Lasīt angliski Rediģēt

Kopīgot, izmantojot


Frequently asked questions - Protect backups from Ransomware

This article answers common questions about protecting backups from ransomware with the Azure Backup service.

What are the best practices to configure and protect Azure Backups against security and ransomware threats?

Your backup data that’s securely stored in an Azure resource called Recovery Services Vault or Backup Vault is isolated. This vault is a management entity, any application or guest don’t have direct access to these backups, thus prevents malicious actors to perform destructive operations on the backup storage, such as deletions or tampering of backup data.

The following practices protect backups against security and ransomware threats:

How to block intentional or unintentional deletion of backup data?

How to restore a system affected by ransomware?

If backup was enabled on the source system and backups are healthy prior to the point of attack, then consider the following actions:

  • Review the incident timeline to estimate the impact on production workloads.
  • Identify the last clean recovery point created before the impact.
  • Review the retention duration of the existing recovery points. If more time is required to restore from an attack, then consider extending the retention duration in the backup policy.
  • Perform recovery to an isolated and secure network.
  • Perform restores on smaller sets of data (for example, item-level recovery) to ensure healthy recovery points.
  • Scan the restored data for signs of infection to ensure it’s not compromised.
  • Once the data is ascertained to be clean, use it for production system.
  • Once complete, ensure backups are configured and healthy on the recovered workloads.
  • Identify gaps to check where the process didn’t work as expected. Find opportunities to improve process.

Will an infected backup copy impact the existing clean recovery points?

No, the infected recovery point (that is, backed-up data containing infected data) can’t spread to previous non-infected recovery points.

How can I extend the expiration of recovery points in case of impact?

If you need more time to investigate and recover in case of an impact, you can extend expiration to ensure the recovery points aren't cleaned up (as per policy). Learn more, so that they aren’t deleted by the retention policy.