Veeam Security Best Practices 2022
Veeam Security Best Practices 2022
Best Practices
Veeam Security Best Practices 2022
Table of Contents
Physical Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Best practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Role Based Access Controls on a physical level . . . . . . . . . . . . . . . . . . . . . 3
Access to the Datacenter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Surveillance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Equipment Racks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
Infrastructure Hardening . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Detect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
Create a Veeam honeypot server . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
Leverage Veeam One alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Protect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Anonymize the infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Hardening . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Secure by Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
Remove Unused Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
Veeam Backup & Replication Server . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Enterprise Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Console Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Roles and Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Password management policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Lockout policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Required Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Patching and Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Segmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Visibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Recovery Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
The 3-2-1-1-0 backup rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Protect backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Educate your Staff . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 1
Veeam Security Best Practices 2022
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 2
Veeam Security Best Practices 2022
Physical Security
It is essential that only authorized personnel have physical access to the datacenter.
Datacenter’s hold sensitive and crucial information and services. Software-based protections
on your server(s) become far less effective or even useless as soon as an attacker gains physical
access! Access into a datacenter is limited.
Best practices
• Use Role Based Access Controls (RBAC) on a physical level;
• Prevent from tailgating with solutions such as airlock doors at entry points;
• Make sure there are no exterior windows and relatively few entry points;
Make sure that anyone that is authorized to enter the datacenter can only access those parts
they are entitled to. Follow the principle of least privilege, give people the correct rights to do
their job properly, nothing more nothing less. For example, an UPS and generator engineer does
not need access to any of the racks in the datacenter and a Compute engineer should not have
access to the UPS and generators.
An important part of a layered security defence is always knowing who entered the Datacenter
and that access is being logged. Any authorized person to enter the datacenter has its own digital
access key combined with something they know like a pin code and/or biometric measures. Make
sure people are screened before they become an authorized person to access the datacenter.
Prevent tailgating and unauthorized access by enforcing CCTV monitored airlock doors.
Surveillance
It is crucial to protect a datacenter from external threats and attacks and to make sure only
authorized personnel has access to the areas where they need to be. Monitor for suspicious
activity using footage from surveillance cameras (CCTV) installed along the outside perimeter
but also inside the datacenter.
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 3
Veeam Security Best Practices 2022
Equipment Racks
By placing and using locks per 19-inch rack you can shrink the physical security domain from
the whole datacenter to a 19-inch rack. By smartly placing the different hardware components
and their specific roles in different racks you can enable RBAC rights to that particular security
domain. For example, do not place the Veeam Repositories in the same racks as the production
storage or the hypervisor hardware.
Important: Even though you do not have your own Datacentre’s and are renting space or even
just Infrastructure as a Service, always check how the physical security is arranged and if it fits
your security policy.
Infrastructure Hardening
This provides practical advice to help administrators to harden their infrastructure. It follows
security best practices so that customers reduce chances of being compromised.
Hardening is about securing the infrastructure against attacks, by reducing its attack surface and
thus eliminating as many risks as possible. One of the main measures in hardening is removing
all non-essential software programs and utilities from the deployed Veeam components. While
these components may offer useful features to the administrator, if they provide additional
access to the system, they must be removed during the hardening process.
But also, creating visibility in what goes on in the infrastructure is part of hardening your
infrastructure. Making sure you will notice when an attack may/is/or has taken place and then
making sure logs and traces are saved for law-enforcement and security specialists when needed.
Detect
Being able to detect an attack before it takes place or when it takes place can considerably
mitigate the impact.
Honeypot servers with authentication monitoring will help detecting attacks that target your
Veeam Infrastructure.
Veeam One offers the possibility to monitor possible ransomware activity through a set of
predefined alarms such as “immutability state”, “possible ransomware activity”, “Immutability
change tracking”.
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 4
Veeam Security Best Practices 2022
Protect
Protecting your infrastructure successfully is all about understanding the current attack vectors;
what and whom you are protecting your Veeam infrastructure against. Knowing what and
whom you are protecting against makes it easier to take the correct countermeasures. One of
those countermeasures is hardening.
Looking at the different Veeam Backup & Replication components you must protect
the following components:
• User Accounts
• Backup repositories
Consider the Veeam Backup & Replication Server to be the Number 1 target on your
infrastructure and it should have very restricted access. As a rule the backup server is the single
greatest target a hacker can claim on your network. Also, the backup repositories which hold
the backup files are a primary target.
On the other hand, the honeypot server should be easily identifiable on the network.
Hardening
Within the hardening process of your Veeam infrastructure there are a few steps everyone
should always consider and act upon, namely:
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 5
Veeam Security Best Practices 2022
Secure by Design
Overly complex designs become harder for the IT team to manage, also it makes it easier for
an attacker to exploit and stay in the shadows. Simpler designs that can be easily overviewed
are in basis more secure. Use the K.I.S.S.1 (Keep It Simple and Straightforward) principle for
your designs.
Adding security to an already existing infrastructure is much harder and costly than thinking
about it while designing a new or refreshing an existing infrastructure. In a virtual infrastructure,
it is good use to build up a Master image which has been hardened from the start. Removing
all known attack vectors and only open access when Veeam components are added and needs
specific (port) openings or extra software to function properly. This way, all builds are consistent
and kept up to date which makes it secure in the basis.
Consider the Veeam Backup & Replication server to be the Number 1 target on your
infrastructure and it should have very restricted access. As a rule, the backup server is the single
greatest target a hacker can claim on your network.
1
KISS is an acronym for “Keep it simple, stupid” as a design principle noted by the U.S. Navy in 1960. The KISS principle states
that most systems work best if they are kept simple rather than made complicated; therefore, simplicity should be a key goal
in design and unnecessary complexity should be avoided. A simple design is easier to overview and to secure.
https://en.wikipedia.org/wiki/KISS_principle
Remove all non-essential software programs and utilities from the deployed Veeam
components. While these programs may offer useful features to the administrator, if they
provide additional access (“back-doors”) to the system, they must be removed during
the hardening process. Think about additional software like web browsers, java, adobe
reader and such. All parts which do not belong to the operating system or to active Veeam
components, remove it. It will make maintaining an up-to-date patch level much easier.
Also disable remote desktop access, even on Veeam Backup & Replication server, which should
only be accessible through Veeam Backup & Replication Console.
• Access to Veeam Backup & Replication Server should be limited to the Veeam Backup &
Replication Console with MFA enabled, through a dedicated management server.
• Backup & Replication Console should be removed from the Veeam Backup & Replication
Server when possible. The console is installed locally on the backup server by default.
• Switch off the Veeam vPower NFS Service if you do not plan on using the following Veeam
features: SureBackup, Instant Recovery, or Other-OS File Level Recovery (FLR) operations.
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 6
Veeam Security Best Practices 2022
Follow these steps to remove the Veeam Backup & Replication Console:
The Console cannot be removed through the installer or by using Add/Remove in Windows.
Open a cmd prompt with administrative access. On the command prompt type: wmic
product list brief > installed.txt this will create a text document with all installed products
and their respective Product Codes.
For uninstalling Veeam Backup & Replication Console, first de-install all Veeam Explorers:
Example for uninstalling the Veeam Backup & Replication console is: msiexec
/x {D0BCF408-A05D-45AA-A982-5ACC74ADFD8A}
Uninstalling Veeam Backup and Replication console removes PowerShell module and makes
using Veeam Backup PowerShell cmdlets impossible. This may affect automation scripts or
products that rely on PowerShell for interacting with Veeam Backup and Replication, for
example Veeam Disaster Recovery Orchestrator (Veeam Availability Orchestrator).
Enterprise Manager
When Enterprise Manager is not used de-install it and remove it from your environment.
Console Access
The Veeam Backup & Replication console is a client-side component that provides access to
the backup server. The console lets several backup operators and admins log in to Veeam
Backup & Replication simultaneously and perform all kind of data protection and disaster
recovery operations as if you work on the backup server.
Prefer installing the Veeam Backup & Replication Console on a central management server,
positioned in a secure network zone and protected with 2-factor authentication rather than
installing the console on the local desktops of backup & recovery admins. Always enforce MFA
when authenticating to the Veeam Backup and Replication Console itself (supported starting v12).
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 7
Veeam Security Best Practices 2022
Enforce containment to keep the attackers from moving around too easily. Some standard
measures and policies are:
• Do not use user accounts for admin access, reducing incidents and accidents
• Give every Veeam admin his own admin account or add their admin account to the appropriate
security group within Veeam, for traceability and easy adding and removal
• Limit users who can log in using Remote Desktop and/or Veeam Backup Console
A role assigned to the user defines the user activity scope: what operations in Veeam Backup &
Replication the user can perform.
Use a clever Password management policy, which works for your organization. Enforcing the use
of strong passwords across your infrastructure is a valuable control. It’s more challenging for
attackers to guess passwords/crack hashes to gain unauthorized access to critical systems.
Selecting passwords of 10 characters with a mixture of upper and lowercase letters, numbers
and special characters is a good start for user accounts.
Make sure default accounts and passwords have been modified on all your equipment.
For Admin accounts adding 2-factor authentication is also a must to secure the infrastructure.
And for service accounts use 25+ characters combined with a password tool for easier
management. An Admin can copy and paste the password when needed, increasing security of
the service accounts.
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 8
Veeam Security Best Practices 2022
Make sure the password tool and database are available from a recovery site in order to have it
available in case a disaster occurs. Keep in mind that a recent backup of your password tool and
database must reside on an air-gapped media, such as DVD, CD-ROM, tape. The most crucial is
the Veeam Repository password that will allow to restore from the backup files.
Lockout policy
Use a Lockout policy that complements a clever password management policy. Accounts will
be locked after a small number of incorrect attempts. This can stop password guessing attacks
dead in the water. But be careful that this can also lock everyone out of the backup & replication
system for a period! For service accounts, sometimes it is better just to raise alarms fast.
Instead of locking the accounts. This way you gain visibility into suspicious behaviour towards
your data/infrastructure.
Required Permissions
Use the principle of least privilege. Provide the minimal required permissions needed for
the accounts to run.
The accounts used for installing and using Veeam Backup & Replication must have
the permissions detailed.
If VMware vCenter Server is added to the backup infrastructure, an account with reduced
permissions can be used. Use the minimum permissions for your use-case. For example
Hot-Add backup requires the “delete disk” permission. You can also consider elevating
permissions for restores. See details here.
Backup proxies must be considered the target for compromise. During backup, proxies obtain
from the backup server credentials required to access virtual infrastructure servers. A person
having administrator privileges on a backup proxy can intercept the credentials and use them to
access the virtual infrastructure.
Patch operating systems, software, and firmware on Veeam components. Most hacks succeed
because there is vulnerable software in use which is not up to date with current patch levels.
Make sure all software and hardware where Veeam components are running are up to date.
One of the most possible causes of a credential theft are missing guest OS updates and use of
outdated authentication protocols.
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 9
Veeam Security Best Practices 2022
• Install the latest updates and patches on backup infrastructure servers to minimize the risk of
exploiting guest OS vulnerabilities by attackers.
Choose strong encryption algorithms for SSH. To communicate with Linux servers deployed as
part of the backup infrastructure, Veeam Backup & Replication uses SSH. Make sure that for
the SSH tunnel you use a strong and proven encryption algorithm, with sufficient key length.
Ensure that private keys are kept in a highly secure place and cannot be uncovered by a 3rd party.
Encryption
Backup and replica data is a highly potential source of vulnerability. To secure data stored in
backups and replicas, follow these guidelines:
• Ensure physical security of target servers. Check that only authorized personnel have access
to the room where your target servers (backup repositories and hosts) reside.
• Restrict user access to backups and replicas. Check that only authorized users have
permissions to access backups and replicas on target servers.
• Encrypt data in backups. Use Veeam Backup & Replication inbuilt encryption to protect data in
backups. To guarantee security of data in backups, follow Encryption Best Practices.
Encryption Best Practices from Veeam Backup & Replication user guide:
https://helpcenter.veeam.com/docs/backup/vsphere/encryption_best_practices.html
Backup and replica data can be intercepted in-transit, when it is communicated from source to target
over a network. To secure the communication channel for backup traffic, consider these guidelines:
• Isolate backup traffic. Use an isolated network to transport data between backup
infrastructure components — backup server, backup proxies, repositories and so on. (Also see
segmentation)
• Encrypt network traffic. By default, Veeam Backup & Replication encrypts network traffic
traveling between public networks. To ensure secure communication of sensitive data within
the boundaries of the same network, you can also encrypt backup traffic in private networks.
For details, see Enabling Network Data Encryption.
Enabling Network Encryption from Veeam Backup & Replication user guide:
https://helpcenter.veeam.com/docs/backup/vsphere/enable_network_encryption.html
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 10
Veeam Security Best Practices 2022
The Backup & Replication configuration database stores credentials to connect to virtual
servers and other systems in the backup & replication infrastructure. All passwords stored in
the database are encrypted. However, a user with administrator privileges on the backup server
can decrypt the passwords, which presents a potential threat.
To secure the Backup & Replication configuration database, follow these guidelines:
• Restrict user access to the database. Check that only authorized users can access the backup
server and the server that hosts the Veeam Backup & Replication configuration database (if
the database runs on a remote server).
• Encrypt data in configuration backups as a best practice. Enable data encryption for
configuration backup to secure data stored in the configuration database. Please note that user
accounts and passwords are not stored in configuration backups when encryption is not active.
Segmentation
Add local protection mechanics, in addition to the border firewalls, intrusion detection, patching
and such. You can make use of local mechanisms, like up-to-date anti-malware, firewalls and
network segmentation. This way you create different rings-of-defence slowing an attacker
down. A great way to strategically use segmentation is by implementing Zones.
A good practice is to place the backup repositories in a special segment not accessible by any
user. Like for instance the production storage is only available to the virtual infrastructure
components and application servers. Not directly accessible by any user!
To segment your infrastructure and Veeam Backup & Replication components, make sure
the firewalls on the local server installations have the correct ports opened.
You can also deploy solutions such as VMware NSX, as a counter measure with micro-
segmentation to make sure the attack surface is as narrow as possible without blocking everyone
to use the services. Visibility into the network and all data flows is crucial to help you protect
all different rings/cells within your infrastructure. You can add the Veeam components to NSX
policies to make sure they can communicate with each other without opening it up to any user.
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 11
Veeam Security Best Practices 2022
Ports
Try not to use obscure ports and other tricks to try and hide Veeam ports and protocols in use,
while this may look like a good choice. In practice this often makes the infrastructure harder to
manage which opens other possibilities for attackers. Obscurity is not security!
You can check which ports are in use by which service on a Windows system by using:
you can open the text file with for instance notepad portlist.txt
Visibility
To know when you are under attack or have been breached it is vital to have visibility in
the whole data flow path. You should be able to know what a ‘normal behaviour’ is and what
is NOT. Monitor your accounts and Veeam infrastructure for suspicious activity. Place virtual
tripwires, like e.g. creating a non-used admin account with alarms tied to it. When any activity
on that account is observed, it will trigger a red alert instantly. There are several systems out
there that can help you by alerting suspicious behaviour, so you get aware that someone is
snooping around and is trying to gain access to your infrastructure. Visibility is Key!
It is important to get alerts as soon as possible while defending against other attacks like
viruses, malware and ransomware. The biggest fear of these attacks is that they may propagate
to other systems fast. Having visibility into for e.g. potential ransomware activity is a big deal.
• VMware vRealize Network Insight can take VMs, objects, groupings and their physical elements
and easily fingerprint the application and determine the internal and external flows, the client
connections, etc. this way you get an analysis of what is ‘normal’ behaviour and what is not.
https://helpcenter.veeam.com/docs/one/alarms/vsphere_alarms_events.html?zoom_highlight=ransomware
https://helpcenter.veeam.com/docs/one/alarms/hyperv_alarms_events.html?zoom_highlight=ransomware
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 12
Veeam Security Best Practices 2022
Recovery Strategy
Have a recovery strategy in place, before you find out your infrastructure is breached you should
know what to do when being compromised through attacks. Backup your data and make sure
the backups cannot be accessed by an attacker to wipe them out. An offsite copy (airgap) or
read-only on any media is highly recommended to survive any attack.
Furthermore, you must be aware that in case of a breach it is very likely that your assets will be
sealed by government entities for analysis and forensic and they won’t be available for recovery.
You should rely on dedicated recovery hardware in addition to keep off-site copies.
Preparation is the key. You must have tested recovery keeping in mind you will have to restart
from nothing but backup files and a blank infrastructure.
• Know your assets, to prioritize recovery. First perimeter is the surrounding environment,
such as phone, mail, domain controllers, DNS etc etc… Then your core applications shall
restart immediately after
• Extensively use testing automation tools, such as Veeam SureBackup or Disaster Recovery Orchestrator
The 3-2-1 rule is very general, it works for all data types (individual and corporate) and all
environment types (physical and virtual). When backing up your environments with Veeam,
this rule becomes the “3-2-1-1-0 backup rule” where 1 media is offsite, 1 media is air-gapped,
immutable or offline. 0 means “0 errors” when enforcing the automatic recoverability
verification of every backup with Veeam’s SureBackup.
Veeam Backup & Replication™ can help you to fulfil each 3-2-1-1-0 backup rule requirements.
• Have at least three copies of data: production, primary backup, backup copy.
• Store the copies on two different media: Veeam is storage-agnostic, meaning it supports
tapes, disks, cloud storage and more. You can store your backups to any of the listed media.
• Keep one backup copy offsite: setup Backup Copy Jobs to transfer your backup offsite faster
with built-in WAN acceleration or use Scale-Out-Repositories’ capacity tier to copy data to
(cloud) object storage.
By following the rule, you create multiple layers of resiliency and according security. Data and
workloads will be made immutable (protection against deletion and modification), stored offline
(protected against insider threats), air-gapped (protected against insider and other business
continuity disasters e.g. fire, flood, earthquake, etc).
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 13
Veeam Security Best Practices 2022
Protect backups
Veeam offers many ways to keep data out of reach of attackers. A properly designed backup
infrastructure must include a data protection mechanism.
Ideally, all retentions shall be protected through air gap or immutability. But since the dwell
time of the attackers is approximately one month average, it is fundamental to protect at least
four weeks of restore points to mitigate the attack.
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 14
Veeam Security Best Practices 2022
A forest is a collection of one or more Active Directory domains that share a common logical
structure, directory schema (class and attribute definitions), directory configuration (site and
replication information), and global catalogue (forest-wide search capabilities). Domains in
the same forest are automatically linked with two-way, transitive trust relationships.
When securing administrative accounts and the Veeam Availability Infrastructure installation you
have a few options from most secure to less secure:
• Add the Veeam components to a management domain that resides in a separate Active Directory
Forest and protect the administrative accounts with two-factor authentication mechanics.
• Add the Veeam components to a separate workgroup and place the components on a separate
network where applicable.
• Add the Veeam components to the production domain but make sure the accounts with
administrative privileges are protected with two-factor authentication.
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 15
Veeam Security Best Practices 2022
Best Practice
For the most secure deployment add the Veeam components to a management domain that
resides in a separate Active Directory Forest and protect the administrative accounts with two-
factor authentication mechanics. This way the Veeam Availability Infrastructure does not rely on
the environment it is meant to protect.
Windows Workgroup
When using a Workgroup, you will need to have everything carefully documented because of
management and compliancy reasons. Every system needs to be configured independently per
system with a local security policy, as well as users, permissions, etc. If you have multiple Veeam
servers and users, this could become extremely cumbersome in larger environments. Also
forget about Kerberos authentication with a workgroup server, you will be using NLTM instead.
Be aware though that a Workgroup is harder to defend against threats from the inside like
a disgruntled employee, because you will be using local accounts on the workgroup servers, and
you cannot just switch off a single AD account locking out that specific employee from the critical
infrastructure. Also, it is harder to proof for compliancy reasons that the systems are safe and
being utilized as they should be. A Workgroup setup is a good solution for small environments.
Pros
• Separates Veeam accounts from Domain privileged accounts (helps against keyloggers and
breach of the production domain)
• No additional infrastructure servers required like: Domain Controllers, NTP and DNS
Cons
• No Kerberos communication when logging into a standalone server (workgroup) only NTLM
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 16
Veeam Security Best Practices 2022
Management Domain
While this approach does add a forest to an Active Directory environment, the cost and
complexity are limited by the fixed design, small hardware/software footprint, and small
number of users. Enabling central management of policies, user rights and permissions makes
management easy. It also enables one-click deactivation of a single AD account when you face
an inside threat. Setting up a separate Forest with a management domain is a great solution for
large(r) environments. You can also add multi-Factor authentication on the domain to protect
the administrative accounts even further, blocking man in the middle attacks and key loggers.
Pros
• Easy to manage
• Use group polices to control the domain and fulfil compliancy easier
Cons
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 17
Veeam Security Best Practices 2022
Trusts Overview
If a one-way forest trust is created between two forests, members of the trusted forest can
utilize resources located in the trusting forest. However, the trust operates in only one direction.
In this example you want the production domain to trust the management domain with a one-
way forest trust. You will have an incoming one-way forest trust on the management domain.
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 18
Veeam Security Best Practices 2022
A zone is an area having a particular characteristic, purpose, use and/or subject to restrictions.
By using zones, you have an effective strategy for reducing many types of risks. While securing
your environment much granular and better, you will also lower costs associated with it.
Instead of protecting everything with the same level of protection, you associate systems and
information to specific zones. As a side effect, systems that are subject to regulatory compliance
can be grouped in subzones to limit the scope of compliance checking and therefore, reduce
costs and time needed to complete long-winded audit processes.
Think about the importance of the data and systems in that zone and who should have access
to it. Communication is only allowed between systems in adjacent zones. A common data
classification for a zone is about shared availability, confidentiality, integrity, access controls,
audit, logging and monitoring requirements.
These common characteristics and requirements inherently lead to some level of isolation, but
this isolation occurs not just between zones, but also within zones called subzones.
The attack surface of data and systems within a zone can be significantly reduced by exposing
a limited number of services through the zone’s perimeter and implementing strict access
controls to limit access to specific groups of users. A potential attacker would have to gain
access to all the outer zones before getting to the restricted zone where the critical data is
stored, reducing the likelihood of data theft or data mutilation. In addition, you are increasing
the availability of these critical systems.
You could use a zone model as a strategic defence model which divides the different Veeam
components into separate zones. Keep the following rules in mind while designing:
1. Secure by Design
Important: Be aware that there is no silver bullet that will solve all your security needs at
once. There are numerous ways to achieve your goal. Security is a state of mind and needs to
be looked after every single day. If you think you are secure, because you followed all best
practices you got a false sense of protection. Look at your organization needs and then choose
the best way that fits your organization taking into consideration money (budget), risks (attack
vectors) and possible outcome (how does it fit in, what would be the damage).
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 19
Veeam Security Best Practices 2022
Implementing zones can be done in numerous ways depending on the approach you choose.
But keep in mind that most of the threats nowadays are coming from the inside. Dividing
your infrastructure into zones is a great way to provide better visibility into parts of greater
importance. Without visibility it is sheer impossible to gain control and detect threats early.
For hardening the Veeam Availability infrastructure components we place them in several
logical zones.
One of the highest sought-after attack vectors will be gaining access to management accounts
and components. This will allow an attacker to gain access to most parts of the infrastructure
instantly. While overlooking the major Veeam Backup & Replication components you will notice
that there are three management components available.
Let’s place all major Veeam Availability components into the defined zones:
• The Veeam Backup & Replication Server which is the core component orchestrating all
different jobs and ordering movement of data through the infrastructure
• The Veeam Backup Enterprise Manager who federates multiple Backup Servers into a single
pane of glass.
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 20
Veeam Security Best Practices 2022
Untrusted Zone
To keep a balance between security and operational efficiency you do not want to install
the Veeam Backup & Replication Console on any system outside your organization
infrastructure. But for operational efficiency you want to give your administrators the ability to
connect to the infrastructure from any device and any location through remote access with only
keyboard, mouse and video to their disposal.
For operational efficiency, you do not want to install Veeam Backup Console on machines on
poor connections/long distance, there can be between 50-400 MB of data transferred between
the console and backup repository when starting the console. If the first file mount is performed
over a slow connection, it may take a considerable time to load the file-level recovery wizard.
If there is significant latency between the backup repository and console, it is recommended to
deploy an instance of the console on or closer to the repository server.
Deploy a firewall on the perimeter between the untrusted zone and the DMZ zone. On
the firewall and/or dedicated RDS Gateway server add 2-factor authentication for remote
administrators to access the RDS Gateway. Deny the mapping of drives, printers, clipboard etc.
on the RDS Gateway to secure your infrastructure against dropping of content or files from
any remote machine.
DMZ
The DMZ houses systems that require exposure to the untrusted zone. This zone proxies access
between systems in the DMZ and the Management Zone. Also, all traffic should be funnelled
through systems in the DMZ to reach Internet resources. The systems deployed in this zone
should be tightly controlled and hardened to reduce attack surface.
The Veeam Backup & Replication console is a client-side component that provides access to
the backup server. The console lets several backup operators and admins log in to Veeam
Backup & Replication simultaneous and perform all kind of data protection and disaster recovery
operations as if you work on the backup server.
Install the Veeam Backup & Replication console on a central management server that is
positioned in the DMZ zone and make sure it’s protected with 2-factor authentication. You can
also install other infrastructure tools on this management server like for instance the Microsoft
VMM Console and/or VMware vSphere Client to manage your hypervisor deployment.
The Veeam Enterprise Manager will also be in the DMZ zone, because it serves as a Self-Service
portal for specific user-groups in the organization.
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 21
Veeam Security Best Practices 2022
Management Zone
In the management zone, you place infrastructure services like DNS, Active Directory and SMTP.
But also, the VMware vCenter server and/or Microsoft System Center Virtual Machine Manager
(SCVMM). From the Veeam components the Veeam Backup & Replication Server(s) will be in
this Management zone. The Veeam Backup Server will orchestrate all jobs and update all Veeam
components in the different zones from a central location.
The Microsoft SQL Database server, which is needed to host the Veeam Backup Database
and the Veeam Enterprise Backup Database should be placed in this zone if it is dedicated
just for Veeam. It is a good practice to use a dedicated SQL server which hosts the different
SQL instances for infrastructure components and a different SQL server for SQL instances for
business processes. The Veeam Backup & Replication server is a heavy user of the SQL server
and placing the SQL database server close by gains you operational efficiency.
The VMware vCloud Director is part of a subzone within the management zone and controls
the vAPP’s running in subzones within the Trusted Zone.
The management zone requires secure and controlled access to the internet to download licenses
and updates for different components in the infrastructure. It is highly recommended to use
an Internet Proxy or Reverse Proxy situated in the DMZ as a controlled gateway to the internet.
All types of Cloud Repositories should be placed in subzones within the Untrusted zone.
Organization data is leaving the security boundaries so make sure that, as an extra precaution,
data towards these cloud repositories is encrypted during transport and when stored in
the cloud repository. The Veeam Backup & Replication server will communicate with the Cloud
Gateway service for transport of data to the Cloud Provider, Azure Proxy or AWS deployment.
Trusted Zone
The trusted zone will be populated with hypervisor hosts like VMware ESXi and/or Microsoft
Hyper-V hosts. All components in the Trusted zone will need access to different services
in the Management zone. The Veeam Proxy servers, which are the data movers, are part of
the trusted zone.
Veeam Proxies can back up the VMs without having access to the Guest OSes themselves. If you
back up or replicate running VMs, you can enable guest processing options. Guest processing
options are advanced tasks that require Veeam Backup & Replication to communicate with
the VM guest OS. When VMs are separated in subzones you can deploy and leverage the Veeam
Guest Interaction Proxy (GIP) in the Trusted Subzone, which will have secure access and deploys
the needed runtime in the VM for guest processing tasks.
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 22
Veeam Security Best Practices 2022
In the case that different business units or customers are running in the trusted zone you should
think about running them in subzones of the trusted zone. But be aware that overly complex
designs can be counterproductive and give a misplaced feeling of being safe.
VMware vCloud Director vAPP’s are also part of the Trusted Zone and would normally be divided
in subzones per business unit or tenant. Veeam can capture whole vAPP and vCloud Director
configurations within the backup jobs.
Restricted Zone
Primary storage, where production data and VM’s reside, but also other components which
store data should be placed in this restricted zone. This zone should never be accessible by any
user directly. Only available to the virtual infrastructure components and application servers
and administrators with strict rights. Also, the Veeam Scale Out Backup Repository (SOBR),
Simple Repository, Deduplication devices or Cloud Repository when used in combination with
Veeam Cloud Connect for Enterprise (VCC-E) should be part of this zone. For organizations using
VCC-E it is possible to define cloud repositories on top of their SOBR or as separate defined
cloud repositories in a Restricted Zone subzone.
Audit Zone
Visibility is key to protect, detect and contain threats early. In this zone monitoring solutions like
Veeam ONE and/or Veeam Management Pack in combination with Microsoft System Center are
placed. IDS and IPS systems should be placed in this Audit zone.
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 23
Veeam Security Best Practices 2022
A good way of hardening the backup repository is by running it on a standalone Windows Server
with storage attached to it. Create/Use a local account with administrative access and make sure
only this (newly created) account has access rights to the location where the backup files are
being stored. Veeam needs a local account with administrative access to function properly.
Best Practices for Hardening Veeam Backup Repositories based on Windows are:
2. Use a standalone Windows Server which is not part of any Active Directory Domain.
6. Modify the Firewall, with dedicated rules for Veeam to allow access to specific ports.
Furthermore, if a Domain Admin account is compromised you do not want that account to be
able to overrule a backup repository account password so the hacker gets access to the backup
files together with access to the whole environment.
Place the repository servers in a Restricted Zone, because these servers contain a 100% copy
of your production environment! The repository servers should be physical secured and have
appropriate access control systems in place. This way access is restricted, who does have access
is registered and monitored at certain specified levels.
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 24
Veeam Security Best Practices 2022
When your organisation does not allow you (e.g. global security policy) to use the built-in local
administrator account, you can create a new local account and give it administrative access.
Make sure the Local Administrator account is highly secure in this case.
Note: UAC affects connections for nondomain/local user accounts. If you connect to a remote
computer using a nondomain/local user account included in the local Administrators group
of the remote computer, then you must explicitly grant remote DCOM access, activation, and
launch rights to the account. User Account Control (UAC) access-token filtering can affect
which operations are allowed or what data is returned. Under UAC, all accounts in the local
Administrators group run with a standard user access token, also known as UAC access-
token filtering. An administrator account can run a script with an elevated privilege “Run as
Administrator”. Some securable objects may not allow a standard user to perform tasks and offer
no means to alter the default security. In this case, you may need to disable UAC so that the local
user account is not filtered and instead becomes a full administrator. One important thing to
know is that UAC is not a security boundary. UAC helps people be more secure, but it is not
a cure all. UAC helps most by being the prompt before software is installed. This part of UAC
is in full force when the “Notify me only when…” setting is used. UAC also prompts for other
system wide changes that require administrator privileges which, considered in the abstract,
would seem to be an effective countermeasure to malware after it is running, but the practical
experience is that its effect is limited. For example, clever malware will avoid operations that
require elevation. Be aware that for security reasons, disabling UAC should be a last resort.
The downside of creating a newly administrative local account is that you will need to disable
Remote User Account Control (UAC) because this Windows function prevents local accounts
from running in an elevated mode when connecting from the network. Veeam accesses
the ADMIN$ and C$ through the Installer Service with the local account you presented while
adding the Windows server to Infrastructure in Veeam Backup & Replication.
The connection will fail with the following error message: Access is denied –tr:Error code:
0x000000051 –tr:Failed to create persistent connection to ADMIN$ shared folder on host [host
name or ip-address] –tr:Failed to install service [VeeamDeploySvc] was not installed on the host
[host name or ip-address] when Remote UAC is Enabled on the Windows Server.
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 25
Veeam Security Best Practices 2022
or with the error message: RPC Client is not a member of built-in Administrators group. –tr:Error
code: 0x80070005 when the server was already added as a Veeam Backup Repository through
Infrastructure within Veeam Backup & Replication.
The Veeam Installer service pushes the Veeam binaries through the ADMIN$ and C$ share on
the target machine. It also uses administrative shares later for other jobs.
You can disable Remote UAC on the repository server by using REGEDT32 to navigate to
the following registry path:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 26
Veeam Security Best Practices 2022
LocalAccountTokenFilterPolicy
Add a new Key with type DWORD (32-bit) Value and name it LocalAccountTokenFilterPolicy give
it a value of 1. No restart is needed.
Remove all accounts except the SYSTEM and the account you are using.
Important: the SYSTEM group account can also be removed, but then the Veeam services
need to start with the local administrative account used instead of Local System otherwise
the backups will fail. Keep the K.I.S.S. principle in mind here.
After adding the used administrative account on the security tab of the disk(s) where backups
will reside. Open the advanced security settings and Change the Owner. When there are already
backup files on this disk make sure to tick the box: Replace all child objects permissions entries
with inheritable permissions entries from this object.
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 27
Veeam Security Best Practices 2022
AdvancedSecuritySettings
2. Keep Windows Firewall On and manual install the Veeam Installer Service (VeeamDeploySvc)
3. Switch Windows Firewall Off and enable File and Printer Sharing during the first install
Option 1 — Windows Firewall On and add three new firewall rules From a command prompt run
the following three commands to add three new rules to the Windows Firewall:
netsh advfirewall firewall add rule name=”Veeam (DCOM-in)” dir=in action=allow protocol=TCP
LocalPort=135 enable=yes program=”%systemroot%\system32\svchost.exe” service=RPCSS
remoteip=<VBR Server IP-address>
netsh advfirewall firewall add rule name=”Veeam (SMB-in)” dir=in action=allow protocol=TCP
LocalPort=445 enable=yes program=”System” remoteip=<VBR Server IP-address>
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 28
Veeam Security Best Practices 2022
netsh advfirewall firewall add rule name=”Veeam (WMI-in)” dir=in action=allow protocol=TCP
LocalPort=RPC enable=yes program=”%systemroot%\system32\svchost.exe” service=winmgmt
remoteip=<VBR Server IP-address>
After adding these firewall rules nothing else has to be done to the Windows server to be
added to the Veeam Infrastructure components. You also do not have to switch on File and
Printer Sharing specifically.
Tip: You can also store these three commands in a windows bat file and run that on every
Windows server you are preparing to use as a Veeam Infrastructure component.
Option 2 — Windows Firewall On and manual install of Veeam Deployment Service Open
the CMD utility on the repository server and create a folder C:\Windows\Veeam\Backup
mkdir C:\Windows\Veeam\Backup
Run on the Veeam repository server in the directory C:\Windows\Veeam\Backup through CMD
the following command: VeeamDeploymentSvc.exe -install this way the Veeam installer service
will be installed. Veeam will add Firewall rules for Veeam during installation, which are visible as
Veeam Networking in the firewall under Allowed apps and features.
Tip: This manual install process can be interesting for so called ‘Dark Sites’. With the command:
VeeamDeploymentSvc.exe -uninstall you can remove the installation services.
Option 3 — Windows Firewall Off and enable File and Printer Sharing Disable the Windows
Firewall for the Private Networks during the initial Veeam installation. This way the right
binaries gets pushed to the Windows repository server. Veeam will add Firewall rules for Veeam
during installation, which are visible as Veeam Networking in the firewall under Allowed apps
and features. After the process completed successful make sure you enable the Windows
Firewall again!
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 29
Veeam Security Best Practices 2022
1. Error code 0x00000005 refers to Remote UAC and local administrative account but not
the original local administrator, code 0x00000040 refers to Server service stopped/
crashed no administrative shares available, 0x00000057 multiple same usernames in
Veeam credentials manager with different passwords ↩
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 30
Veeam Security Best Practices 2022
For general information on the Hardened Repository on Linux, please see the user guide.
As a reminder or complement to the user guide, consider the following actions to create
a hardened repository.
Do not forget to remove the user from sudoers group after installation.
Beware of IPMI
Any management tool, such as ILO or DRAC can be used to access the repository, and even to wipe
the hard drives. It is strongly recommended to unplug these tools from the network when not in use.
NTP
Time management is crucial when speaking about immutability.
It is not advised to use public NTP servers, since it would mean internet exposure of
the repository server. Using your own NTP server is an option, but still a security breach in case
an attacker takes control of it.
Using CMOS clock is an advised option, but the counterpart is to regularly check and manually
set system time. Also, a time difference between the repository and the backup server would
make logs analysis more complex by forensics.
A second advised and interesting option is to use a DCF77 (or locally equivalent) dongle with
XNTP package to synchronize the repository on long wave signal.
© 2022 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 31