{"id":1449,"date":"2022-12-31T23:02:08","date_gmt":"2022-12-31T22:02:08","guid":{"rendered":"http:\/\/www.klaushaller.net\/?p=1449"},"modified":"2022-12-31T23:02:08","modified_gmt":"2022-12-31T22:02:08","slug":"azure-backup-functionality-for-iaas-workloads","status":"publish","type":"post","link":"https:\/\/www.klaushaller.net\/?p=1449","title":{"rendered":"Azure Backup Functionality for IaaS Workloads"},"content":{"rendered":"\n<p>VMs and Fileshares are fundamental building blocks for IaaS workloads in on-prem or cloud environments such as Azure. So, which features does Azure provide for companies to back up their IaaS-related data and components? And how does Azure help prevent undesired manipulations or deletions of such backups? To answer these questions, this article elaborates on the interplay between, first, Azure\u2019s VM and file share services and their configurations with, second, Azure Recovery Services vaults for providing, managing, and maintaining VM and file share backups.<\/p>\n\n\n\n<p>An initial remark before going into details. Geo- and zone-redundancy are related but different concepts. They reduce the risk of data loss due to the unavailability or destruction of hardware components and data center incidents. They do not allow restoring earlier versions of the data and backups in case of data mismanipulation. \u201cGoing back in time\u201d is the unique selling proposition of backups. Though, keeping backups in various geographic locations helps, e.g., if a larger electricity blackout brings down data centers for days in a larger geographic area.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Backup Features for VMs in Azure<\/h2>\n\n\n\n<p>Azure\u2019s solution for backups of IaaS cloud workloads is the Recovery Services vault (RSV). The configuration for VM backups in the portal is straightforward. With the \u201cenhanced backup\u201d feature, Azure can backup VMs up to every 4 hours (Figure 1, 1). There is an option to keep backups close to allow for a quick restore (2). Most important, and not available for all types of data and services in the cloud, Azure provides a long-time storage option to keep one backup per week, month, or year for months or even years (3). The final configuration option in the Azure portal is the list of VMs in scope for the backup \u2013 then, the configuration is complete.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"http:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_1_Configuring_VM_backups_in_Azure_Portal.png\"><img loading=\"lazy\" decoding=\"async\" width=\"838\" height=\"707\" src=\"http:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_1_Configuring_VM_backups_in_Azure_Portal.png\" alt=\"\" class=\"wp-image-1450\" srcset=\"https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_1_Configuring_VM_backups_in_Azure_Portal.png 838w, https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_1_Configuring_VM_backups_in_Azure_Portal-300x253.png 300w, https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_1_Configuring_VM_backups_in_Azure_Portal-768x648.png 768w, https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_1_Configuring_VM_backups_in_Azure_Portal-624x526.png 624w\" sizes=\"auto, (max-width: 838px) 100vw, 838px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 1: Configuring VM Backups in the Azure Portal<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Protecting and Securing VM Backups in Azure<\/h2>\n\n\n\n<p>Azure has various built-in features for preventing accidental or intentional deletion of backups. The most radical is the \u201cimmutable\u201d option (Figure 2, 1). If switched on (and locked in), backups cannot be deleted before the retention period expired. This immutability feature is a lifesaver if ransomware attackers delete or encrypt critical data. A second feature, multi-user authentication (2), enables IT organizations to demand that a second person approves critical activities such as vault deletion operations or modifications of backup policies. It benefits organizations by preventing severe misconfigurations resulting in the loss or unavailability of current or future backups, whether by mistake or on purpose. To formulate it differently: Immutable backups help rebuild your data center after really severe incidents. Multi-user authentication helps prevent such a mess from happening in the first place and ensures that your backups exist.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"http:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_2_Protecting_Azure_RSV_Backups.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"481\" src=\"http:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_2_Protecting_Azure_RSV_Backups-1024x481.png\" alt=\"\" class=\"wp-image-1451\" srcset=\"https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_2_Protecting_Azure_RSV_Backups-1024x481.png 1024w, https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_2_Protecting_Azure_RSV_Backups-300x141.png 300w, https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_2_Protecting_Azure_RSV_Backups-768x361.png 768w, https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_2_Protecting_Azure_RSV_Backups-624x293.png 624w, https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_2_Protecting_Azure_RSV_Backups.png 1050w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 2: Protecting Azure RSV Backups<\/figcaption><\/figure>\n\n\n\n<p>Finally, the soft delete setting allows enabling the feature to roll back deletion operations (Figure 2, 3 and 4). In the context of VM backups in RSVs, the feature is especially beneficial to restore the status quo ante after smaller application management or engineering mistakes. If application managers notice something was deleted by mistake some time ago, they can easily restore it. Helpful for operational mistakes but only of limited value for ransomware attacks. Engineers can circumvent the soft delete feature \u2013 and even Microsoft documents how to delete all data forever, even if soft delete is active. A closing remark for VM backups: These configuration options apply to VMs and their backups though configurations take place via Recovery Services vaults.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Azure Fileshare Backups<\/h1>\n\n\n\n<p>File shares are not a CISO\u2019s darling, but the technology exists for decades and probably continues to live for some more years. File shares enable uncomplicated interactions between users themselves, applications themselves, and between users and applications. It might be an often-redundant technology, but the ability to use file shares is a must in any context of legacy applications.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Fileshare Backups in Azure<\/h2>\n\n\n\n<p>While (in the portal) the relevant configuration options for Azure VMs backups are on the Recovery Service Vault, the situation is different for file shares. Many backup-related configurations take place on the Azure Storage Accounts, which contain the file shares. And a warning for those who understand backing up Azure Blobs, which are also stored in Azure Storage Accounts: backups for blobs (see <a href=\"http:\/\/www.klaushaller.net\/?p=1428\">\u201cBlob and PostgreSQL Backups in Azure\u201d<\/a>) differ from the ones for file shares.<\/p>\n\n\n\n<p>Azure supports <strong>ad-hoc backups<\/strong> (just click \u201cadd snapshot\u201d in the portal\u2019s snapshots mask) and <strong>periodic backups<\/strong> (Figure 3). &nbsp;Configuration options for periodic backups are the <strong>frequency<\/strong> (every four hours or less often) and how long backups are kept. Azure allows configuring <strong>retention<\/strong> <strong>periods<\/strong> of several years.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"http:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_3_File_share_backups_in_Azure.png\"><img loading=\"lazy\" decoding=\"async\" width=\"567\" height=\"319\" src=\"http:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_3_File_share_backups_in_Azure.png\" alt=\"\" class=\"wp-image-1452\" srcset=\"https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_3_File_share_backups_in_Azure.png 567w, https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_3_File_share_backups_in_Azure-300x169.png 300w\" sizes=\"auto, (max-width: 567px) 100vw, 567px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 3: File share backups in Azure<\/figcaption><\/figure>\n\n\n\n<p>Protecting and Securing Fileshare Backups in Azure<\/p>\n\n\n\n<p>Protecting file share backups is delicate because it is not just about protecting the backups. It is also about protecting the Storage Accounts. They contain the actual backup data. If deleted, all associated backups are gone. Thus, cloud security architects should be aware of the various configuration options for Storage Accounts and Recovery Services vaults to prevent the deletion or discontinuation of critical backups (Figure 4).<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"http:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_4_Protecting_Azure_File_Share_Backups.png\"><img loading=\"lazy\" decoding=\"async\" width=\"838\" height=\"401\" src=\"http:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_4_Protecting_Azure_File_Share_Backups.png\" alt=\"\" class=\"wp-image-1453\" srcset=\"https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_4_Protecting_Azure_File_Share_Backups.png 838w, https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_4_Protecting_Azure_File_Share_Backups-300x144.png 300w, https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_4_Protecting_Azure_File_Share_Backups-768x368.png 768w, https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_4_Protecting_Azure_File_Share_Backups-624x299.png 624w\" sizes=\"auto, (max-width: 838px) 100vw, 838px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 4: Protecting Azure File Share Backups<\/figcaption><\/figure>\n\n\n\n<p>On the top are configuration options on the Storage Account level and for the Recovery Services vault. Most important is the <strong>immutability<\/strong> feature. When active and locked in, it guarantees that nobody \u2013 and really nobody \u2013 can delete these backups. It is a brand-new feature in public preview. Second, there is an option to forbid deleting the Storage Account utilizing a <strong>delete-lock<\/strong>. It makes deleting Storage Accounts hard to impossible. The different purposes are crucial: immutability is about having a backup when someone tries or succeeds in deleting all or critical data. The lock helps more to prevent the Storage Account deletion, which would bring down applications (even if the data can be restored with an immutable backup). Thus, its purpose is to improve reliability and application uptime.<\/p>\n\n\n\n<p>On the Azure File Share level, Azure provides the soft-delete feature (Figure 5). It has some peculiarities, especially since Azure supports soft-delete for <strong>SMB file shares<\/strong> and not for <strong>NFS <\/strong>ones. The SMB variant is particularly strong in the Windows respectively Microsoft world. The scope for soft-delete is not a single file but complete file shares. If switched on, engineers can restore a file share after its deletion. However, it does not bring back individual files if they are deleted. For this, the backup functionality with periodic backups or ad-hoc snapshots has to be used. So, to conclude: Azure provides various backup-related features, but understanding them in detail is critical to prevent issues if organizations really need them in critical situations.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"http:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_5_Azure_Storage_Account_Configurations_for_File_Shares.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_5_Azure_Storage_Account_Configurations_for_File_Shares.png\" alt=\"\" class=\"wp-image-1454\" width=\"655\" height=\"277\" srcset=\"https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_5_Azure_Storage_Account_Configurations_for_File_Shares.png 838w, https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_5_Azure_Storage_Account_Configurations_for_File_Shares-300x127.png 300w, https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_5_Azure_Storage_Account_Configurations_for_File_Shares-768x325.png 768w, https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/12\/61_3_Figure_5_Azure_Storage_Account_Configurations_for_File_Shares-624x264.png 624w\" sizes=\"auto, (max-width: 655px) 100vw, 655px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 5: Azure Storage Account Configurations for File Shares<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>VMs and Fileshares are fundamental building blocks for IaaS workloads in on-prem or cloud environments such as Azure. So, which features does Azure provide for companies to back up their IaaS-related data and components? And how does Azure help prevent undesired manipulations or deletions of such backups? To answer these questions, this article elaborates on [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1455,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24,22,16,23],"tags":[45,49,65,60],"class_list":["post-1449","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-azure","category-cloudsecurity","category-information-security","category-securityarchitecture","tag-azure-storage-account","tag-backups","tag-fileshares","tag-iaas"],"_links":{"self":[{"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=\/wp\/v2\/posts\/1449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1449"}],"version-history":[{"count":1,"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=\/wp\/v2\/posts\/1449\/revisions"}],"predecessor-version":[{"id":1456,"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=\/wp\/v2\/posts\/1449\/revisions\/1456"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=\/wp\/v2\/media\/1455"}],"wp:attachment":[{"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}