12 Cloud Backup Tips to Protect Your Businesss Back-End Servers

  /     /     /  
Publicated : 23/11/2024   Category : security


12 Cloud Backup Tips to Protect Your Businesss Back-End Servers


The cloud can offer cost-effective backups for enterprise web servers, file servers and other critical infrastructure. Here are a dozen tips on how to make cloud backups safe and efficient.



Every business should consider the cloud as a resource for backing up enterprise servers.
Its certainly a big improvement over stuffing nine-track tapes into a server, or even loading up an automated tape library: You dont have to worry about ferrying tapes off-site for safekeeping, or worrying that your tapes will run out of room, or even that a tape -- or backup disk -- will fail during the backup process.
Thats not to say that cloud backups are free from their own challenges: They can consume considerable bandwidth, especially when data changes quickly each day. If you need to restore an entire server (or in the case of a building disaster, a whole array of servers), Internet download bandwidth wont be enough. Youll need to request a restoration hard drive to get back in business.
(Source:
Pixabay
)
Here are 12 suggestions that can help ensure that cloud backups can best serve real business needs, ranging from preserving key files to preparing for a physical site disaster.
1. Front-load the cloud backup by shipping physical backup disks
. Many cloud backup services will allow you to conduct the initial backup by using local hard drives. Those hard drives are sent -- in well-packed shipping cases -- to the cloud facility, where the data is loaded onto cloud servers. From there, future incremental backups are conducted by uploading through the Internet. While this seems to be an extra step, its vital if theres a lot of data to be backed up because it would take too long to do the backup via an upload -- and the initial backup can be verified before those hard drives leave your facility.
2. Purchase at least one bare-metal server thats comparable to the server(s) being backed up to the cloud
. If a server fails the smoke test -- there is a catastrophic hardware failure, for instance -- youll need to bring a new server online quickly. The last thing youll want to hear is that your new server is out of stock, and will ship next Thursday. Having that server available -- possibly racked and cabled, if you use racks -- can chop many days off that time. In fact, you can begin restoring immediately.
3. Use that spare bare-metal server to test the quality of your backups, and rehearse the restoration process
. If theres a problem with your backups, or if you dont know how to do the recovery, better to figure that out in advance as part of an exercise. My suggestion is to comprehensively test cloud backups at least annually, to make sure your backups are good, and that your staff knows how to bring a new server online without mishaps.
4. If your cloud backup provider can ship you a physical hard drive for doing that restoration, use that option, both for rehearsals and for the real event
. Download bandwidth is slow, slow, slow. Yes, it costs money to request that the cloud server restore to an external hard drive and overnight-courier that drive to you. Yes, it costs even more money if thats not an option in a real crisis. Bonus hint: If your cloud backup provider doesnt offer that service, find another service.
5. Make sure that your cloud backups can be used for recovering both individual files and entire servers
. Some backups are file-by-file, which are great for recovering data from a file store, but not for restoring applications, including configuration files. Others can restore an entire server, but not easily retrieve a single lost file -- like a document your CEO erased. You need both capabilities.
6. Look at how far back your backup provider will store changed or deleted files
. I recommend a minimum of a full six months. Yes, that much storage can be quite expensive. Yes, that will seem a bargain compared to the costs of recovering lost data, especially if you discover that server data was corrupted some time ago, and only discovered now.
7. Consider using cloud backups to supplement, not replace, local on-premises backups
. The process I use: I use the cloud for disaster recovery for my off-site backups containing six months of data. My servers, though, are backed up continuously to a local storage array, thats big enough to store one weeks worth of files. If a file is lost or a server crashes, I can restore from the local backup. In the case of a disaster, thats where the cloud comes in. In this case, the cloud has mainly replaced my off-site backup system, which involved shipping tapes to a secure facility. This is the best of all worlds.
8. If you are paranoid, make sure your cloud backup services hardware isnt in your own local geography
. My paranoia level is not high, so my cloud services data center is in the same state where I live. Someone less risk-averse might use a cloud service on the other side of the country. (Be careful about storing your data in a cloud service in another country, due to HIPAA, GDPR and other compliance issues.)
9. If you are even more paranoid, make sure that your cloud backup provider has its own backup facility in another geography
. Again, make sure its in the same country, unless you are prepared to handle compliance issues. Note: Backup providers may charge extra for those additional levels of protection. Only you can decide whether thats worth the cost. (Ive chosen not to worry about it, for my own business.)
10. Ask hard questions about the security of your cloud services backups
. Merely having them encrypted isnt enough. Who has access to your files? Who has access to look through file names? What happens if theres a warrant from law enforcement? What about compliance? Those are all concerns. In terms of file names: Letting an admin see directory listings with files called John Smith Termination Documents or Hostile Takeover of XYZ Corp. or Famous Celebrity Medical Test Results can be very, very problematic.
11. Ensure that the cloud backup can intelligently handle complex file types, especially for files that are never closed
. For example, you dont want to constantly back up an entire virtual machines disk image -- which could be tens of terabytes in size -- if only one log file within that VM was changed. The same is true with, say, relational databases, CRM systems and other complex files that are changed incrementally. Look for the backup system to be aware of those special files. And be sure to test your ability to recover and work with those files.
12. Make sure your encryption keys, license keys, passwords and other vital recovery data are readily available
. Theres little point in restoring an application if it refuses to start due to a perceived license restriction. This could encompass operating systems, virtual machines, applications, plug-ins and more. Thats another reason to test bare-metal recovery, because youll certainly find failures that youve never anticipated. Be prepared to curse. But again, better to curse during an exercise, instead of when trying to bring your business online after a disaster. (Hint: Make sure that information is safe and readily accessible off-site. Crypto keys and license keys won’t help you if theyre in a file cabinet that washed away in a flood.)
The cloud is an excellent resource for backups, but like with any other business technology tool, it needs to be used carefully. Think of cloud backup services as being cloud recovery services, and let that guide your planning.
Related posts:
Check Point, Fortinet Add Cloud Security Depth With Acquisitions
Rotten Fruit: 4 Insider Threats to Watch Out For
Managed Security Service Providers: Good Idea, but Whats the Catch?
Cloud-Based Identity Management Systems: What to Look For

Alan Zeichick is principal analyst at
Camden Associates
, a technology consultancy in Phoenix, Arizona, specializing in enterprise networking, cybersecurity, and software development. Follow him
@zeichick
.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
12 Cloud Backup Tips to Protect Your Businesss Back-End Servers