March 2004 CSO Magazine







 

Calling for Backup

Backing up your data might not seem important—until you need to retrieve it

BY SIMSON GARFINKEL

WHENEVER I'M ASKED to do a security evaluation, the first question I ask is always the same: "Tell me about your backups." The answers, of course, are all over the map. "Backups? We want you to evaluate our security," is a typical response. Or, "We want to get all of our security set up first." The most common response is something along the lines of, "We back up the important stuff, and we keep our fingers crossed about everything else."

Of course, some organizations really have their acts together, with multilevel backups that take the data through two levels of spinning storage and then send it to tape, with every file logged in a central database. But those organizations are the exception, not the rule.

Why are backups on the bottom of so many to-do lists? In part, it's because there is no glory in implementing and maintaining a backup system. Backups are an organizationally difficult task that, if everything goes right, should never need to be used.

Even when they work, they're not the sort of thing that most IT professionals are eager to brag about. "Gee, Boss, the hackers broke in and zapped our accounts receivables database, but fortunately we were able to restore it from a backup!"

Nevertheless, if you are behind in your work and overextended in the budget department, there are many good reasons why you should be dropping other projects and working on your backup system instead.

The most important reason to back up your data should be obvious: If your security is so bad that some hacker does manage to break in and zap your accounts receivables database, at least you'll be able to restore it from a backup.

But backups are about more than just protecting against hackers. Backups are good insurance against all kinds of disasters and mishaps, both natural and man-made.

Hourly backups let you quickly recover from something like an accidentally deleted file or a formatted volume. Weekly backups are vital for recovering important files that aren't used very much—like system configuration and startup files. Quarterly and yearly backups can be really useful in patent disputes and other kinds of litigation. These backups let you literally go back in time and retrieve memos and e-mail messages that have long since been otherwise deleted or lost.

As an information security professional, one of your main tasks is to be the information assurance person; that is, it's your job to ensure that information is available when it's needed. Backups play an important part in providing that assurance.

Of course, this ability to go back in time can be a double-edged sword. It's great if your backup tapes have a downloaded copy of a webpage that shows conclusively how your competitor inadvertently disclosed details of a new invention a week before the company filed for a patent.

On the other hand, it can be particularly annoying—and potentially damaging—when the attorney for a fired assistant requests the backup files of the CEO's personal e-mail, fishing for proof that the boss really was having an affair with her just before she was terminated.

Indeed, because old e-mail messages can be so tremendously damaging, many organizations now have "document retention" policies that call for all e-mail (and all backup tapes) to be deleted after two or three years.

Because of such policies, a good backup system will make one kind of backup for quick system restores and another kind of separately labeled backup for long-term data recovery. That tape might have a copy of the database and configuration files, but not the e-mail.


Disk to Disk
Once you've gone to the trouble of producing a backup tape, you must protect it. The first thing you should do is put it someplace safe (I know of one company that had its server stolen with the backup tape still in the drive!).

Organizations that use large tape libraries don't need to worry about their hardware being stolen—it's too heavy—but they still need to worry about the theft of a tape. What an easy way to steal corporate documents; just have a would-be janitor pocket a few backup tapes while he's cleaning the computer room. You can make thefts less likely by putting a videocamera on your tape vault. Even better, have your backup software encrypt the backup tapes so that they will be useless to thieves. Just don't forget the key. (I usually print out the key, seal it in an envelope and give it to the corporation's attorney to keep in the company's file.)

However, in these days when it costs less money to buy a 200GB hard drive ($150) than to purchase four tapes that can hold 50GB each ($200), a lot of organizations are giving up on tape for backup and just saving everything on spinning storage—that is, on hard disks. The problem with spinning disks, of course, is that they are prone to failure. For some organizations, that doesn't matter a whole lot. In many cases, losing a backup is just not a big deal. Other organizations care a great deal about their backups and use the same sort of redundancy systems that they use for their primary storage.

A lot of managers think that RAID reduces the need for a good backup system. It doesn't. RAID protects you from a drive failure, but it doesn't protect you from a computer virus or a hacker.
These days, the standard way to protect against disk failure is with RAID—a redundant array of independent disks. The two most popular ways of configuring a RAID system is with so-called Level 1 mirroring and Level 5 parity systems. With Level 1, every byte of data is stored on two "mirrored" disks. If one fails, you've got the second. As a side benefit, since data has to be read from only one of the drives, RAID Level 1 systems can have twice the bandwidth for reading data back. Level 5 uses sets of three or more drives, and writes the data in such a way that if a drive fails, its data can be reconstructed from what's on the remaining ones.

A lot of managers think that RAID reduces the need for a good backup system. It doesn't. RAID protects you from a drive failure, but it doesn't protect you from a computer virus or a hacker. Nevertheless, after spending a lot of money for disk systems, many managers are loathe to go out and purchase a suitable (and similarly expensive) backup system. Here's one alternative that I've successfully used. If you have two reasonably similar computers, both with their own RAIDs, set the first computer to back itself up to the second, and make the second backup to the first.

On the other hand, many disk systems have the ability to make what's called a snapshot, and this can be a substitute for some kinds of short-term backups.


Snapshot This!
A snapshot is a freeze-frame image of your computer's hard drive. The location and contents of every file are noted in an instant, and then the computer continues with its work. Making a snapshot is like making an instant backup of the hard disk to the same drive.

Not every operating system supports snapshots, but the feature is becoming more popular. It was recently introduced in FreeBSD 5.0, for instance, although it wasn't really reliable until the 5.2 version. Snapshots have been a part of NetApp's gFiler appliances and EMC's storage systems for years.

The advantage of the snapshot is that it can be made very fast and it takes up hardly any disk space at all. That's because snapshots are implemented with a technique called "copy on write." Basically, the operating system makes a map that notes the name and contents of every file. If an application tries to overwrite one of these files after the snapshot is made, the operating system writes the new file contents to an unused location of the hard drive and preserves the original contents.

The same thing is done with directories. If you try to delete a file inside a directory, the computer actually writes a second directory onto the disk that doesn't have the file you just deleted. If you want to get back a file after you've accidentally deleted it, you just retrieve it from the snapshot.

On my primary server, for instance, I have a program that makes a snapshot every night at 11 p.m. I keep these snapshots for seven days, then they are automatically deleted.

The disadvantage of snapshots is that deleting a file doesn't actually free up space on the disk—the blocks remain "used" until every snapshot that references the file is deleted too. And, of course, snapshots don't protect you against a hardware failure or somebody accidentally formatting the hard drive.

One last thing: Once you have your backup system in place, you should practice trying to restore a backup from time-to-time. The best way to do this is to take a brand-new computer and a set of your backup tapes, and see if you can restore a 100 percent working system. Many organizations can't, so don't overlook this important test. end


Simson Garfinkel, CISSP, is a technology writer based in the Boston area. He is also CTO of Sandstorm Enterprises, an information warfare software company. He can be reached at machineshop@cxo.com.


ILLUSTRATION BY STEPHEN WEBSTER


Toolbox:
Defensive Investments
Who could give better advice about how to keep out spies than people in the spying business?
Read More

Add a Comment: Your comment will be displayed at the bottom of this page, at the discretion of CSOonline.

Name:
Title:
Corp:
Email:
Subject *
Your Comment: *

* Required fields.
We do not post comments promoting products or services.
Comments are owned by whomever posted them. CSO is not responsible for what they say.
Selected comments may be published in CSO magazine.
We will neither sell nor display your personal information.







All content copyright CXO Media Inc., 1994-2002. All rights are reserved. No material may be reproduced electronically or in print without written permission from CXO Media, 492 Old Connecticut Path, Framingham, MA 01701.

Dated: March 2004


http://www.csoonline.com/read/030104/shop.html