Comment Speed is not the biggest challenge in ransomware (Score 2) 165
A big important one is air gapping. Disk solutions are generally not ransomware proof themselves. Most (all?) disk solutions, particularly the ones that do de-dupe, are Linux or FreeBSD based. Gain administrator privileges to the solution, or escalate to root, and the ransomware attackers, will wipe your backups. We are seeing more and more incidents where the attackers are not only lurking for months waiting to gain more and more access - but they are also becoming much more sophisticated in understanding enterprise data protection solutions. They know about snapshots, disk to disk, and more. We've seen many instances where the attackers were fully educated in the backup solution being used and attacking that as the first step. Once the backups were compromised then they switched to attacking the primary and secondary storage. Even there, they are deeply aware of the capabilities of the storage arrays themselves and can delete, eliminate, or even encrypt the snapshots (point in time copies) at the array level.
Tape does not have this problem. You can not wipe something if it's securely stored in a shelf somewhere.
The answer is really, both.
- You need secure, immutable (as immutable as you can afford) disk storage. This is for speed of recovery NOT speed of backup. Disks will outperform tape for just about any restore operation.
- You need tape for the storage of last resort. If all of your defenses are compromised you will still have a system of record that can not be compromised. You will get your data back, but it will take longer.
In my position and my job I work very closely with all the major storage and data protection vendors. They all recognize this as a problem. I can attest without qualification that they are all working to solve this problem. As an industry we are closer, but not done. I suspect it will never be done. The genie is out of the bottle.