Skip to main content

Introduction

Ransomware attacks are top of mind for all IT professionals and backups are the last line of defense.

The single most important best practice is to make sure you can recover from your backups by:

  • Implementing immutability

  • Encrypting your backups

  • Verify recoverability

  • Have a recovery plan

  • Harden and limit access to your backup infrastructure, especially the repositories.

 

Ample security guidance can be found in Veeam's user guides and best practices.

Curated by Veeam Solutions Architect and Systems Engineers, Veeam has also published a library of Technical Security Blueprints to address joint Vendors configurations.

 

In this post, I would like to focus on Hardening and Limit Access to ObjectFirst repositories.

 

For those unfamiliar with ObjectFirst, it is a Veeam dedicated S3-Compatible Object Storage appliance that implements Out Of The Box Immutability (Ootbi) and leverages Veeam Smart Object Storage API.

My colleague, SteveF, has blogged about the SOS API and ObjectFirst.

 

Securing access to the Ootbi appliance

The ObjectFirst security blueprint is a good place to start, and I would recommend reading Securing Access to an AWS S3 repository.

 

  1. The ObjectFirst user guide discuss securing access to the appliance by:

  • Implementing Physical Security

  • Enabling 2FA (web console access)

  • Disabling SSH

  • Restricting/Disabling IPMI access

  • IP Whitelisting (more on this below)

 

The "Settings>Security" section of the web interface is where you can configure most of these items.

  1. Consider setting up a proxy server to control the appliance's internet access and ensure secure updates.

  2. Use IAM policies to implement least privileges principle and to support multi-tenancy which is key for our VCSPs.

  3. For Agent-based backups, leverage IAM/STS.

How to use the IP Whitelist

Getting IP Whitelisting right can be a bit tricky depending on the backup type and repository access permissions.

Keep reading if you want to know more.

 

What does IP Whitelist do? It only allows listed server access to the Ootbi Appliance.

 

Depending on how you declare your Ootbi repository, you may have to enter multiple IPs or possibly IP ranges.

 

The connection mode also affects how you can control Access Permissions within Veeam.

 

Please note that the Whitelist accepts single IPs or entire Subnets.

For subnets, you must use the CIDR format (/8, /16, /24 …). Decimal notation (aka 255.255.0.0) won't work!

 

Connection Type: Direct

In this mode, the processing proxy (NAS and VMs backups) acts as the gateway to the Object Storage.

Agent based backups will access Object Storage directly or via a gateway depending on the selected Access permissions.

 

Declaring the repository

 

At the very least you need to add the VBR server's IP to the Whitelist.

If you have specified your mount server and helper appliance, you should also add these Ips to the Whitelist as well.

Note: When left unspecified, the mount and helper roles get attributed to VBR.

 

Backup operations

Add all your VM proxies' IPs to the Whitelist.

 

For NAS backup, you should add all your General Purpose Proxies.

  • If you do not add your General Purpose Proxies, the mount server will act as the gateway to the object store.

  • If your mount server is left to the default settings (VBR) then your backup will fail.

 

With Agent backups there are multiple possible configurations

  • Agent Jobs managed by VBR or the Agent

  • Access permissions set by VBR through gateway server or leveraging IAM/STS.

 

Note: Shared credentials is not a safe method and should be avoided.

 

The only Access Permissions that works without adding Endpoint IP addresses to the Whitelist is "Provided by the backup server"

 

Repository backup maintenance operations

The Helper's IP must be added to the Whitelist.

 

Restore operations

The Mount Server's IP must be Whitelisted

 

Connection Type: Gateway(s)

In this mode, all traffic flows through the selected gateway(s)

 

Declaring the repository

You must Whitelist the Gateway(s) IP addresses and the VBR server IP address.

While technically only the Gateway IP is required, VBR needs to be able to communicate with the appliance to register it as an S3-integrated repository.

 

Be aware that if the VBR IP is not whitelisted, the repository will be declared as S3-compatible.

This can cause issue with the ObjectFirst internal load balancing.

 

Backup operations

For VM and NAS backup, you do not need to Whitelist any of the proxies, only the gateway(s) needs to be whitelisted.

 

For Agents Jobs where the Access Permissions are set to use the gateway server then only the gateway server needs to be whitelisted.

IAM/STS cannot be used when accessing the Object Storage via gateway(s).

 

Repository backup maintenance operations

The Helper's IP does not need to be added to the Whitelist.

 

Restore operations

The Mount Server's IP does not need to be Whitelisted

 

Summary

Thank you for reading. I hope you enjoyed this post!

In this post I covered the Hardening and Securing of an ObjectFirst repository and especially details for IP Whitelist and its caveats.

While specifying an object storage gateway(s) seems to be the easiest in terms of IP Whitelist, keep in mind that VBR always need to be Whitelisted for proper S3-Integrated operations to occur (Smart Object Storage API).

The downside of using gateway(s) is the lack of IAM/STS support for Agents.

Great post Olivier.  Looking forward to getting my hands on a test unit and will apply these measures.


Same here….been very interested in what ObjectFirst has to offer.  Might be out of the price range for some of my clients, but some of them might be very interested as well.


This is probably a question that is not on topic, but how easy is it to migrate away from Object First to another provider?


This is probably a question that is not on topic, but how easy is it to migrate away from Object First to another provider?

I would not think that hard as you can add the “new provider” to Veeam and use VeeaMover to migrate the data depending on size of it.


It would be interesting to see. One to add for the testing list :D


It would be interesting to see. One to add for the testing list :D

Yes, VeeaMover is the answer.


Great Post! Thanks @olivier.rossi 


Comment