redp5744
redp5744
Christian Burns
Ondrej Bláha
Erin Farr
Phillip Gerrard
Meghan Grable
Juan Carlos Jimenez
Alexis Kojic
Ranjith Rajagopalan Nair
Daniel Paulin
Ramakrishna Vadla
Christopher Vollmar
Hybrid Cloud
Redpaper
IBM Redbooks
March 2025
REDP-5744-00
Note: Before using this information and the product it supports, read the information in “Notices” on page v.
This edition applies to IBM Storage Defender Data Protect 7.1.1 and 7.1.2 and IBM Storage Defender Data
Resiliency Service (DRS) 2.0.9.
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .v
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Authors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Now you can become a published author, too! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Stay connected to IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Chapter 1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 What is IBM Storage Defender Data Resiliency Service. . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 IBM Storage Defender overview and vision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2.1 Why IBM Storage Defender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3 IBM Storage Defender components and functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
This information was developed for products and services offered in the US. This material might be available
from IBM in other languages. However, you may be required to own a copy of the product or product version in
that language in order to access it.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area. Any
reference to an IBM product, program, or service is not intended to state or imply that only that IBM product,
program, or service may be used. Any functionally equivalent product, program, or service that does not
infringe any IBM intellectual property right may be used instead. However, it is the user’s responsibility to
evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The
furnishing of this document does not grant you any license to these patents. You can send license inquiries, in
writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive, MD-NC119, Armonk, NY 10504-1785, US
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may make
improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time
without notice.
Any references in this information to non-IBM websites are provided for convenience only and do not in any
manner serve as an endorsement of those websites. The materials at those websites are not part of the
materials for this IBM product and use of those websites is at your own risk.
IBM may use or distribute any of the information you provide in any way it believes appropriate without
incurring any obligation to you.
The performance data and client examples cited are presented for illustrative purposes only. Actual
performance results may vary depending on specific configurations and operating conditions.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the
capabilities of non-IBM products should be addressed to the suppliers of those products.
Statements regarding IBM’s future direction or intent are subject to change or withdrawal without notice, and
represent goals and objectives only.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to actual people or business enterprises is entirely
coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the sample
programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore,
cannot guarantee or imply reliability, serviceability, or function of these programs. The sample programs are
provided “AS IS”, without warranty of any kind. IBM shall not be liable for any damages arising out of your use
of the sample programs.
The following terms are trademarks or registered trademarks of International Business Machines Corporation,
and might also be trademarks or registered trademarks in other countries.
Enterprise Design Thinking® IBM Research® Redbooks (logo) ®
IBM® IBM Spectrum® X-Force®
IBM Cloud® IBM Z® z/OS®
IBM FlashCore® QRadar®
IBM FlashSystem® Redbooks®
The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive
licensee of Linus Torvalds, owner of the mark on a worldwide basis.
Red Hat, Ansible, are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the United
States and other countries.
UNIX is a registered trademark of The Open Group in the United States and other countries.
VMware, and the VMware logo are registered trademarks or trademarks of VMware, Inc. or its subsidiaries in
the United States and/or other jurisdictions.
Other company, product, or service names may be trademarks or service marks of others.
This IBM Redpaper publication describes IBM’s new cyber resiliency solution, IBM Storage
Defender Data Resiliency Service (DRS). By using DRS, users can leverage new detection
mechanisms for their environment to detect threats early, and get a full view of the
infrastructure by connecting primary storage arrays like IBM FlashSystem® and auxiliary
storage solutions for backup, such as IBM Defender Data Protect and IBM Storage Protect.
Also, users can set up Governance profiles to help ensure that their data is meeting internal
or regulatory standards.
This IBM Redpaper publication is designed to help users and administrators to better
understand how to set up, tailor, and configure this offering for their environments.
Authors
This paper was produced by a team of specialists from around the world working with
IBM Redbooks.
Ondrej Bláha works as a Technology EMEA subject matter expert (SME) and Architect
focusing on IBM Storage Software with a specialization in data resilience (the Storage
Defender strategy for primary and secondary workloads). He has been with IBM for more
than 17 years, and for the last 10 years, he has served in several regional roles as an SME
and Customer Technical Support or Technical Advisor for key IBM customers. Ondrej is an
official IBM instructor for external IBM Software Training organizations who creates technical
hands-on IBM Storage Defender courses in the EMEA region. In 2016, he received the “Best
of IBM” award due to the delivery of key projects that still act as public references today.
Ondrej is originally from the Czech Republic and lives in Prague.
Erin Farr is a Senior Technical Staff Member (STSM) who is based in the IBM Storage CTO
Office, where she explores new technology for future products and shapes strategy in
anticipation of industry trends. Her areas of focus are cybersecurity and cyber resiliency. She
was instrumental in forming the vision for IBM Storage Defender, and she is passionate about
helping customers prevent and recover from cyberattacks. Before joining IBM Storage in
2021, she was the team lead for the IBM Z® Center for Secure Engineering for z/OS. She
worked on product development for most of her career, in areas such as IBM z/OS® UNIX,
analytics, virtualization management, and open source.
Meghan Grable is a global Growth Product Manager who specializes in data management
and resilience solutions, both Software as a Service (SaaS) and software-based, with a
strong focus on Product-Led Growth (PLG) strategies. With over 5 years of experience, she
has led cross-functional teams to develop cutting-edge technologies that empower
organizations to exceed their compliance goals and enhance their cyber resilience against
threats like cyberattacks, natural disasters, and human errors. Based in Raleigh, North
Carolina, Meghan holds a degree in Service Design from the Savannah College of Art and
Design. Her expertise in Service Design, enterprise design thinking, and PLG enables her to
create innovative, customer-focused products that drive business success and growth directly
through user engagement and product experience.
Juan Carlos Jimenez is the Worldwide Data Resiliency Product Manager who is based in
Dallas, Texas. He is focused on defining roadmaps, initiatives, and strategies within the
various data resiliency software products that he manages. Juan Carlos brings an end-to-end
view to cyber resilience, and leverages his expertise in both storage and security. Juan Carlos
developed the IBM Cyber Resiliency Assessment Tool, which has been helping numerous
enterprises identify and close gaps in their IT environments. He holds a Management
Information Systems degree from the University of Arizona.
Alexis Kojic is a Storage Technical Sales Specialist who is based in Canada. He has 2 years
of experience in the IT storage and cyber resilience field. He holds a BEng degree in
Computer Engineering from Toronto Metropolitan University.
Ranjith Rajagopalan Nair is a Software Architect who is based at IBM India. He has worked
at IBM for 20 years, which includes working on IBM Systems Storage for the past 10 years.
Ranjith’s current responsibility includes the development and delivery of IBM Storage
Insights. Ranjith holds a master’s degree in Computer Science from the University of Kerala.
Ramakrishna Vadla is an STSM and Lead Architect for IBM Storage Insights and
IBM Spectrum Control. He is responsible for developing and designing the IBM Storage
Insights product, which monitors storage systems. With over 20 years of experience, he has
worked on large-scale distributed systems across various technologies, including AIOps,
microservices architecture, storage management, cloud-native services, and middleware
systems. He has spoken at multiple technical forums, including the SNIA Storage Developer
Conference and IBM global conferences, and has contributed to the open-source community.
He holds a Master of Technology degree in Computer Science from the International Institute
of Information Technology, Hyderabad, India.
Find out more about the residency program, browse the residency index, and apply online at:
ibm.com/redbooks/residencies.html
Comments welcome
Your comments are important to us!
We want our papers to be as helpful as possible. Send us your comments about this paper or
other IBM Redbooks publications in one of the following ways:
Use the online Contact us review Redbooks form found at:
ibm.com/redbooks
Send your comments in an email to:
[email protected]
Mail your comments to:
IBM Corporation, IBM Redbooks
Dept. HYTD Mail Station P099
2455 South Road
Poughkeepsie, NY 12601-5400
Preface ix
x IBM Storage Defender: Data Resiliency Service
1
Chapter 1. Introduction
This chapter introduces the IBM Storage Defender Data Resiliency Service (DRS). It
describes this solution’s overview and vision for the future. Later chapters describe the
different functions of the solution, how to set them up, configure them, and run them to drive
the most value.
DRS is a cloud-based data resilience platform to help organizations restart essential business
operations if there is a cyberattack or other unforeseen catastrophic event. DRS provides
data resilience and compliance, early threat detection, and safe and fast recovery
orchestration for data that is stored across primary and auxiliary storage. The DRS software
helps to detect and respond to cyberthreats, such as malware and ransomware attacks, and
enables rapid recovery of data if there is a security breach or data loss. Administrators can
take quick and effective action to minimize the risks of massive financial losses or damage to
a company’s reputation.
DRS offers features such as data backup, data management, disaster recovery (DR), and
data isolation to help organizations protect their data from cyberthreats and unexpected
disruptions. Also, it provides rapid recovery of data and applications if there is a disaster or
data loss, minimizing downtime and helping ensure business continuity.
Note: The term auxiliary storage denotes a secondary or backup storage location that
enables you to use copies of data in place before the data is recovered.
In addition, although an enterprise might practice their DR recovery, research2 shows that few
enterprises are practicing cyber recovery, which includes aspects outside of traditional DR:
Playbooks to help ensure seamless interaction with incident responders.
Antivirus scanning during recovery to avoid the reintroduction of dormant malware.
Practicing identification of good data copies at scale. Cyberattacks are not as
instantaneous as a power outage, for example, and the points of impact might vary across
available recovery points.
The industry has responded to some of these threats with solutions that provided extra
protection, such as air gaps or immutability. Initially, many auxiliary storage vendors also
added threat detection to their solutions, which led Gartner to coin the term cyberstorage.
Solutions with threat detection can be pure software or a dedicated appliance, but the trend is
that threat detection and response capabilities are being added into storage across the
industry. At first, only auxiliary storage vendors were providing this capability, but IBM saw a
need for detection in primary storage.
1
Source: 1. Ransomware 2024. If we have backups, why are we still paying a ransom?. IDC. March 2024. IDC
Survey - Doc Document number:# US51941924
Source: 2. 2022 Gartner Hype Cycle report
2
Ransomware 2024. If we have backups, why are we still paying a ransom?. IDC. March 2024. IDC Survey - Doc
Document number:# US51941924
Chapter 1. Introduction 3
However, as IBM investigated this trend, it quickly became apparent there were a series of
concerns that needed to be addressed:
If an attack is detected, who is expected to respond? Nobody expects storage
administrators or data protection teams to become incident responders.
Disparate solutions make it difficult to identify and find the last good copy. Recovery points
can be primary storage snapshots or auxiliary storage backups. Often, they are managed
by different tools and different teams. If an incident is actively occurring, a storage
administrator or incident responder might not have a holistic view across both primary and
secondary storage.
If an enterprise takes backups once a day, would backup-based detection (only) be fast
enough to detect issues?
How do you determine the scope of damage? Which systems were impacted? What is the
timeline?
Although storage-based threat detection is important, it is unlikely that someone would
swap out their current solution only to get access to threat detection. How can this need for
extra features be met?
The vision of IBM Storage Defender is one that meets all these needs. DRS is a Software as
a Service (SaaS) management feature that is designed and intended to integrate with and sit
above an enterprise's existing storage system investments. DRS enables a holistic view
across primary and auxiliary storage while providing advanced ransomware detection and
recovery features that address modern threats in storage environments.
DRS deploys AI-powered sensors to quickly detect threats and anomalies from backup
metadata, array snapshots, and other relevant threat indicators. Signals from all available
sensors are aggregated to increase detection paths for a fast response.
IBM Storage Defender Data Protect offers an immutable auxiliary storage solution that
incorporates backups with rapid recovery, policies to lock data even from administration
removal, and two-person integrity checking. It features a scale-out, clustered architecture with
deep integration into databases and hypervisors and a robust global management structure.
By integrating DRS with an SIEM like Splunk or QRadar, advanced notification aggregation
allows for crucial information to be available and used for initiating the next steps between
infrastructure and SecOps teams. This setup provides needed information use when deciding
whether recovery plans should be implemented immediately or how best to address threats.
Clean Room isolation helps ensure that the backups are clean and malware-free before
returning the data to a production environment. As a customer-managed resource, DRS
provides guided testing workflows to recover, test, and isolate backups before pushing them
to production systems, which help ensure that clean recovery data is present.
DRS also brings in data from various points to help organizations become proactive in their
approach to data resilience. Identifying threats early helps ensure the availability of business
operations, which is essential to building operational resilience and trust. DRS is an advanced
solution that helps organizations build operational resilience by bringing together multiple
levels of threat detection and data protection that serve as a base when building out
advanced lines of defense across primary and auxiliary storage. This technology enables
users to effectively detect and respond to cyberattacks and other unforeseen threats to
storage environments. When put together, these features enable DRS to help navigate
unpredictable events and help ensure the continuity of vital business operations and
processes.
Chapter 1. Introduction 5
6 IBM Storage Defender: Data Resiliency Service
2
The architecture shows you how DRS fits into IBM Storage Defender and what are the
elements that make up the architecture. This chapter describes the following elements:
IBM Storage Defender Connection Manager
Data sources
Recovery Locations
Sensors
Recovery Groups
Clean Room
DRS can surface and aggregate the detection of operational threats on your production data.
At the time of writing, this feature includes the following system-level detection:
Detection on the file-system level by using IBM Storage Defender Sensor technology
Detection on the storage block level by using IBM Storage FlashSystem and
IBM FlashCore® Module (FCM) technology and statistical analysis to identify threat
patterns
DRS introduces the concept of Recovery Groups, which are used to group resources
together within the DRS. The combination of resources enables DRS to perform automated
test recoveries and to verify automatically whether the protection policies that are set up in
the related data protection application meets the requirements for a cyber resilient
environment. In DRS, multiple Recovery Groups can be defined. The key parts of a Recovery
Group are the protected resources, for example, virtual machines (VMs); the Clean Room
profile that defines the environment that can be used for automated test recoveries; and the
Governance profile that specifies the requirements for cyber resiliency within each Recovery
Group that is defined.
DRS is designed to enhance data cyber resiliency to help protect against events like
hardware failures, human errors, sabotage, natural disasters, and ransomware. By
consolidating key parts of the existing IBM Storage portfolio into a single solution, you can
use new detection and protection capabilities on your data. DRS includes the following
capabilities:
Supports software protection for multiple operating systems inside a VMware
environment.
Deploys anomaly based sensor agents on VMware VMs (IBM Storage Defender Sensors).
Integrates and aggregates the hardware detection capabilities of IBM Storage FlashSystem
to receive alerts from IBM Storage Insights and IBM Storage Defender. These alerts may
be sent through integration with IBM QRadar and Splunk SIEM solutions.
May recover data from a more recent point in time by creating a SafeGuarded Copy
(immutable hardware snapshot) on IBM Storage FlashSystem.
May recover IBM Defender Data Protect backups into the Clean Room for testing as part
of the Recovery Group’s collection of recovery points.
Provides a dashboard that can help clients better understand inconsistencies between
their primary storage copies and backup copies for the same workload or application.
Additional dashboard features include the following items:
– May create and define Recovery Groups, which are a collection of data resources that
should be backed up and recovered as a unit.
– A summary of connected resources like VMs, data sources, Recovery Locations, and
connection managers.
– A license usage overview that highlights the number of Recovery Groups and deployed
sensors.
IBM Storage Defender Connection Manager provides on-premises data center connections to
the following resources:
Data sources (IBM FlashSystem, IBM Storage Defender Data Protect, and VMware
vCenter)
Recovery Locations
Sensor control nodes and IBM Storage Defender Sensors
The data sources and Recovery Locations that are connected to the IBM Storage Defender
Connection Manager are inventoried automatically, and IBM Storage Defender Sensors
observe the systems on which they are installed.
The Connection Manager must be installed in an on-premises data center or cloud instance. It
is in an OVA format, and is deployed to your local VMware vCenter. Inside the Connection
Manager, Red Hat Enterprise Linux is the underlying operating system, but is part of the
installation. The Connection Manager software becomes active and connects to your local
resources, and the DRS runs in the cloud quickly with less initial configuration before initial
use.
The Connection Manager can be deployed from an OVA or on a bare metal server. Then, you
can log in to Connection Manager and add connections.
Figure 2-2 on page 11 shows the opening window of the Connection Manager.
Connections in Connection Manager include data sources, Recovery Locations, and sensor
control nodes. Typically, only one Connection Manager should be deployed at each physical
location. Data sources must be registered to the Connection Manager instance that is in the
same physical location.
Connection Manager also includes a job manager, which communicates internally with
various workload agents that run in Connection Manager, and also catalogs safeguarded
copies for IBM FlashSystem.
For IBM FlashSystem, Connection Manager gathers inventory, catalogs safeguarded copies
and recovery tasks, and restores from backup snapshots.
For IBM Storage Defender Data Protect clusters and VMware vCenters, Connection Manager
scans for VMs and protected systems and sends the scan results to DRS. It also coordinates
the recovery of VMs that are protected by IBM Storage Defender Data Protect.
Figure 2-5 on page 13 shows an example of the relationship between your production
environment and a Recovery Location.
The sensor control node hosts the sensor software and distributes it to the VMs that have
sensors that are installed. These sensors observe the systems that they are installed on and
can detect cyberattacks, like a ransomware attack, in real time. When the sensor detects a
cyberattack, the sensor alerts you by sending messages to the on-premises Connection
Manager and DRS.
Connection Manager comes with a built-in control node so you can start adding sensors right
away. However, if you want to use your own control nodes, you can add them through the
Connection Manager and use the provided Ansible playbooks to manage the sensors.
A high-level example of the workflow and data path for DRS sensors is shown in Figure 2-7
on page 15.
For example, if a Recovery Group is assigned VM1, VM2, VM3, and VM4, then DRS
determines whether it can find backup snapshots for these VMs in the secondary data
sources within the same location (data center). When DRS correlates the primary and
secondary resource data for the assigned VMs, it proceeds to test the Recovery Group based
on the policy and Clean Room profile settings.
In the DRS dashboard, you can find the details about Recovery Groups. Figure 2-8 shows
Recovery Group details.
Profiles
The Governance and Clean Room profiles are used to define and set the recovery objectives
of Recovery Groups and recovery target environments.
Governance profiles are created and applied to the Recovery Group so that specific recovery
objectives may be defined and associated with one or more groups. These recovery
objectives are composed of preset points in time for the recovery points and the preset
minimum retention time for the recovery points. The Governance profile may specify a
threshold time that must elapse before the next recovery test is performed for the Recovery
Group. Separate recovery objectives can be defined for IBM Storage FlashSystem and
IBM Storage Defender Data Protect independently.
Figure 2-9 shows an overview of recovery objectives that are configured in the Governance
profile.
Figure 2-9 Recovery objectives that are configured in the Governance profile
The Clean Room profiles connect the Recovery Groups that belong to resources in the
production environment with configuration and resources that are defined in DRS. The
connected resources are IBM Storage FlashSystem, IBM Storage Defender Data Protect,
and the Clean Room environment. This resource configuration defines how IBM Storage
Defender behaves during a recovery event.
Figure 2-10 Clean Room objectives that are configured in the Clean Room profile
To help ensure the successful recovery of the Recovery Group that is assigned to the specific
Clean Room profile, configuration requirements must be met. The configuration of a Clean
Room profile enables the usage of the profile for one of the following three different use
cases:
1. Recovery from IBM Storage FlashSystem safeguarded snapshots
2. Recoveries from IBM Storage Defender Data Protect backup copies
3. Recovery from both IBM Storage FlashSystem safeguarded snapshots and IBM Storage
Defender Data Protect backup copies
Important: If these requirements are not met, the recovery of the VMs that belong to the
specific Recovery Group fail for Clean Room recoveries.
In addition to the conceptual dependencies between the Clean Room profile and other IBM
Storage Defender components, consider that the same Clean Room profile can be reused for
different Recovery Groups. In cases where a Clean Room is associated with multiple
Recovery Groups, the different Recovery Groups might have different requirements for their
recovery. This situation is important when recovering from IBM Storage FlashSystem
because the requirements for network infrastructure, mapping of volumes, or SAN zoning
might be different. Therefore, it might be beneficial to implement multiple Clean Room profiles
with different configurations to provide more flexibility for the recovery scenarios that you want
to implement for different Recovery Groups.
Resources are added to Recovery Groups during its creation, and are checked during
inventories by the Connection Manager.
Protected VMs may be recovered into an associated Clean Room for verification before their
recovery into a production environment. IBM Storage Defender is connected to each VM
instance and provides observation and assistance with this process.
A Clean Room environment setup has several similarities with a standard vCenter setup.
Apart from the Recovery Groups that are restored by using data stores that are mapped from
data protection solutions, a DMZ is implemented to enable access to the isolated portions of a
Clean Room.
Isolation is an important aspect to consider when implementing Clean Room functions. There
are multiple dimensions, such as isolation of infrastructure, network, and access
management. In addition to isolation, you must monitor and log a Clean Room environment.
The following sections describe the different aspects of isolation for a Clean Room
environment.
The logical separation of administrative roles for the production system and the Clean Room
environment and strict limits on a user’s permissions prevent a user from influencing both
environments.
The implementation of auditable logging for all operations in the Clean Room helps ensure
that any operation on the recovered data is traceable. This implementation includes the
creation and configuration of the Clean Room; Clean Room operations, such as recovery,
data masking, and anonymization; or temporary production usage of the data.
For more information, see IBM Storage Defender: Clean Room environments.
A login page opens, where you enter your username and password (Figure 2-12). Confirm
the login by entering the confirmation code from your authentication application.
From the Connections dashboard data sources, you can add Recovery Locations and sensor
control nodes to the DRS configuration.
2. Enter the hostname or IP address of the data source and click Next. (Figure 2-15 on
page 23).
5. Click Add. Once the process completes, the new data source is added to Connection
Manager, as shown in Figure 2-18.
Figure 2-22 shows that the new Recovery Location was successfully added to the
Connections list.
2. Enter the credentials that you created on the Ansible control node during the IBM Storage
Defender sensor setup, and click Add (Figure 2-24).
2. When creating a Governance profile, use the Immutable Snapshots tab to select
thresholds for immutable snapshot recovery points that are available from the
IBM FlashSystem server (Figure 2-27). Select the checkbox to enable point in time
verification and retention time verification for the specified time interval. Click Next.
4. In the Recovery testing tab, select the thresholds for successful recovery testing. Select
the checkbox to enable test frequency verification and specify time interval (Figure 2-29).
5. Under the Backup recovery tab, specify your recovery preferences when recovering
from IBM Storage Defender Data Protect (Figure 2-35 on page 35). If you plan to recover
from a backup, select the vSphere resource pool from the drop-down list that you use for
recovery. The default resource pool on each vCenter is the pool that is called Resources.
You can have other resource pools that you created in your vCenter. All available resource
pools can be selected for recovery. You can select the vCenter data store from the
drop-down list that you want to use for recovery with this policy. Click Create to create a
Clean Room profile with the specified values.
The Clean Room profile is created under the Clean room tab (Figure 2-36).
By creating the Governance and Clean Room profiles, you configured the recovery objectives
of Recovery Groups and recovery target environments.
These ransomware alerts that are generated by IBM Storage Insights Pro for a monitored
IBM FlashSystem can be auto-forwarded to IBM Storage Defender to trigger cyber resiliency
workflows, and protect your systems as soon as possible. For a customers subscribing to
IBM Storage Insights Pro and IBM Storage Defender, this function enables enhanced
protection from ransomware attacks with simple integration.
For more information, see the IBM Redbooks website for publications about the
IBM FlashSystem family, such as IBM Storage FlashSystem 7300 Product Guide: Updated
for IBM Storage Virtualize 8.7, REDP-5741.
With IBM Storage Virtualize 8.7 and FCMs with FCM firmware 4.1, the ransomware threat
detection is further improved by the following process:
1. IBM FCMs collect and analyze detailed ransomware statistics from every I/O with no
performance impact.
2. IBM Storage Virtualize runs an AI engine on every IBM FlashSystem, which is fed
machine language (ML) models that are developed by IBM Research® and trained on
real-world ransomware.
3. The AI engine learns what is normal for the system and detects threats by using data from
FCM.
For IBM FlashSystem running firmware 8.6.3 and later, IBM FCM (FCM4 with firmware 4.1)
can detect ransomware threats in the data path and send threat details to IBM Cloud® Call
Home. IBM Storage Insights Pro monitors ransomware threats that are detected on all
monitored IBM FlashSystem systems and generates alerts. These alerts are sent to the
storage administrator through email and are also displayed in the IBM Storage Insights Pro
user interface. Also, IBM Storage Insights Pro identifies affected volumes, marking them as
having detected ransomware threats.
The basic working principle of the integration between the two services is as follows:
IBM FlashCore Module 4 technology is built into the IBM Storage FlashSystem system
that is used.
The IBM Storage FlashSystem system is registered in IBM Storage Insights Pro. When
the system is registered, the IBM FCM starts reporting the detected anomalies and
ransomware threats to your IBM Storage Insights Pro tenant.
The IBM Storage FlashSystem system must be registered in DRS. This registration is
done in the user interface of Connection Manager.
IBM Storage Insights Pro communicates with DRS. The health status of your IBM Storage
FlashSystem system is sent to DRS so that if IBM Storage Insights Pro stops monitoring it,
it can be made known to the users.
IBM Storage Defender correlates the information that is received from the storage system
to Recovery Groups.
This section describes the IBM Defender sensors that are used for detecting threats against
live data in near real time.
If each of these criteria is met, an event is raised to IBM Storage Defender Data Resiliency
Service (DRS) that indicates a possible malware event, and a case is opened, as shown in
Figure 3-1.
In the details for the specific event (Figure 3-2 on page 41) both informational and actionable
information is provided, which includes the following items (in our example):
The type of event, which in this case is a “Possible malware event” of ransomware.
The date and time that the event was detected, which can help with pinpointing clean
copies for recovery and initial forensic analysis.
The VM that is impacted (in this case, sts-pok-dsn-2-rhel) and its vCenter.
The suspected malicious process: python3 ./filesEnc.py.
The number of files that are affected (235) for this specific window of detection.
The source (originator) of the event, in our case, an IBM Storage Defender sensor.
IBM FlashSystem related events may also be raised from IBM Storage Insights Pro.
You can also drill down further and review detailed information for the event by clicking View
sensor logs. A sample sensor log is shown in Figure 3-3.
Figure 3-3 shows additional, actionable information, such as the hostname (Fully Qualified
Domain Name (FQDN)) of the VM and the Process ID (pid), which can be used to identify and
kill the suspicious process. It also shows the user ID (uid), which an admin with appropriate
rights can use to lock out that user. Detailed logs can also be useful information for incident
responders because the absolute path names of every impacted file are also shown.
Note: At the time of writing, the encryption detection identifies encryption only on files that
are larger than 4 KB, so it is likely that if specific files are identified as impacted, it is
probable that smaller files in these locations are too.
The sensors also send regular heartbeats to the DRS to indicate that both the sensors and
the dependent network connections are healthy. If a heartbeat is missed, an event is raised,
as shown in Figure 3-5.
After closing the case, the DRS dashboard continues to allow access to historical events. You
may search on previous threat events and drill down to review the details of those events.
This section shows how to deploy a sensor control node outside of the IBM Storage Defender
Connection Manager.
Install the sensor control software on the sensor control node by completing the following
steps:
1. Log in to the system that you want to use as a sensor control node.
2. Copy the sensor download package to a working directory.
3. Unpack the compressed software package that you downloaded.
4. In the newly created directory, run the setup.sh shell script.
The script requires the following input values. Use unique names for each entity in the
environment:
Hostname: The FQDN of the Connection Manager.
Username: Define a username that is to register IBM Storage Defender sensors
that are installed on VMs for the sensor control node.
Password: Define a password that is related to the username.
Vault password: The username and password that were defined are stored and
encrypted in a local Ansible vault. This password is used to protect the
access to the vault.
Note: Multiple sensor control nodes can use the same username and password for sensor
installation or registration. In this case, only one control node must be added. If you
attempt to add more than one control node by using the same username, the following
error occurs in the GUI:
Error getting source native ID: Username already in use. Select a different
username.
5. In the dialog box, click Remove to confirm that you want to remove the sensor control
node from the Connection Manager.
To install an IBM Storage Defender sensor on one or more systems, complete the following
steps:
1. Log in to IBM Storage Defender.
2. Click the hamburger menu (three horizontal lines) in the upper left of the window.
3. Select Data Resiliency → Recovery Groups.
4. From the list of Recovery Groups, select the row for the Recovery Group that you want to
install the sensor on.
Note: If you previously installed sensors, you see the Manage button on the Defender
sensors tile.
6. In the Manage sensors window, select one or more VMs by checking the corresponding
boxes.
7. Click Add sensor + in the title bar.
8. Enter either the username and password or the SSH key for the VM.
Note: All the selected VMs must have the same login credentials.
Note: Monitor the Notification menu to check for completed or failed notifications for each
sensor. If the status is TIMEOUT, the installation request was accepted but did respond for
15 minutes. For the FAILED status, check the detailed error message in the notification.
After the installation completes, the sensor automatically begins monitoring file access
activity on the system. If it detects any unusual access patterns, such as patterns that are
associated with ransomware attacks, the sensor generates an alert. This alert is sent to the
on-premises Connection Manager, which securely forwards it to the DRS. The sensor also
periodically sends heartbeat messages through the Connection Manager to confirm that it is
operating normally.
To install an IBM Storage Defender sensor on one or more systems, complete the following
steps:
1. Log in to the system that is being used as the sensor control node.
2. Go to the working directory where the sensor control software is installed.
3. Create an inventory file containing the FQDNs of all the systems that you want to install
the sensor on.
4. Modify the /etc/ansible/hosts file to include the FQDNs of the target systems.
Note: You can use a different file for the sensor inventory list. If so, use the -i
/your-directory/your-file argument in step 5.
5. Add the FQDNs for the sensor hosts to the hosts file. Under the [defender_sensor_hosts]
tag, list the FQDN of each system, one per line.
Tip: If you use a YAML inventory file, extend it with a defender_sensor_hosts group.
[defender_sensor_hosts:vars]
ansible_ssh_common_args='-o StrictHostKeyChecking=no'
ansible_connection=ssh
ansible_ssh_pass=<ssh password>
ansible_ssh_user=<ssh username>
all:
vars:
ansible_connection: ssh
ansible_ssh_user: <ssh username>
ansible_ssh_pass: <ssh password>
ansible_ssh_common_args: '-o StrictHostKeyChecking=no'
children:
defender_sensor_hosts:
hosts:
<FQDN1>:
<FQDN2>:
<FQDN3>:
6. Run the Ansible playbook command in Example 3-2 to begin the installation.
7. When prompted, enter the vault password that you created during the installation of the
sensor control node software.
Note: To avoid saving passwords in the hosts file, use the arguments --ask-pass
--ask-become-pass to provide the SSH and sudo passwords during the playbook run time.
Note: The Connection Manager uses FQDNs to perform sensor installation and
uninstallation. You cannot select the following VMs for sensor uninstallation:
VMs without an FQDN
VMs that use localhost as the FQDN
VMs with duplicate FQDNs
Any changes to VM network configurations are reflected in the GUI after the next inventory
scan, which occurs automatically every hour or can be manually triggered.
Important: If you are trying to uninstall a sensor that is associated with a Connection
Manager that was destroyed or improperly backed up and restored during a Connection
Manager OVA upgrade, the uninstallation fails. For troubleshooting, see Resolving an IBM
Storage Defender sensor uninstallation failure.
After the uninstallation completes, the IBM Storage Defender sensor service is removed from
the selected VMs.
Note: You can use a different file for the sensor inventory list. If so, use the -i
/your-directory/your-file argument in step 4.
4. Add the FQDN or IP address of all systems that you want to equip. Add one per line under
the tag [defender_sensor_hosts].
5. Run the Ansible playbook command that is shown in Example 3-3.
After the playbook runs, the sensor is removed from the host.
Note: To install python311, the Python3 module must be enabled. For details on enabling
modules, refer to the SUSE Linux Enterprise Server documentation.
This dashboard contains several elements that enable users to view more information and
context. These capabilities include the following items:
Resiliency Monitoring through IBM Storage Defender Connection Managers.
Actions that can be performed, which include open cases, assigned actions, required
updates, and other issues.
Recovery Groups statuses.
Governance Profiles statuses.
Recovery Posture status.
With this dashboard, you can see locations, see the states or statuses of them, and drill in on
the managed Connection Managers. You can use the View All link to see the Connection
Managers tab of the Resources window. This window highlights the Connection Managers,
their states, their types, hostnames, versions, and whether updates are required, as shown in
Figure 4-3.
Figure 4-4 shows the actions that you can take, such as open cases, assigned actions,
required updates, and others.
If you select Recovery Groups on the left of the dashboard, you see the Recovery Group list
(Figure 4-7 on page 55), where you can drill down on any Recovery Group or create one.
You can gather more information about your available resources, available copies,
connections, and Connection Managers by clicking the Resources tab (Figure 4-11 on
page 57) and then clicking Resources in the left pane of the GUI.
Figure 4-14 shows the Recovery Group status of Ready and the details of Governance for the
policy.
Testing recovery points for a Recovery Group establishes the recovery plan. This plan is used
in response to a cyberevent. From the recovery points of the selected Recovery Group, you
can choose a recovery point that is required for testing. To select a recovery point, go to
Recovery Group details, and from the Protection menu, you see all recovery points
(Figure 4-15 on page 59).
You can use these recovery points to test or activate a recovery plan. Figure 4-16 shows the
options that you can select for each recovery point.
Click Test recovery point to test a recovery of the virtual machines (VMs) that belong to the
Recovery Group. These VMs are recovered by using the information that is stored in the
Clean Room profile that is associated with the Recovery Group. Depending on the
configuration of the Clean Room profile, the VMs either start and connect to the defined
network or they do not. When the test recovery finishes successfully, the status of the
recovery point is updated from “Recovery in progress” to “Awaiting validation”, as shown in
Figure 4-17.
Figure 4-19 highlights the ability to validate the recovery point after the restoration of the
Recovery Group to the Clean Room. You can identify the use case of starting the recovery
and defining the status of the action as “Test Only” or whether the activity was part of a
Recovery Plan resulting from a cyberincident. Then, you may mark it as valid or not.
Figure 4-20 on page 61 confirms the results of the recovery to the Clean Room and confirms
the results.
After you determine whether the recovery point is valid, you can mark it as Valid or Not Valid.
As part of the validation process, the recovery points are kept in the history of the Recovery
Group until their policies expire them from the inventory of their supporting services.
Depending on the decision that you make, the status of the recovery point will be updated
from “Awaiting validation” to “Validated” or “Not valid”.
In contrast to the manual recovery test, the activate recovery plan process provides the
flexibility to specify a new Clean Room profile for the recovery point. With this option, you can
use a dedicated recovery environment to test the recovery point again and prepare a
recovery point for a downstream promotion into your production environment.
Figure 4-23 shows the Activate recovery plan options where you select the required recovery
plan.
Figure 4-26 Recovery progress information in the Recovery Group Overview window: Example 1
Figure 4-27 Recovery progress information in the Recovery Group Overview window: Example 2
From here, once the recovery process is completed, you may access the VMs that were
recovered to the Clean Room environment and return them to production as needed.
REDP-5744-00
ISBN 0738462020
Printed in U.S.A.
®
ibm.com/redbooks