BACKUP DATA SECURITY MANAGEMENT SYSTEM AND ASSOCIATED METHOD
20230244805 · 2023-08-03
Inventors
Cpc classification
G06F11/302
PHYSICS
G06F11/3051
PHYSICS
G06F21/6218
PHYSICS
G06F11/1446
PHYSICS
G06F21/577
PHYSICS
G06F11/3006
PHYSICS
G06F11/3055
PHYSICS
H04L63/145
ELECTRICITY
G06F11/3034
PHYSICS
International classification
Abstract
The disclosure relates to a computer implemented method for assisting a user managing the data-security of backup copies of a computer system having a plurality of nodes, the method comprising: receiving status data for backup copies associated with a plurality of nodes, wherein, for each node, the status data provides a status of one or more backup copies associated with the node with respect to a plurality of data-security criteria; determining a backup security metric for each of the plurality of nodes based on the status data; and providing the security metrics for the user to demonstrate the relative level of backup data-security of the plurality of nodes.
Claims
1. A computer implemented method for assisting a user managing the data-security of backup copies of a computer system having a plurality of nodes, the method comprising: receiving status data for backup copies associated with a plurality of nodes, wherein, for each node, the status data provides a status of one or more backup copies associated with the node with respect to a plurality of data-security criteria; determining a backup security metric for each of the plurality of nodes based on the status data; and providing the security metrics for the user to demonstrate the relative level of backup data-security of the plurality of nodes.
2. The method of claim 1, wherein the backup security metric for a particular node is based on a weighted combination of numerical values of the status data associated with the particular node.
3. The method of claim 1, wherein the data-security criteria comprise one or more of, for one or more backup copies of a node: average backup success rate; latest backup status; immutable backup status; encryption status; air gapped status; 3.sup.rd copy status; data last recovered date; and date last anti-virus scanned.
4. The method of claim 1, further comprising determining a backup security metric for a group of nodes based on the backup security metrics of the nodes in the group.
5. The method of claim 1, wherein providing the backup security metrics comprises providing a graphical user interface comprising a graphical element associated with each node or a group of nodes.
6. The method of claim 5, wherein the graphical element for each node is selectable to provide an indication of the status of one or more of the data-security criteria associated with respective nodes.
7. The method of claim 6, wherein each indication of the status of one or more of the data-security criteria that require action are provide by a selectable user interface element to perform a required action.
8. The method of claim 7, wherein the required action is performed by an external software application to the graphical user interface.
9. An apparatus comprising: at least one processor; and at least one memory including computer program code for one or more programs, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform the method of claim 1.
10. A computer program product including one or more sequences of one or more instructions which, when executed by one or more processors, cause an apparatus to at least perform the method of claim 1.
Description
BRIEF DESCRIPTION OF DRAWINGS
[0023] One or more embodiments will now be described by way of example only with reference to the accompanying drawings in which:
[0024]
[0025]
[0026]
[0027]
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
[0034]
DETAILED DESCRIPTION
[0035] The present disclosure is directed to methods, systems and software for assisting a user managing the backup data-security of the computer system. As such, various embodiments may provide consolidated information concerning the technical state of the backups of nodes within the system and so enable the user to better maintain the data-security of the backup system. In some embodiments, an interface with various software tools for fixing or modifying the backup copies is also provided in a consolidated package.
[0036]
[0037]
[0038] A backup security metric is determined 204 for each of the plurality of nodes based on the status data for the backup data associated with that respective node. That is, status data associated with various data-security criteria for backup copies associated with a particular node may be combined to provide a backup security metric for that node. The backup security metrics are provided 206 for the user to demonstrate the relative level of backup data-security of each of the plurality of nodes in the system. By presenting information characterising the internal state of the system, the method provides a tool for assisting a user managing the backup data security of a computer system. In particular, by providing a relative score for the backup data security of the different nodes, the method allows the work of improving the backup data security to be more effectively managed by enabling the user to concentrate time and resources on the most pressing tasks while giving a more holistic representation of the backup state of the system with respect to a number of different security criteria.
[0039] In a general sense, the method generates a score of each node backup and may show the grade for that node. The higher the grade, the better chance of that data being recoverable in a disaster such as a cyber-attack.
[0040]
[0041] Various aspects of implementations of the method of
[0042]
[0043] The backup data-security criteria in the illustrated example include:
TABLE-US-00001 average backup success rate (e.g. over the previous 90 day) [%] latest backup status [e.g. success; partial success; missed] immutable backup status [yes; no] encryption status [yes; no] air gapped [yes; no] 3.sup.rd copy [yes; no] data last recovered [last week; last two weeks; last four weeks; last eight weeks; last twelve weeks; last twenty four weeks; last forty eight weeks] date last anti-virus scanned [last week; last two weeks; last four weeks; last eight weeks; last twelve weeks; last twenty four weeks; last forty eight weeks] number of anomalies found in last 90 days for that node [number] backup client version [version number or dare] nodes operating system [system name/version] node type [Virtual, physical etc. . .] backup client version [version number or date]
[0044] An immutable backup file is a backup file that has been marked such that it may not be altered. An immutable backup may be held on a separate server, such as a cloud server, for example. An air gapped node is a node that is not physically connected to an external network. As such, air gapped nodes are more secure because physically tampering with the node is required in order to introduce new code, as opposed to being able to introduce code remotely via a network connection. Encrypted nodes are typically more secure than non-encrypted nodes. The security implications of the times and state are last recovered, the date that an antivirus scan was last performed, the latest backup status and the average backup success rate will be immediately apparent to those skilled in the art. For each data security criterion, a weighting value is attributed to each of the possible states of the criterion. Example weighting values are given in the first step shown in
[0045] In a second step, for each node, the backup security metric for that particular node is provided as a single, combined metric produced by performing a summation of the weighted values associated with the statuses of the security criteria for that node. In this example, the backup security metric for a particular node is based on a weighted combination of the numerical values of the status of the data-security criteria associated with the particular node.
[0046] The score, or backup security metric, that is determined for a node may be associated with a corresponding security grade. In
[0047] In a third step, an overall score, or combined backup security metric, for all the nodes in the computer system, or for a group of nodes in the computer system, may be based on the respective scores of all the nodes, or the group of nodes. In particular, the backup security metric for a group of nodes may be taken as an average value of the backup security metric for that group of nodes, or may be associated with the lowest value of the backup security metric determined within that group of nodes, for example.
[0048]
[0049] The graphical representation 500 comprises a first graphical element 502 providing an illustration of the grade/rating associated with the node or node group. In a general sense, the indication may be provided by colour-coding the element according to its status, may be provided as a numerical indication (e.g. marks out of 10 or 100) or graded using letter codes (e.g. from A to F).
[0050] The graphical representation 500 further comprises a second graphical element 504. The second graphical element 504 comprises a series of labels 506 and associated graphical sub-elements 508. Each of the graphical sub-elements 508 provides an indication of a status of an data security criterion associated with that sub-element. Each of the sub-elements 508 may provide a selectable user interface element that is configured to trigger an action associated with the corresponding data security criterion. For example, clicking on the sub-element 508 associated with the “AV scanned” data security criterion may cause an antivirus scan of the back-up copies associated with the node to be undertaken.
[0051]
[0052] One or more of the nodes may provide selectable elements which, when selected, navigates the graphical user interface to a different graphical user interface, in which further details regarding the selected node are provided.
[0053]
[0054]
[0055]
[0056] The graphical user interface 900 comprises a first portion 1000 providing information regarding current exposure, which is described further below with reference to
[0057] The second portion 905 providing an indication of performance over time in this example provides a period of data (90 days) with graphs showing, for the node: the backup successes, backup anomalies, recovery history and number of antivirus scans.
[0058]
[0059]
[0060] It will be appreciated that some aspects of the method may find application in a wider context, such as the management of primary nodes in a computer system, for example.