Back to Blog

Microsoft Office 365 Backup in 2022

Image of Nicolas Blank
Nicolas Blank
Microsoft Office 365 Backup banner

Times have changed, specifically for the worse when it comes to how easy it is to attack your data in the cloud. That is not necessarily due to the advent of cloud technologies themselves, but rather because automation is free and cheap.  Think PowerShell, Python, etc., and that cloud represents a much larger attack surface than a traditional data center approach. It's time to reconsider backup in light of ransomware.

Get off my lawn, kids!
When I was much younger, we, as an industry, built datacenters with limited ways of accessing our servers and services. We lived safely, knowing that if something significant was under attack, we could stride purposefully through our access-controlled doors, reach into our airconditioned racks, and pull out the power or network or both. That’s much more difficult to do to a cloud service if it’s under attack since it is also not hosted in your own data center.

Whose fault is it anyway
Responsibility and cloud may be a tricky concept; after all, I may have uploaded my data to Office 365 or another cloud, and I expect that the safety of the data is Microsoft’s. Microsoft’s view is that the responsibility for Data, Endpoints, Account, and Access management is always yours. See Figure 1 below for a graphical view of the responsibilities always retained by customers.

backups and ransomware graphicFigure 1 - Allocation of responsibility 

Microsoft acknowledges and provides guidance for ransomware defense and guidelines on how to recover. It may shock you that part of the recovery guidance is: Step1 – Verify your backups, since Microsoft also publicly writes that OneDrive is a backup for your files. That sounds like a contradiction since it may imply that you may need to backup. However, we also read that OneDrive is supposed to be a backup. OneDrive could be a backup, but only if it fits your definition of being a backup. That sounds like I’m waffling, so lets take a step back and define what a backup is.

I like to ask my customers to give me their definitions and requirements for backup. Why do I ask my customers? Backup may be part of Disaster Recovery Planning – a business function.

Often this definition reads something like: “A backup is a copy of my data, stored separately from its source and in another location, which I can restore to the original location in case of data loss or a total disaster. My backups should be able to restore from a nominated point in time or other specific criteria. I should be able to restore any of the data based on time boundaries, including the last seven days, weekly, monthly, and yearly backups. I may want to restore either a specific item, a container (mailbox, OneDrive, SharePoint, etc) or a configuration item such as permissions.”

OneDrive offers the ability to restore a file to a previous version, undelete a file or folder from the recycle bin, etc. It does not fit the rest of the classical definition of a backup, and neither does the built-in capability of Exchange, SharePoint, or other Office 365 Services. If you’re a tiny organization and Office 365 versioning and recovery capabilities fit your definition of backup, then stop reading. You are done, and you get to have a few minutes back from your day.

Ransom and backup
A backup is only a backup if you can restore it. Let us assume a scenario where attackers have compromised your Office 365 tenant and are holding you to ransom. Since the activity is criminal and you are being extorted for money, one of the attack vectors may be that they have changed your versioning to 1, waited 14 days, and then encrypted your files. That may sound far-fetched, but it is not. We may also want to assume that your tenant is compromised by a responsible adult with your best interests at heart, as opposed to teenagers targeting organizations for data exfiltration and destruction.

A backup is only a backup if you can restore it. That includes being able to log into your backup platform. Consider that during a tenant compromise, your tenant's Azure Active Directory no longer belongs to you. Consider that you may no longer be able to log into your backup platform if you have chosen to use Azure Active Directory integrated identities as the only way to authenticate. If your backup platform is inaccessible or, even worse, if it’s encrypted or data has been exfiltrated, then it no longer fits the definition of a backup.

The friction for malicious actors is low. Malware may be purchased for little money, or malware may be developed by nation states with large budgets. Malware, of course, is not the only threat in our malicious actor's ransomware arsenal, and backup shouldn’t be your only defense. Backup may be your last line of defense, though, and if it is, then we should know what a backup should look like. Here are the minimum factors I look for in a backup solution:

  • Immutability – my backups should not be able to be deleted within a nominated retention period. That period may be 14 days or a period of my choosing.
  • Break Glass Accounts – I should have an account, either the primary account or a backup account, that is separate from the primary authentication directory that allows me to log into my backup platform. If your AAD is compromised or lost, then you need to be able to log into your backup platform another way.
  • Location – My backup data should not reside in the same infrastructure as the source. There are many ways to accomplish this, including deciding to backup Office 365 into a separate Azure Tenant in another region or to use a backup vendors cloud – assuming you trust them, of course.
  • The ability to restore – I should be able to restore an agreed item, container, or configuration to either the original location or a new location of my choosing. Assuming my tenant is lost, an encrypted mess, etc., I want to be able to restore to a new location.
  • Test restores - A backup is only a backup if I can restore it. This means I need to regularly test my restore capability to ensure that I can recover from an incident. Reading the help file while you are in trouble may be too late.
Conclusion
Of course, there is more! Entire industries have been built on the concept of backup, but backup should not be something that you hope in; backup should be something that you know works and will work on the day that you need it to.

HNCK8984.jpg

Performing eDiscovery Against a Specific Folder

Image of Vasil Michev MVP
Vasil Michev MVP

One common request when performing an eDiscovery or using the Search-Mailbox cmdlet has long been...

READ MORE
business person holding computer tablet with virtual padlocks

Protecting Corporate Information in SharePoint and OneDrive

Image of Thomas Stensitzki
Thomas Stensitzki

Protecting corporate data is one of the most important tasks of our time. Microsoft 365 helps you...

READ MORE