Origins
Rubrik
Zero Trust Principles
Cyber Services
100

Does backup = cyber recovery?

NO!

100

What is Rubrik?

Good pitch

100

What does zero trust mean?

We don't trust anyone. Every request for access to data, regardless of where it originates, is treated as a potential threat until it's explicitly verified.

100

What are the four Cyber Services?

Ransomware Investigation, Threat Hunting & Monitoring, Sensitive Data Discovery, and Orchestrated Recovery 
200

Why is traditional backup hard?

Many different technology platforms and tools that are manual and complex to use

200

How does Rubrik unify and simplify the backup process?

We give them a single unified interface so that they can manage all their workloads from one place and auto discover new workloads

200

What does MFA and TOTP mean?

Multi Factor Authentication: another verification when logging in

Temporary One Time Password

200

What is Ransomware Investigation? 

We track incremental data, to detect anomalies as well as the entropy value of files, to identify encryption. We can notify not just on anomalies but identify that files have been encrypted due to entropy change all without any input or required action from an end user.

300

What is the challenge around management? 

Managing the schedule of all the different backups across different workloads and backup tools with the right policies applied and confirming that the job is completed makes management hard and complex

300
How does Rubrik protect the data?

Rubrik's SLA Policy Engine that will auto apply policies to new workloads as they come up in the environment with the correct retention policies. Rubrik also is incremental forever, only ingesting new data. Lastly, Rubrik creates Metadata, enabling teams to index the data to understand the context and content. 

300

What does logically airgapped mean?

It means it is invisible on the network - you can't see where it is or when it is moving

300

What is Threat Hunting and Threat Monitoring?

We look for IOCs (indicators of compromise) in the backups to help identify a clean point of recovery. We do this via threat intelligence from Mandient, the FBI, CIA, etc.

Threat Hunting is done reactively after an attack and Threat Monitoring happens proactively every time a backup is run

400

What is the challenge with recovery? 

Historically, most of the recovery scenarios were focused around file deletion, user error, problems. Those are simple recoveries. But with the rise in cyber attacks, this becomes a much different process.

One, you might grab an unclean copy and reinfect yourself. Two, you might go too far back and lose too much data. Three, you might take too long and have critical business impact because of the outages.

400

How does Rubrik do storage better?

Natively immutable, logically airgapped, no open protocols, retention lock, 2 person rule, MFA/TOTP, monotonic clock

400

What is the two person rule?

We require minimum two people to approve any change to the data

400

What is Sensitive Data Discovery?

Rubrik uses 60+ pre-built analyzers to identify where sensitive data is in the environment and if any sensitive data was exposed during an attack. Very important for compliance and regulations.

500

What is the ideal recovery state? 

Have this data - easily search and find it, wherever it was sitting

Protecting it - easy to manage, smart, automated 

Storing a copy - safely tucked away in bunker, invisible from any bad actor

Restoring it - could get back everything or one thing (grain of rice or whole pile). Fast and safe

500

What are the four questions that need to be answered for recovery?

What is the blast radius?
Where is my clean copy?
Was any sensitive data exposed?
Can we automate remediation and test it?

500

What is the monotonic clock and what does it prevent?

The monotonic clock counts time elapsed vs setting a date to expire using NTP (Network Time Protocol). We do this to prevent NTP Poisoning, where attackers can manipulate NTP and expire the backups.

500

What is Orchestrated Recovery?

Allows you to determine what applications to bring back up first and in what order, as well as automate that process. You can also test your recovery plan in peacetime, which is important for auditing purposes.