>A hypothetical IT department wants all tape systems, including
>z/OS, to turn on WORM (Write Once Read Many) so that the tapes
>are immutable. The reason is for prevention of ransomware attaches
>from altering backup data.
>My question is: how does this help? If an attacker has the access and
>authorization to update a tape, they also have the access and
>authorization to copy the tape data to a new tape with altered data.
>When we restore from a backup, we don't consult a post-it note that
>says "now mount volume T13439". We mount whatever volume the
>tape catalog system says contains the data set we need.
>What am I missing?

With WORM tape previously written data cannot be altered. If there's previously 
written data that's valid (uncorrupted) in business terms and can be read back, 
recovery is possible. A pre-corruption immutable backup is a necessary but not 
sufficient ingredient for recovery from a catastrophic logical data corruption 
incident such as a ransomware attack. You're hinting at other necessary 
ingredients. As examples...

1. You need a surviving "good team" (with the right tools, reliably available) 
that can investigate the extent of the damage, evict the root cause(s), block 
re-attacks, and quickly execute recovery procedures. If enough actors are evil, 
or if you don't have proper separation of duties, that'll be a problem.

2. You need fast detection of logical data corruption incidents to limit the 
damage and recover more quickly.

3. A pre-corruption immutable backup is necessary. It must also be at least 
recent enough to support a viable (or at least tolerable) recovery. WORM tape 
is terrific stuff, but it takes time to write. Even if you have fast detection 
is 24+ hour old backup data (for example) good enough? Or do you need more 
recent uncorrupted backup data so that you can recover to a more recent point 
in time?

4. You still need to cover some other bases, notably the backup storage should 
be strongly encrypted (so it's not vulnerable to data breaches, not in that way 
at least) and physically protected (immutable storage can still be physically 
destroyed — a magnet does a great job destroying WORM tape, for example). 
Physical protection involves having at least two separate copies in at least 
two physical locations.

I'd refer you to the IBM Z Cyber Vault literature for a more thorough 
discussion of these considerations. Each implementation is a little different 
since requirements vary, but it's a good recipe that keeps getting better.

https://www.redbooks.ibm.com/redpieces/abstracts/sg248511.html

————— 
Timothy Sipples 
Senior Architect 
Digital Assets, Industry Solutions, and Cybersecurity 
IBM Z/LinuxONE, Asia-Pacific 
[email protected] 



----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to