How to Safely Restore VMs Without Bringing Back Vulnerabilities?

0
11
Asked By TechWizard42 On

I'm working with Commvault and need some advice on how to make sure that when we roll back data or VMs, we don't inadvertently restore a version that's infected with malware or has known vulnerabilities. Do teams typically scan their backups or snapshots before restoring them? What processes are in place to validate these backups prior to recovery?

5 Answers

Answered By DataDynamo On

Taking backups more frequently is a practical approach to mitigating risks. This way, you’ll often have a fresher backup to recover from, decreasing the likelihood of it containing known unpatched vulnerabilities. Including a vulnerability scan in your backup testing procedures can also pay off; that way, even if access to older backups is needed, you can check for known issues before a restore.

Answered By BackUpNinja On

If you want to be thorough, you should roll back further than you might initially think and perform a scan on that version.

Answered By CyberGuard1 On

Let’s be real; scanning a full backup before restoration can take forever, and every minute counts when downtime affects a client. With Commvault, you can mount the VM and scan with an antivirus before copying it to production. I find that restoring in an isolated VLAN without access to the internet is the safest and quickest procedure. First, bring up the VM in a sandbox environment, install your up-to-date EDR agent, then do a quick scan. If you’re restoring after a known vulnerability incident, make sure to apply the patches before reconnecting to the network.

Answered By DiskDrover88 On

It’s tough to guarantee a complete safety check. You can only really consider it if you have a staging environment set up. Here, you could spin up a backup in isolation, run all your checks, and only then do the actual restore to production. Without that, there's no way to detect malware or vulnerabilities in non-running images.

Answered By CommVaultPro On

All of our backups undergo scanning with Veeam before being restored. It's a key step for us.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.