting solution to receive endorsement for meeting all of the requirements
W. Curtis Preston:of the Sheltered Harbor standard.
W. Curtis Preston:That's interesting.
W. Curtis Preston:So there wa there there was some sort of process that they went through to
W. Curtis Preston:satisfy someone at Sheltered Harbor.
W. Curtis Preston:Enough.
W. Curtis Preston:that they can say, this solution meets all of the requirements.
W. Curtis Preston:Um, and, and the, because there are other companies, right, that are on
W. Curtis Preston:there listed as alliance partners that would be competitors of Dell.
W. Curtis Preston:Um, and, and by the way, before we continue a little bit farther, I'm just,
W. Curtis Preston:I forgot to throw out our disclaimer.
W. Curtis Preston:Uh, I work for Druva, Prasanna, works for Zoom, and uh, although
W. Curtis Preston:we're talking about very, you know, stuff right up our neighborhood,
W. Curtis Preston:this is an independent podcast and the opinions that here are ours.
W. Curtis Preston:And, uh, if you wanna join the conversation, please reach
W. Curtis Preston:out to me at w Curtis Preston.
W. Curtis Preston:On Twitter, I'm sorry, WC Preston on Twitter or w Curtis Preston gmail.
W. Curtis Preston:And, um, you know, and say, Hey, I got stuff to talk about in this neighborhood.
W. Curtis Preston:Um, and uh, also be sure to rate us, um, just scroll down to the bottom.
W. Curtis Preston:You're probably listening on Apple Podcast.
W. Curtis Preston:Most of you are.
W. Curtis Preston:Just scroll down to the bottom there.
W. Curtis Preston:Click, click five stars.
W. Curtis Preston:Hey, give us six stars.
W. Curtis Preston:I'm fine with that.
W. Curtis Preston:And, uh, give us a comment.
W. Curtis Preston:We love that.
W. Curtis Preston:Um, so yeah, so I see that like some companies are, are listed as alliance
W. Curtis Preston:partners, but only one is listed as endorsed, which surprised me honestly.
W. Curtis Preston:Uh, organizations like this don't tend to endorse it, actually uses that word.
W. Curtis Preston:Uh, any thoughts on that?
Eric Bursley:Well, the Dell Cyber Recovery Solution was one of the first
Eric Bursley:to market, um, with their solution.
Eric Bursley:It is a very strong solution that is powered by their Power Protect gated
Eric Bursley:domain product, um, that can provide you with an immutable, um, solution.
Eric Bursley:Um, the cyber recovery vault, leveraging all of Dell's technology.
Eric Bursley:Dell PowerEdge, Dell Switch.
Eric Bursley:Um, partnership with Sonic Wall Firewall, um, as well as Avamar
Eric Bursley:or Networker or the Power Protect, uh, data Protection Appliance.
Eric Bursley:Um, it, it's an all-encompassing solution.
Eric Bursley:So Sheltered Harbor was able to say if implemented via this process, it
Eric Bursley:gives you that leg up, making it super simple to achieve our certification.
Eric Bursley:They were one of the first to market to do that.
Eric Bursley:, um, since, um, that happened, we've had this thing called a pandemic that
Eric Bursley:shut down a lot of those processes.
Eric Bursley:Um, and Shelton Harbor couldn't go through, um, some of the other OEMs, um,
Eric Bursley:that wanted to achieve this certification.
Eric Bursley:Um, And one of those processes, uh, like I said, was the ability to
Eric Bursley:pull the data into the vault rather than pushing it into the vault.
Eric Bursley:Um, w with that, um, since the pandemic is nearing at its end, um, other
Eric Bursley:products are becoming, um, able to achieve the certification, although they
Eric Bursley:haven't been fully endorsed by Sheldon.
W. Curtis Preston:Gotcha.
W. Curtis Preston:Gotcha.
W. Curtis Preston:Um,
Prasanna Malaiyandi:I think that was why in the beginning I was wondering, Eric,
Prasanna Malaiyandi:around sort of that certification, right?
Prasanna Malaiyandi:If it was the customer, like the bank, or if it was a vendor who was actually
Prasanna Malaiyandi:getting the certification, right.
Prasanna Malaiyandi:Um, I could see that in the case of Dell is like, Hey, we have everything
Prasanna Malaiyandi:packaged together so it becomes easier for the bank or the customer
Prasanna Malaiyandi:to just start, deploy and use it.
Prasanna Malaiyandi:Right.
Prasanna Malaiyandi:But that's why I was wondering like where it actually ends up being.
Eric Bursley:Right.
Eric Bursley:And yeah, the sheltered harbor is granted by the financial
Eric Bursley:institution that is seeking it.
Eric Bursley:Um, there's actually a process that they go through.
Eric Bursley:They have to register as a client of Sheed Harbor and based on how much.
Eric Bursley:Money their institution has, they pay to that specific level and then they
Eric Bursley:go through that process to validate that they have the solution in place.
Eric Bursley:Um, there are definitely other solutions outside of the cyber recovery vault
Eric Bursley:from Dell that can achieve this.
Eric Bursley:It, it's not just limited to that product.
W. Curtis Preston:Uh, I, I'm assuming, um, , you know, if somebody want, if
W. Curtis Preston:a, if a financial organization wanted to join, there would be, there's some
W. Curtis Preston:sort of fee that you need to provide to achieve certification, given that there's
W. Curtis Preston:gonna be a cost involved with somebody
Eric Bursley:Right.
Eric Bursley:Yes.
Eric Bursley:The, there is a, uh, stair stepped approach based on the financial holdings
Eric Bursley:that the, uh, financial institution has.
Eric Bursley:Um, and, and that is published on their website.
Prasanna Malaiyandi:I look at it similar to like when an organization
Prasanna Malaiyandi:goes through like a SOC two audit, right?
Prasanna Malaiyandi:It's kind of like that, right?
Prasanna Malaiyandi:You're getting certified that yes, everything's in place,
Prasanna Malaiyandi:everything's good to go with the solutions that you've chosen,
Eric Bursley:Right.
Eric Bursley:E.
Eric Bursley:Exactly.
Eric Bursley:And this actually would help with the insurance organizations as well, because.
Eric Bursley:Many insurance companies are saying you need to have certain things in place
Eric Bursley:in order to get, you know us to pay for
Eric Bursley:an incident.
Eric Bursley:Right, exactly.
Eric Bursley:To get a rate.
Eric Bursley:If a financial institution goes to an insurance provider and say, Hey,
Eric Bursley:we just received this Safe Harbor certification, the insurance company
Eric Bursley:can actually come back and say, you've done all these check boxes.
Eric Bursley:So we're gonna give you a lower rate, or we're gonna offer you a policy
Eric Bursley:where if the financial institution didn't have this, then they would have
Eric Bursley:to go manually check that themselves.
Eric Bursley:So it, it can streamline your insurance process as well.
W. Curtis Preston:Yeah, it's it.
W. Curtis Preston:What do you think it or, or have you heard that it could
W. Curtis Preston:also assist in lower rates or
Eric Bursley:That would be up to the insurance company, but I would
Eric Bursley:imagine so because it's gonna be less likely that you're unable
Eric Bursley:to recover in a timely fashion.
Eric Bursley:That's one of the things that the insurance company wants to do is
Eric Bursley:ensure that you get back to operational effectiveness as soon as possible.
Eric Bursley:Um, get back to business achieving this certification.
Eric Bursley:Can't assure you that you would be able to be back up and running within 24 hours.
Prasanna Malaiyandi:It's like I, like Curtis said at the start of this,
Prasanna Malaiyandi:right, it was like the first time we had heard about this term, right?
Prasanna Malaiyandi:In being in the backup space.
Prasanna Malaiyandi:Right.
Prasanna Malaiyandi:And I'm wondering like, is it more common?
Prasanna Malaiyandi:Like, is this a well known certification in like the financial institutions
Prasanna Malaiyandi:and in the insurance business?
Prasanna Malaiyandi:Or is this something new and upcoming that is going to take, um, time to achieve
Prasanna Malaiyandi:critical mass, but it is like a future standard that everyone's looking toward.
Eric Bursley:Say that it's more of a future standard at this point.
Eric Bursley:I was just talking with a financial customer yesterday.
Eric Bursley:He was unaware of Shelton Harbor.
Eric Bursley:He actually had to go look it up, and then he was extremely intrigued, uh,
Eric Bursley:around the framework that it offers.
Eric Bursley:Um, and we're gonna have a follow up conversation, um, with him regarding
Eric Bursley:our ransomware workshop that we have so that he can understand the value.
Eric Bursley:You know, protecting his data more with the data vault, um, and how
Eric Bursley:we would implement that so that he can achieve sheltered harbor.
Eric Bursley:Um, I also gave him a reference of one of my larger financial customers that
Eric Bursley:is currently in the process of getting Sheltered Harbor certification so that he
Eric Bursley:can have a one-on-one conversation with.
Prasanna Malaiyandi:Nice.
W. Curtis Preston:Yeah, I, I will say, you know, when I first heard about it,
W. Curtis Preston:and you know, just the first few words, my first worry, which doesn't appear to be
W. Curtis Preston:the case, but my first worry was that this was just, even though it's a nonprofit,
W. Curtis Preston:I mean, anybody can start a nonprofit.
W. Curtis Preston:That it was just a marketing arm, marketing leg, whatever, you know,
W. Curtis Preston:that, you know, like, like in this case it would, I, I would accuse
W. Curtis Preston:Dell of it since they were the first one to get endorsed, right.
W. Curtis Preston:That Dell went and started this.
W. Curtis Preston:So that they could give themselves certification.
W. Curtis Preston:I'm not accusing Dell of anything.
W. Curtis Preston:I'm just saying I was worried that I would, that that's what I
W. Curtis Preston:would find is that I would find a marketing driven organization.
W. Curtis Preston:And that does not appear to be the case.
W. Curtis Preston:It appears that it, this is led by the financial industries or
W. Curtis Preston:the, the financial institutions and the associations, uh, thereof.
W. Curtis Preston:Does that, does that sound about.
Eric Bursley:That would be correct, Curtis.
W. Curtis Preston:Yeah.
W. Curtis Preston:Um, and the, the worry of
Prasanna Malaiyandi:your other worry?
W. Curtis Preston:well, well, that, that the worry came from the fact that
W. Curtis Preston:there is this dual certification, right?
W. Curtis Preston:The certification is for the company, but then there's also this
W. Curtis Preston:potential endorsement of the vendors.
W. Curtis Preston:And, uh, so I was worried that this was just a big ruse for the vendors to
W. Curtis Preston:have a, to put another badge on their.
W. Curtis Preston:but it doesn't appear to be the case.
W. Curtis Preston:Um
Eric Bursley:Yeah.
Eric Bursley:For Dell to come out and say that they were endorsed, it is not,
Eric Bursley:you know, checking the box and say you're certified if you have it.
Eric Bursley:. You can be certified if you have it, but you also have other processes
Eric Bursley:that you have to implement around your enterprise maturity to ensure
Eric Bursley:that you have this process in place.
Eric Bursley:Dell gives you a leg up with their solution.
W. Curtis Preston:Yeah.
Eric Bursley:but like I was saying, there are other solutions
Eric Bursley:that can do this as well.
Eric Bursley:Now it's just a matter of time before they also get endorse.
W. Curtis Preston:Yeah.
W. Curtis Preston:Actually, the fact that the website is kind of a little behind, sort of backs
W. Curtis Preston:up the fact that this isn't a marketing driven thing, , because if this was
W. Curtis Preston:marketing driven, this would be up to date with all those other companies, right?
W. Curtis Preston:Um, and they, they, they throw as much money as they need
W. Curtis Preston:to, to, to get it updated.
W. Curtis Preston:Um,
Prasanna Malaiyandi:The
W. Curtis Preston:Go ahead.
Prasanna Malaiyandi:the one, the other question I had though is I
Prasanna Malaiyandi:think this is a great certification.
Prasanna Malaiyandi:I just feel it's yet another isolated, separate process rather than thinking
Prasanna Malaiyandi:holistically and integrating into some other existing framework.
Prasanna Malaiyandi:Uh, to elaborate a bit, right?
Prasanna Malaiyandi:This is just focused on backup.
Prasanna Malaiyandi:Can you recover your data, right?
Prasanna Malaiyandi:Rather than sort of encompassing, okay, do you have the appropriate
Prasanna Malaiyandi:cybersecurity measures in place?
Prasanna Malaiyandi:And thinking from, let's start from who or let's look
Prasanna Malaiyandi:holistically at your environment.
Prasanna Malaiyandi:Make sure you're just not looking at authorization and login in,
Prasanna Malaiyandi:in that environment, but also across your entire infrastructure.
Prasanna Malaiyandi:Right?
Prasanna Malaiyandi:Do you have the right level, sort of the.
Prasanna Malaiyandi:things, Curtis, that we've talked with Snorkel 42 about, right.
Prasanna Malaiyandi:It's do you have like lease privilege set up and do you have those front
Prasanna Malaiyandi:end cyber monitoring tools to look for malware on production?
W. Curtis Preston:MFA
Prasanna Malaiyandi:like just, and mfa, right?
Prasanna Malaiyandi:It's just seems like this is just such a small portion of things that can go wrong.
Prasanna Malaiyandi:It's a great effort, no doubt about it, but it just feels a
Prasanna Malaiyandi:little isolated and siloed really, when people should be thinking.
Prasanna Malaiyandi:Broadly across their entire organization.
Eric Bursley:Well, e Exactly.
Eric Bursley:And that's where Presidio would talk about the NIST framework so
Eric Bursley:that you can, uh, identify, protect, detect, respond, and then recover.
Eric Bursley:In the terms of the NIST framework, this is addressing the recovery operation.
Eric Bursley:Are you able to successfully recover?
Eric Bursley:Um, but I agree with you that they have to have other processes in place and that
Eric Bursley:leads to their enterprise maturity around do they have the right authorization,
Eric Bursley:authentication systems in place?
Eric Bursley:Are they monitoring?
Eric Bursley:Do they have two factor authentication?
Eric Bursley:Um, do they have geolocation?
Eric Bursley:Turned on in their Azure ad, for example.
Eric Bursley:Um, how are they protecting their users, um, from a user, um, education standpoint?
Eric Bursley:Um, you know, are they using products like no before and other similar
Eric Bursley:products that actually educate users and test users on their functional, um,
Eric Bursley:day-to-day operations that they don't get a ransomware infection to begin?
W. Curtis Preston:So I'm gonna not push back or argue with you persona,
W. Curtis Preston:necessarily with the comment.
W. Curtis Preston:I, I, I, I agree.
W. Curtis Preston:And yet, as a backup guy, I'm saying, well, at least somebody's
W. Curtis Preston:looking after the backups because so many, so much of the anti.
W. Curtis Preston:Ransomware and malware efforts is all on the online stuff, and no one's
W. Curtis Preston:paying any attention to the backups, which is something that, you know,
W. Curtis Preston:we talk about a lot on this podcast where we're saying, Hey, they are
W. Curtis Preston:coming for your backups, or they're directly attacking your backup system.
Prasanna Malaiyandi:
:It's a starting point,
Prasanna Malaiyandi:
:right?
W. Curtis Preston:My, my only thing when I look at, it's like, well,
W. Curtis Preston:it would be nice if organizations who weren't financial organizations
W. Curtis Preston:could, could get a similar level of attention to their backup environment.
W. Curtis Preston:Right.
W. Curtis Preston:Um, and they specifically say, you're only welcome to join and get certification
W. Curtis Preston:if you're a financial institution.
W. Curtis Preston:Um, and I'm like, Hey, you know, there.
W. Curtis Preston:I don't know, a couple of hundred other industries I can think of that
W. Curtis Preston:could really benefit from that as well.
Eric Bursley:There's nothing stopping the, um, other industries from using
Eric Bursley:the framework that Sheltered Harbor has.
Eric Bursley:It's just a matter of, you know, getting the certification.
Eric Bursley:Right now, it is just a financial industry.
Eric Bursley:Um, you know, they may extend that out at some point in the future.
Eric Bursley:Um, that would be up.
W. Curtis Preston:Yeah.
W. Curtis Preston:And who and who is them, by the way?
Eric Bursley:Shelter harbor.org.
W. Curtis Preston:no.
W. Curtis Preston:I know you meant sheltered harbor.
W. Curtis Preston:There are people who, where, where do these people work?
W. Curtis Preston:Are they, are they, do they work for Shelter Harbor?
W. Curtis Preston:Do they work for banks?
W. Curtis Preston:And this is like their side gig.
W. Curtis Preston:What?
W. Curtis Preston:You know, because
Eric Bursley:Yeah, I, I don't get into that, so I don't
Eric Bursley:know.
Eric Bursley:Um, I believe that they're an independent organization outside
Eric Bursley:of the banking industry that's assisting the banking industry.
Eric Bursley:Um, reading their backstory, they came from the banking
Eric Bursley:industry and financial industry.
W. Curtis Preston:Oh, uh, this says it's actually a
W. Curtis Preston:nonprofit subsidiary of FS Isaac.
W. Curtis Preston:So that's the Financial Services information sharing and analysis
W. Curtis Preston:Center for those of you that don't live banking world.
W. Curtis Preston:Um, and devoted to the coordinating the development
W. Curtis Preston:of the Shelter Harbor Standard.
W. Curtis Preston:I like that.
W. Curtis Preston:Um,
Prasanna Malaiyandi:Is there framework available online, do you know?
Prasanna Malaiyandi:Or do you have to
W. Curtis Preston:I've been, I've been scrolling around.
W. Curtis Preston:I didn't see the framework anywhere.
Eric Bursley:Right.
Eric Bursley:So you have to become one of their clients to get all of
Eric Bursley:the requirements, um, in place.
Eric Bursley:Um, the OEMs have those requirements, um, so that, you
Eric Bursley:know, they can tell you what it is.
Eric Bursley:But when you apply for membership, then you're going to get the
Eric Bursley:actual certification requirements to go and check the box.
Prasanna Malaiyandi:See, this is what annoys me though, is that it's
Prasanna Malaiyandi:like, this is a great framework.
Prasanna Malaiyandi:We want everyone to use this.
Prasanna Malaiyandi:I know they want the financials, but it's broadly applicable, and yet
Prasanna Malaiyandi:you have to jump through all these hoops just to even try to get to
Prasanna Malaiyandi:see the list of, hey, what's there?
W. Curtis Preston:yeah.
W. Curtis Preston:So I'm gonna, I'm gonna have to disagree with what you said earlier, Eric,
W. Curtis Preston:when you said there's nothing stopping them from implementing the standard.
W. Curtis Preston:Uh, yeah, it is.
W. Curtis Preston:They don't even, I can't even find out what the standard is if they can't join.
Eric Bursley:on their website they tell you that you need to
Eric Bursley:implement a data vault and that you have to have a resiliency plan in
W. Curtis Preston:Right.
Eric Bursley:Um,
Prasanna Malaiyandi:Or, or I would say that you could work with
Prasanna Malaiyandi:the company like Presidio, right?
Prasanna Malaiyandi:Who knows these standards and who's providing a more holistic thing, right?
Prasanna Malaiyandi:So it is possible,
Eric Bursley:Right.
Eric Bursley:It is
Prasanna Malaiyandi:but it's not as easy for anyone to be like, Hey, what is there?
Prasanna Malaiyandi:Right.
Prasanna Malaiyandi:I think that's my problem is it shouldn't be a secret
W. Curtis Preston:And, and yeah.
W. Curtis Preston:And I don't think it's secret per se.
W. Curtis Preston:I, I agree with you, Eric.
W. Curtis Preston:I mean, I'm looking, they have like why Sheltered Harbor?
W. Curtis Preston:And they, they've got a nice little page on the, the different stuff.
W. Curtis Preston:Um, I don't know, maybe the, somewhere between where they are and I don't know.
W. Curtis Preston:I, I don't know why they would, I, I think maybe there could be a, these are.
W. Curtis Preston:20 things you need to do.
W. Curtis Preston:I think they're giving a high level plan.
W. Curtis Preston:Perhaps they could do a low level plan.
W. Curtis Preston:Perhaps they could say, Hey, you can't join, but hey, for a hundred
W. Curtis Preston:bucks you could have the, whatever, whatever it is we're missing.
W. Curtis Preston:Um, but, uh, or maybe we're not missing that much.
W. Curtis Preston:I don't know.
W. Curtis Preston:, we don't know what we don't know.
W. Curtis Preston:Um, yeah, but it, I applaud the, I applaud the effort to make backups
W. Curtis Preston:more resilient, uh, and to, and.
W. Curtis Preston:also, what I'm seeing here is the resiliency plan.
W. Curtis Preston:That's what it's really about, right?
W. Curtis Preston:It's, it's almost less about what backup product that you use.
W. Curtis Preston:It is definitely about how you use it, right?
W. Curtis Preston:Um, but it's about what, earlier we had this discussion about
W. Curtis Preston:how are we going to, with the.
W. Curtis Preston:Scenarios that you, that you've got in terms of infection and encryption
W. Curtis Preston:and what decisions are you gonna make.
W. Curtis Preston:That's what you need to discuss upfront, right?
W. Curtis Preston:Okay.
W. Curtis Preston:We've got aws, we've got VMware, we've got physical machines, we've
W. Curtis Preston:got these kind of application servers, we've got a file server.
W. Curtis Preston:Here's what we need to make the decision upfront, what we're gonna
W. Curtis Preston:do with all those various things.
W. Curtis Preston:Right?
W. Curtis Preston:Given there are different.
Eric Bursley:What Well, exactly, and, and part of their framework, they talk
Eric Bursley:about an incident management plan.
Eric Bursley:You know, do you have an incident response process?
Eric Bursley:Um, and it, it can be as simple as, you know, filling out a ServiceNow ticket
Eric Bursley:and, um, either an automated or a manual process kicks off a, a security.
Eric Bursley:, um, as we call it here, um, which is different than your operational
Eric Bursley:or disaster recovery re restore of your application following
Eric Bursley:that incident response plan.
Eric Bursley:You know, calling the insurance carrier, Hey, so-and-so was infected.
Eric Bursley:It took down this specific system.
Eric Bursley:We are in the process of recovering it and they know from their incident
Eric Bursley:response plan that they have to have that current system isolated so that it
Eric Bursley:can be investigated for future forensic.
W. Curtis Preston:Yeah.
Eric Bursley:um, a proper communications plan.
Eric Bursley:Who's talking to who, who's making decisions?
Eric Bursley:Um, you know, how are you going to get back to normal operations?
Eric Bursley:Because if you fail over to that isolated recovery environment,
Eric Bursley:eventually that's going to cost you more money than you would like.
Eric Bursley:So how do you bring that back into your production
Eric Bursley:environment, which may be on pre.
Eric Bursley:and your, uh, i r e, your integrated, uh, recovery environment could be up in aws.
Eric Bursley:Um, are you testing your backups?
Eric Bursley:Something that many of my customers don't do regularly.
Eric Bursley:Um, I wish they would, but, um, they're not testing their environment to verify
Eric Bursley:that one, are their backups good?
Eric Bursley:But are they operationally?
Eric Bursley:um, not just, I have my exchange server or SQL server backed up, but I'm able to
Eric Bursley:bring it back up, test it with your active directory, verify ports are functional,
Eric Bursley:verify that I'm able to send and receive messages, and then shut it down.
Eric Bursley:Is this is a valid restore point.
Eric Bursley:It So having that, um, resiliency plan in place, I think is probably the more
Eric Bursley:important part of having Shelter Harbor certification than just the data.
Prasanna Malaiyandi:And
W. Curtis Preston:Yeah.
Prasanna Malaiyandi:And is a lot of this, I'm guessing, is automated as well, right?
Prasanna Malaiyandi:Because I can't imagine doing this sort of verification and recovery processes.
Prasanna Malaiyandi:In a periodic fashion, like given the scale of some of this data.
Eric Bursley:Well, some of the products that are offered such as, uh, VMware's
Eric Bursley:Cloud, disaster Recovery, or Cohesity Fort Knox, or, um, rubrics, um, solution,
Eric Bursley:um, that they call a cloud vault, actually automate that testing for you.
Eric Bursley:They can actually spin up an environment from time to time and validate those
Eric Bursley:solutions in place in their cloud.
Eric Bursley:Which is isolated, validate the solution and then shut it back down
Eric Bursley:again, not costing you any money.
Eric Bursley:So there are solutions like that.
Eric Bursley:The Dell solution, it, it's something that you would have to manually spin up.
Eric Bursley:You could probably automate that process.
Eric Bursley:Um, but even products like Veeam that by itself couldn't achieve this.
Eric Bursley:They have the solution built in with their data labs.
Eric Bursley:Functionality to automate the testing of backup.
W. Curtis Preston:Yeah.
W. Curtis Preston:Yeah, and, and you know, and I would be remiss.
W. Curtis Preston:If I, if I didn't say that Druva has a, has a similar capability,
W. Curtis Preston:um, the, the question, the, um, no, I'm just, it should, this is such
W. Curtis Preston:a, I, I think the biggest thing is.
W. Curtis Preston:We need to have this discussion upfront.
W. Curtis Preston:, right?
W. Curtis Preston:So many people, they wait until they get that ransomware attack
W. Curtis Preston:and, and then they have, and then they have the meeting, right?
W. Curtis Preston:They're like, oh yeah, we got, we got good backups, we got it,
W. Curtis Preston:we got it in the cloud, right?
W. Curtis Preston:We got a copy in the cloud, or we got, you know, whatever it is that they're
W. Curtis Preston:doing, whatever it is that they're doing.
W. Curtis Preston:And even if they've got a, uh, an air gap copy, if they're not
W. Curtis Preston:having this discussion upfront.
W. Curtis Preston:Of how are we going to do, what, what are we gonna do?
W. Curtis Preston:Like, you, you know, you, you talked about Eric quite a bit about like, who's
W. Curtis Preston:gonna make, who makes the decision, who talks to whom, who communicates to the,
W. Curtis Preston:to the stakeholders, all of those things.
W. Curtis Preston:Um, if you, if you don't have that plan set in advance, uh, it's gonna
W. Curtis Preston:be a, it's gonna be a really bad day.
W. Curtis Preston:Um, and you're gonna have, you know, I, I, I hate to.
W. Curtis Preston:We won't use the, we won't use their name,
Prasanna Malaiyandi:Who do you wanna pick on?
Prasanna Malaiyandi:Yeah, who do you wanna pick on today?
W. Curtis Preston:well, okay.
W. Curtis Preston:Maybe I'll throw their name out.
W. Curtis Preston:Rackspace, right.
W. Curtis Preston:You look at, you look at what Rackspace did when, when they had their outage.
W. Curtis Preston:Then they tested their recovery plan and it was three weeks
W. Curtis Preston:before they got the first.
W. Curtis Preston:Uh, exchange server up and running and you know, and because they had made
W. Curtis Preston:the quick, uh, and I'm not even saying whether a decision or wrong or right,
W. Curtis Preston:but the fact that they had made the decision to go over to Microsoft 365
W. Curtis Preston:because exchange was down and then, and then they restored the exchange
W. Curtis Preston:servers and it took them two to three weeks to get the exchange servers up.
W. Curtis Preston:And then it's like, okay, well how do we get the, the email out of
W. Curtis Preston:these exchange servers over to 360?
W. Curtis Preston:Oh, well the only way we can do that now is PSTs it.
W. Curtis Preston:just felt like the whole thing was shooting from the hip the entire
W. Curtis Preston:time and this was never planned.
W. Curtis Preston:Um, if it was planned, uh, not a good plan.
Prasanna Malaiyandi:Poor planning
Eric Bursley:Right.
Eric Bursley:Well, I,
W. Curtis Preston:So yeah, just gotta have that.
W. Curtis Preston:You just gotta have that decision upfront.
W. Curtis Preston:Um,
Eric Bursley:can't say what their recovery plan was now, but when I worked
Eric Bursley:at Rackspace many years ago, they, they had a plan that was more valid.
Prasanna Malaiyandi:Mm.
Prasanna Malaiyandi:Things have changed maybe over time.
Eric Bursley:yeah, things have changed since I, I left there.
Eric Bursley:I, I was on the sales side of things and I was able to talk about their
Eric Bursley:operational and disaster recovery processes that they had in place
Eric Bursley:because at the time it managed, hosted exchange was one of their main features.
Eric Bursley:Since then, Microsoft 365 has been stealing their market share.
Eric Bursley:Um, Obviously because of this event, they didn't have a well-documented process.
Prasanna Malaiyandi:Yeah.
Eric Bursley:Um, and my wife was actually affected by that . It was
Prasanna Malaiyandi:Oh no.
Eric Bursley:yeah, it was not fun for her company for a couple of weeks.
Prasanna Malaiyandi:Oof.
Prasanna Malaiyandi:Well, hopefully they got their emails.
Eric Bursley:Um, they're still working on it is my under.
Prasanna Malaiyandi:Oh man.
Prasanna Malaiyandi:That is crazy.
Prasanna Malaiyandi:It's been like two months almost.
Eric Bursley:Yeah, there, um, she had to manually type in calendar
Eric Bursley:entries, um, for the majority of her
Prasanna Malaiyandi:Oh my gosh.
Prasanna Malaiyandi:Crazy.
W. Curtis Preston:All right, well, uh, we're starting to have technical
W. Curtis Preston:issues, so I need to shut this puppy down, but it sounds like, you know,
W. Curtis Preston:we, we all agree that this is something that people should do, whether
W. Curtis Preston:they're financial institution or not.
W. Curtis Preston:They should look at these requirements, like definitely the air gap copy and,
W. Curtis Preston:uh, and, and testing and decision making and planning way upfront specifically
W. Curtis Preston:for a cyber recovery plan, not a disaster recovery plan, because, you know, it's
W. Curtis Preston:a, it's a very, very different thing.
W. Curtis Preston:Well, um, I'm sitting here in the blind and so I'm gonna
W. Curtis Preston:thank Eric for joining us.
Eric Bursley:All right.
Eric Bursley:Thank you.
W. Curtis Preston:And thanks for, uh, I don't know what to say with this technical
W. Curtis Preston:problems that we're having today.
W. Curtis Preston:But thanks for being here.
Prasanna Malaiyandi:Yeah, I Anytime Curtis, and thanks Eric
Prasanna Malaiyandi:for teaching me something new that I'd never heard about before.
Prasanna Malaiyandi:I'm gonna have to go look up Sheltered Harbor
Eric Bursley:All right.
Eric Bursley:Thank you.
W. Curtis Preston:And thanks to our listeners, uh, we would be nothing
W. Curtis Preston:without you and remember to subscribe so that you can restore it all.