Cyber Resiliency with IBM Storage Sentinel and IBM Storage Safeguarded Copy

Book description

IBM Storage Sentinel is a cyber resiliency solution for SAP HANA, Oracle, and Epic healthcare systems, designed to help organizations enhance ransomware detection and incident recovery. IBM Storage Sentinel automates the creation of immutable backup copies of your data, then uses machine learning to detect signs of possible corruption and generate forensic reports that help you quickly diagnose and identify the source of the attack. Because IBM Storage Sentinel can intelligently isolate infected backups, your organization can identify the
most recent verified and validated backup copies, greatly accelerating your time to recovery.

This IBM Redbooks publication explains how to implement a cyber resiliency solution for SAP HANA, Oracle, and Epic healthcare systems using IBM Storage Sentinel and IBM Storage Safeguarded Copy.

Target audience of this document is cyber security and storage specialists.

Table of contents

  1. Front cover
  2. Notices
    1. Trademarks
  3. Preface
    1. Authors
    2. Now you can become a published author, too!
    3. Comments welcome
    4. Stay connected to IBM Redbooks
  4. Chapter 1. Introduction
    1. 1.1 Overview of cyber resiliency
      1. 1.1.1 Cybersecurity versus cyber resiliency
    2. 1.2 Approaches to data resiliency
      1. 1.2.1 Considering the restoration of static and dynamic data
      2. 1.2.2 Time to Recover
      3. 1.2.3 Secondary workload cyber resiliency
    3. 1.3 IBM Storage Sentinel overview
      1. 1.3.1 Supported applications
      2. 1.3.2 Use cases for Storage Sentinel
      3. 1.3.3 IBM Storage Sentinel workflow
      4. 1.3.4 IBM Storage Sentinel components
  5. Chapter 2. Configuring the IBM Safeguarded Copy feature
    1. 2.1 Safeguarded snapshot with internal scheduler
    2. 2.2 Configuring Storage Sentinel with IBM Storage Copy Data Management
      1. 2.2.1 Registering providers
      2. 2.2.2 Configuring SLA policies
      3. 2.2.3 Creating backup jobs
      4. 2.2.4 Restore and recovery jobs
      5. 2.2.5 Prescript and postscript
  6. Chapter 3. Protecting Epic cache and IRIS databases with IBM Safeguarded Copy and IBM Storage Sentinel
    1. 3.1 Introduction
    2. 3.2 Supported configurations for IBM Storage Copy Data Management and IBM Storage Sentinel for Epic databases
    3. 3.3 IBM Storage Sentinel server platform choice
      1. 3.3.1 Supported storage configurations for virtual Epic database servers
      2. 3.3.2 Supported storage configurations for physical Epic database servers
    4. 3.4 Setting up a CDM and Storage Sentinel environment to scan Epic databases
    5. 3.5 Performing a restore of an Epic database backup
  7. Chapter 4. Configuring IBM Storage Sentinel for SAP HANA
    1. 4.1 SAP HANA integration into IBM Storage Copy Data Management
    2. 4.2 SAP HANA and data persistence
      1. 4.2.1 SAP HANA volumes
    3. 4.3 SAP HANA workflows and IBM Storage Copy Data Management
      1. 4.3.1 SAP HANA data backup workflow
      2. 4.3.2 SAP HANA restore workflow
      3. 4.3.3 SAP HANA requirements
    4. 4.4 IBM Storage Copy Data Management setup
      1. 4.4.1 Required user roles
      2. 4.4.2 Service Level Agreement (SLA) policies
    5. 4.5 Running SAP HANA backup and restore operations
      1. 4.5.1 Running an SAP HANA backup job
      2. 4.5.2 SAP HANA restore job
    6. 4.6 Daily operations, best practices and maintenance
      1. 4.6.1 Adding capacity to the SAP HANA data area
      2. 4.6.2 Combining backups not recommended
      3. 4.6.3 Backup of the IBM Storage Copy Data Management catalog.
  8. Chapter 5. Scanning engine and its technology
    1. 5.1 Storage Sentinel architecture
    2. 5.2 Technology of the IBM Storage Sentinel scanning engine
    3. 5.3 The advantage of anomaly scanning versus signature scanning
      1. 5.3.1 The scanning process
      2. 5.3.2 Scanning process for databases
      3. 5.3.3 Machine learning
      4. 5.3.4 Scanning encrypted data
    4. 5.4 How to recognize and handle alerts
      1. 5.4.1 After alert workflow
      2. 5.4.2 What to do when the scanning engine finds an issue
      3. 5.4.3 Dealing with false positives
    5. 5.5 Scanning Engine planning considerations
      1. 5.5.1 Sizing considerations
      2. 5.5.2 Scaling of scan workloads
      3. 5.5.3 Virtual versus physical servers
    6. 5.6 Administration
      1. 5.6.1 Monitoring the scanning engine
      2. 5.6.2 Backing up and restoring the scanning engine components
      3. 5.6.3 Adding new applications
      4. 5.6.4 Adding new scanning engines
  9. Chapter 6. IBM Cyber Vault setup: Putting it all together
    1. 6.1 Introduction to IBM Cyber Vault
      1. 6.1.1 The four steps to IBM Cyber Vault
    2. 6.2 IBM Cyber Vault planning considerations
      1. 6.2.1 Definition of the Minimum Viable Company (MVC)
      2. 6.2.2 Establishing immutable copies of critical data
      3. 6.2.3 Crash consistency or application consistency?
      4. 6.2.4 Proactive monitoring
      5. 6.2.5 RPO, RTO, and data validation
      6. 6.2.6 Recovery planning
      7. 6.2.7 Further considerations
  10. Chapter 7. Supported patterns
    1. 7.1 Safeguarded Copy on a single system
    2. 7.2 Safeguarded Copy in a Metro Mirror or Global Mirror relationship
    3. 7.3 Safeguarded Copy in an IBM HyperSwap environment
  11. Related publications
    1. IBM Redbooks
    2. Stay connected to IBM Redbooks
    3. Help from IBM
  12. Back cover

Product information

  • Title: Cyber Resiliency with IBM Storage Sentinel and IBM Storage Safeguarded Copy
  • Author(s): Nezih Boyacioglu, Gerd Franke, Thomas Gerisch, David Green, Vasfi Gucer, Guillaume Legmar, Markus Standau, Daniel Thompson, Christopher Vollmar, Axel Westphal
  • Release date: October 2023
  • Publisher(s): IBM Redbooks
  • ISBN: 9780738461359