DOUBLE JEAPORDY
Challenges
HWDIB
General
100

Explain to me the role databases play in business (think whiteboard slide data + business)

Databases are the “beating” heart of all applications

There are many varieties of databases now both in the data center (SQL, Oracle, DB2 etc), and in the cloud (AWS RDS, Azure SQL, Google Spanner)

There is also variety of database types: relational databases like SQL, and non-relational databases like MongoDB (document database)

Databases are critical to business applications: without databases applications will not work

So protecting databases is required to ensure applications can be operational and the business doesn’t suffer any downtime 

100

Explain the complexity that comes with protecting databases

Complexity: Relying on scripts that are maintained by the DBA team, and a mix of other database specific backup tools, creates a huge amount of complexity that may lead to inconsistent protection and missed protection of databases.

100

How does rubrik remove complexity when it comes to protecting databases

SLA Domains: Remove the complexity of having to use scripts and separate tools to write to a separate storage layer. Uses SLAdomains to apply protection to databases, and write to one storage target in Rubrik appliance. APIs and Role Based Access Control (RBAC) available to database administrators (DBA) can still control the backup and recovery process.

100

What personas care about database protection

• CIO: Mitigate business risk while simplifying database protection

• CDO (Chief Data Officer): Ensure different departments get the data they need to be effective. Effectively manage risk around data.

• Data Governance: Understanding who has access and visibility to what data.

• DBA: Manage performance; ensure availability in support of critical applications

200

What does the typical architecture look like for protecting databases

  • The typical architecture for protecting databases:

    • Creation of backup policies either through scripts or dedicated database backup tools

    • These policies will create a database backup to a storage target

    • Increasingly, organizations are relying on an additional storage target (“vault”) to create a separate (air gapped) copy of database for cyber resilience purposes

  • The responsibility for backing up the database frequently is on the database administrator (DBA)

200

Explain the challenge of inefficiency when it comes to protecting databases

 Inefficiency: Each script and tool will manage database backups differently. There may be inconsistency in ability to use incremental backups, leading to inefficient use of backup storage targets and increased cost/need for storage.

200

How does Rubrik remove the need for a vault

Secure on first copy: Removes the need for a vault by creating an immutable copy that cannot be altered/modified once written. Also uses Zero Trust principles such as MFA/TOTP by default, multi-person rule.

200

What are some discovery questions you can ask around database protection

Walk me through the process of preparing to back up a newly provisioned database.

How do you ensure you consistently hit your SLAs across all databases with respect to backup windows?

What is the process for recovering a criticadatabase in a disaster scenario? Or in situations where you need to provision for dev/test or reporting?

How is security coordinated between you (the DBA) and the infrastructure team with respect to database hosts and storage hosts? Who is responsible in the event of a cyber attack for each part of the environment?

Tell me about the way RPO is determined by the business; how do your current backup processes guarantee that RPO agreements with the business can be met?

300

What are some of the challenges associated with protecting databases

  • Challenge: Complexity: Relying on scripts that are maintained by the DBA team, and a mix of other database specific backup tools, creates a huge amount of complexity that may lead to inconsistent protection and missed protection of databases.

  • Challenge: Inefficiency: Each script and tool will manage database backups differently. There may be inconsistency in ability to use incremental backups, leading to inefficient use of backup storage targets and increased cost/need for storage.

  • Challenge: Slow Recovery: Most backup processes require the database backup to be moved back to the production environment, and requires full recovery of the database even if only a small amount of data is needed. Leads to very slow recovery processes. 

Challenge: Cyber Resilience: Database backup software relies on writing to a separate storage layer that is often compromised during a cyber attack. Using a vault approach can create an air gap but the vault is often targeted, and since the vault isn’t updated as often as primary backup, consistent RPO is not maintained. Finally, the database software is running on a host (virtual machine) which is also targeted during a cyber attack. If an attacker compromised the host, the database is now compromised also. 

300

Why is there a slow recovery associated with databases

Slow Recovery: Most backup processes require the database backup to be moved back to the production environment, and requires full recovery of the database even if only a small amount of data is needed. Leads to very slow recovery processes.

300

How does rubrik help with storage

Efficiency using Incremental Forever: Always uses incremental forever to store the most efficient backup and reduces need for additional storage.

300

whats the pain associated with database recovery

• Script-based backup across a wide variety of database platforms → Risk of unprotected / underprotected backups and loss of data

• Inefficient Database Recovery → Lengthy RTO and increased risk of data loss

• Long backup operations disrupt production environment performance → Poor user / customer experience

• DB hosts and backup storage not cyber resilient →Downtime leading to lost revenue and potential fines

• Cyber vaults increase RPO time → Unexpected data loss

400

How does rubrik protect / backup databases better / differently

  • HWDIB/D: SLA Domains: Remove the complexity of having to use scripts and separate tools to write to a separate storage layer. Uses SLAdomains to apply protection to databases, and write to one storage target in Rubrik appliance. APIs and Role Based Access Control (RBAC) available to database administrators (DBA) can still control the backup and recovery process. 

  • HWDIB/D: Secure on first copy: Removes the need for a vault by creating an immutable copy that cannot be altered/modified once written. Also uses Zero Trust principles such as MFA/TOTP by default, multi-person rule.

  • HWDIB/D: Efficiency using Incremental Forever: Always uses incremental forever to store the most efficient backup and reduces need for additional storage.

  • HWDIB/D: LiveMount: Can restore the database instantly within the Rubrik cluster and use that database during recovery to the production environment. 

HWDIB/D: Cyber Resiliency for Host Protection: Rubrik protects the host in addition to the database. Through our cyber services we can detect encryption events, and help ensure fast recovery of the host.

400

Describe the challenge of cyber resiliency

Cyber Resilience: Database backup software relies on writing to a separate storage layer that is often compromised during a cyber attack. Using a vault approach can create an air gap but the vault is often targeted, and since the vault isn’t updated as often as primary backup, consistent RPO is not maintained. Finally, the database software is running on a host (virtual machine) which is also targeted during a cyber attack. If an attacker compromised the host, the database is now compromised also.

400

How does rubrik help with restoration

LiveMount: Can restore the database instantly within the Rubrik cluster and use that database during recovery to the production environment.

400

What are the desired outcomes from rubriks DBA protection/recovery

• Automated Database Protection → Ensure compliance and protection of new workloads

• Rapid and Granular Database Recovery → Reduced RTO, ability to restore business operations faster, reducing financial impact

• Achieve backups without slowing down the application → Positive customer experience

• Holistic, cyber resilient strategy for database hosts and storage → Business protected from downtime, lost revenue

• Achievable RPOs in a cyber attack → Meet business RPO

500

What value does rubrik bring to database protection

  • Value Area: Cyber Resiliency & Cyber RTO: Quickly recover database from a cyber event, and ensure backup copy is available.  

  • Value Area: True RPO: Ensure realistic RPO since securing on first copy of data without needing a vault.  

  • Value Area: Simplify Management / Reduce Cost: Reducing complexity of scripting and consolidating multiple tools into a single backup platform.

Value Area: Unified Data Protection Platform: Rubrik is a data protection platform that uses Rubrik Security Cloud (RSC) to coordinate backup and recovery across cloud, data center (VMs, Databases), unstructured data, and SaaS applications, removing complexity and cost. 

500

in summary What are all of the challenges associated with protecting databases

  • Challenge: Complexity: Relying on scripts that are maintained by the DBA team, and a mix of other database specific backup tools, creates a huge amount of complexity that may lead to inconsistent protection and missed protection of databases.

  • Challenge: Inefficiency: Each script and tool will manage database backups differently. There may be inconsistency in ability to use incremental backups, leading to inefficient use of backup storage targets and increased cost/need for storage.

  • Challenge: Slow Recovery: Most backup processes require the database backup to be moved back to the production environment, and requires full recovery of the database even if only a small amount of data is needed. Leads to very slow recovery processes. 

Challenge: Cyber Resilience: Database backup software relies on writing to a separate storage layer that is often compromised during a cyber attack. Using a vault approach can create an air gap but the vault is often targeted, and since the vault isn’t updated as often as primary backup, consistent RPO is not maintained. Finally, the database software is running on a host (virtual machine) which is also targeted during a cyber attack. If an attacker compromised the host, the database is now compromised also. 

500

how does rubrik help with cyber resiliency

  • Cyber Resiliency for Host Protection: Rubrik protects the host in addition to the database. Through our cyber services we can detect encryption events, and help ensure fast recovery of the host.

500

What is the ARUP proofpoint

• CHALLENGE: Large SQL Footprint, held genome sequencing and customer information, leveraging +1000 scripts to manage the backups. Validation required work over the weekend and borrowing storage from Production.

• SOLUTION: Rubrik MSSQL Database Protection

• RESULT: Policies to manage the backups at scale, the ability to validate recovery without leveraging Production storage, reduced risk by leveraging APIs to avoid human error. Went from being able to only validate genomic data 1x / mo to validating daily with no human interaction

M
e
n
u