What Is an Air Gap Backup? Real Protection vs Marketing

Air gap has become one of the most overused and misunderstood terms in backup and recovery. In this episode, W. Curtis Preston and Prasanna explore what air gap really means, tracing its origins from the days when everyone used tape storage to modern virtual implementations. They discuss how true air gap required physical separation - tapes stored offsite at facilities like Iron Mountain - and why this gold standard is nearly impossible to achieve with today's connected backup systems.
The conversation covers modern alternatives including immutable storage, IAM-based protection, and simulated air gaps that disconnect network connections when not actively replicating. Curtis and Prasanna explain why ransomware has made air gap more important than ever, and provide practical guidance for evaluating vendor claims about air gap capabilities in cloud and hybrid environments.
You found the backup wrap up your go-to podcast for all things
Speaker:backup recovery and cyber recovery.
Speaker:In this episode, we examine one of the most misused terms in our industry.
Speaker:Air gap.
Speaker:I'm talking with persona about what air gap really means, where it came from
Speaker:back in the day, and why it's become so critical again, with ransomware attacks.
Speaker:We'll explain the difference between a true air gap and what I would call a
Speaker:virtual air gap or a logical air gap.
Speaker:Trust me.
Speaker:If you've ever wondered whether your backup system is really air
Speaker:gapped or if you're tired of hearing vendors, throw this term around
Speaker:without knowing what they're actually talking about, this is your episode.
Speaker:We're going back to the original definition and
Speaker:explaining why context matters.
Speaker:When evaluating modern backup solutions.
Speaker:By the way, if you don't know who I am, I'm w Curtis Preston, also known
Speaker:as Mr. Backup, and I've been passionate about this topic for over 30 years.
Speaker:Ever since.
Speaker:I had to tell my boss that there were no backups.
Speaker:I. Of the production database that we had just lost.
Speaker:I don't want that to happen to you.
Speaker:I certainly don't want it to happen to me.
Speaker:That's why I do this.
Speaker:On this episode, we will turn unappreciated backup admins
Speaker:into Cyber Recovery Heroes.
Speaker:This is the backup wrap up.
Speaker:Welcome to the show.
Speaker:Hi, I am w Curtis Preston, AKA, Mr. Backup, and I have with me the one guy
Speaker:that got me to actually start doing my taxes this year, way ahead of schedule.
Speaker:By way, I might actually finish it before April, which will be
Speaker:the first time in, I don't know,
Speaker:So
Speaker:a few years.
Speaker:listeners who there are quite a few of you out there,
Speaker:Wait, I haven't introduced you.
Speaker:You're not allowed to talk yet.
Speaker:hi Curtis.
Speaker:So
Speaker:Hey.
Speaker:listeners who may not be aware in the US we have to submit our taxes
Speaker:or file our taxes by April 15th.
Speaker:Yeah,
Speaker:deadline.
Speaker:You can of course ask for an extension and file in October
Speaker:and blah, blah, blah, blah,
Speaker:but if you owe taxes, you have to pay before the April 15th.
Speaker:Yeah.
Speaker:Yeah, Curtis normally starts first week of April,
Speaker:Yeah.
Speaker:Yeah.
Speaker:this time he started five days before the first week of April.
Speaker:Well, and, and in my defense, in my defense, my taxes are much more
Speaker:complicated than the average person, which you could say, well, that should
Speaker:mean you should start them earlier.
Speaker:Uh, but it's like, but the, the procrastination, you know,
Speaker:I, if you've ever heard this, uh, hard work always pays off.
Speaker:Eventually procrastination always pays off immediately.
Speaker:Yes it does.
Speaker:And but here's the other thing is I think in the past you've put off.
Speaker:Doing taxes because like you said, your taxes are complicated and
Speaker:Yeah.
Speaker:all the data
Speaker:Yeah,
Speaker:90% of what everyone struggles with, which is why they
Speaker:yeah,
Speaker:But
Speaker:yeah.
Speaker:And I,
Speaker:now with the in with technology,
Speaker:yeah.
Speaker:has now made your life easier, which is why I think you actually
Speaker:started a little earlier.
Speaker:Um, yeah, the technology definitely helped.
Speaker:Um, and, um.
Speaker:You know.
Speaker:Yeah.
Speaker:But, and I'm, I'm at, I'm at like 85% is where I think I am.
Speaker:Uh, I just need to dot the, i's across the T's, so to speak.
Speaker:Um, and uh, I, the hardest part for me is the going through the
Speaker:thousands of transactions and QuickBooks and making sure that
Speaker:they're all in the right categories.
Speaker:Right.
Speaker:You
Speaker:And making sure that I include, 'cause I'm.
Speaker:I'm not always, the thing I do that's just bad is I'm not always like, I don't just
Speaker:have one card for business and then always use that card when I'm doing something.
Speaker:Sometimes I'll be somewhere and I don't have that card or
Speaker:whatever, and I'll just buy it.
Speaker:or whatever
Speaker:Yeah.
Speaker:Yeah.
Speaker:So,
Speaker:yeah.
Speaker:there is a way to solve this.
Speaker:So,
Speaker:What's that?
Speaker:what I tell, which is what I recommend for a lot of people, which is.
Speaker:Do it along the way.
Speaker:Don't wait until March 24th
Speaker:Yeah,
Speaker:through and
Speaker:yeah.
Speaker:QuickBooks or whatever software thing you're using.
Speaker:Like if you get a physical receipt, just put it in a box.
Speaker:If you're downloading transactions, just periodically, maybe once
Speaker:a month, spend like 15 minutes
Speaker:That's a fascinating idea.
Speaker:right now.
Speaker:Right?
Speaker:The next thing you're gonna tell me is to clean up my shop in between
Speaker:projects instead of waiting until I do 10 projects and then have
Speaker:giant mess and clean that up.
Speaker:you know what I'm really what you should be doing in your shop when you use a tool.
Speaker:When you're done with the tool, put it away.
Speaker:Oh, that's just crazy talk.
Speaker:That's just crazy talk.
Speaker:God, God,
Speaker:see
Speaker:just can't handle that level of whatever.
Speaker:Yeah.
Speaker:Anyway.
Speaker:Well, uh, speaking of putting away tools, we're gonna be talking about
Speaker:putting away backups, uh, putting 'em away in a, in a, in an area that
Speaker:you know, that you can't get to.
Speaker:Not
Speaker:gonna be talking about air gap, which, what was that?
Speaker:Not getting rid of them.
Speaker:Right.
Speaker:Because that
Speaker:Yep.
Speaker:a way
Speaker:No, no.
Speaker:Not get, no, I said putting, putting, putting him away, you
Speaker:know, putting him away in a,
Speaker:yeah.
Speaker:place.
Speaker:Yes.
Speaker:Uh, we're gonna talk about this, this, this term that, um, you
Speaker:know, is bantied about quite a bit.
Speaker:Uh, a couple of terms that have become in vogue for reasons that we will
Speaker:discuss in the last couple of years would be this term and what other term?
Speaker:Immutability.
Speaker:Yeah, yeah, exactly.
Speaker:So I think we need to start though, before we dive into this
Speaker:Yeah,
Speaker:I think we need to start with the history because
Speaker:yeah, back in the day
Speaker:Yeah.
Speaker:Well, I don't think
Speaker:Mm-hmm.
Speaker:folks understand the context.
Speaker:They're like, oh, they use the term, but they don't know like
Speaker:where it necessarily came from.
Speaker:Right.
Speaker:And I think that becomes
Speaker:And this, this is one of those things where context really matters, right?
Speaker:Uh, so we have to go back to the days when everybody made tapes, right?
Speaker:That was just how backups were made, all backups were on tape.
Speaker:Um, and that, that's just the way it was.
Speaker:And when you.
Speaker:If you were doing it right, in my opinion,
Speaker:Hmm,
Speaker:right there, there you always put a gap of error.
Speaker:A a, you know, between
Speaker:physical
Speaker:an actual gap of error between, uh, your backups and the thing you were backing up.
Speaker:There were two ways to do that.
Speaker:One would be to send the original offsite.
Speaker:The other and more proper way to do it would be to make a copy and
Speaker:then send one of those offsite.
Speaker:I actually prefer that you send the original offsite
Speaker:So just a couple clarifications.
Speaker:When you talk about a physical gap, you're not just talking about like good
Speaker:friends at OVH and how they had a fire.
Speaker:Right.
Speaker:Where technically
Speaker:was air gapped.
Speaker:that.
Speaker:That's why I'm asking, right, is there was technically a
Speaker:Well, no.
Speaker:those systems.
Speaker:Well, no, there wasn't because.
Speaker:racks.
Speaker:No, that, yeah.
Speaker:I'm glad you brought that up.
Speaker:So if you are electronically connected to the thing that is not air gapped,
Speaker:That's
Speaker:right?
Speaker:It, yeah.
Speaker:Good.
Speaker:Yeah.
Speaker:Good, good point.
Speaker:What I'm talking about is an offline, very important an offline.
Speaker:Both in terms of electronically, offline and physically offline.
Speaker:Copy that.
Speaker:There is a, like I said, a literally a gap of air.
Speaker:There is no way to get it, get to it electronically,
Speaker:Yeah.
Speaker:right?
Speaker:The only way you could get to it was a person you needed to call.
Speaker:Uh, you know, iron Mountain or whoever is, you know, you had,
Speaker:and you needed to bring it back.
Speaker:And then what you could do, and you would do is you would put all
Speaker:different levels of, of, of, you know, what we would now call IAM Right.
Speaker:Between you and your data and that copy of your data.
Speaker:Right.
Speaker:It wasn't even really possible, but you wouldn't have the concept
Speaker:of like using your, your same login to go get your tapes, right?
Speaker:You would go in, you would, you would do it, you would have some sort of
Speaker:physical identification method., You would have an id, you would have a
Speaker:process, uh, to, to authenticate yourself.
Speaker:And we're talking about actually physically showing up, going in,
Speaker:getting tapes, or you would have an, you would have a protocol for contacting.
Speaker:The people and having them bring it to you.
Speaker:And if you deviated from that protocol, for example, if you called up and said,
Speaker:I don't want you to take my tapes to the bank where you always took them.
Speaker:I want you to take them and meet me at a Walmart.
Speaker:That would be, that would be a problem.
Speaker:Right.
Speaker:Um, uh, and, and, and obviously back then we weren't worried about like
Speaker:AI voices, uh, faking that stuff.
Speaker:but this is kind of like, I would say the Why it was needed from
Speaker:like an enterprise perspective, but
Speaker:Mm-hmm.
Speaker:smaller companies, right?
Speaker:You could still achieve air gaps, if you will, without requiring like
Speaker:Iron Mountain or another service.
Speaker:I know we've brought up the case, uh, multiple times, right?
Speaker:With someone doing a backup and then shipping a tape in a
Speaker:box to a different facility and
Speaker:Yeah.
Speaker:Uh.
Speaker:back
Speaker:Uh,
Speaker:or.
Speaker:for, for smaller companies, another thing that you would do is, uh, if
Speaker:you were, uh, you know what I call A TSB, a truly small business, you
Speaker:might take the tape out and put it in your trunk and take it home, right?
Speaker:Uh, and then you gotta just worry that you're not leaving the tape in a hot
Speaker:car and all of that kind of stuff.
Speaker:But you, the, the biggest thing that we were worried about back then
Speaker:was, was natural disasters and fires and floods and things like that.
Speaker:So you wanted to physically separate.
Speaker:That copy as much as possible from the thing that it was protecting.
Speaker:We weren't so much worried about cyber.
Speaker:Uh, you know, it wasn't, it wasn't completely outta the question, but mainly
Speaker:what we were worried about was actually, um, besides the natural disasters and
Speaker:things, we, we actually were more worried about, like social engineering, uh, you
Speaker:know, like the movie sneakers, which if you haven't seen the movie sneakers.
Speaker:Please go watch the movie sneakers.
Speaker:There's a few things in there that are obviously very silly and,
Speaker:and over the top, but honestly, some of the best depiction of
Speaker:social engineering I've ever seen.
Speaker:Not to mention a lot of fun and a lot of stars.
Speaker:Robert Redford, um, uh, Dan Arod, uh, James Earl Jones.
Speaker:Um, the what, what's the actor that you now know to be Indian?
Speaker:Ben Kingsley.
Speaker:Been Kingsley.
Speaker:Yeah.
Speaker:'cause we discussed you thought for a long time.
Speaker:He wasn't Indian because of that name.
Speaker:Uh, yeah, he, he he's in it, uh, anyway, great movie.
Speaker:We were more concerned about that sort of thing.
Speaker:And so we would actually, uh, and again, yes, this is for an
Speaker:enterprise, but we actually had a process where we would, on a regular
Speaker:basis, try to defeat the security.
Speaker:Right.
Speaker:We would go over there and we would, um, have a very involved, like story
Speaker:as to why, for example, I needed to be left in the vault alone.
Speaker:you were
Speaker:W with my tapes.
Speaker:Huh?
Speaker:You were
Speaker:We
Speaker:teaming,
Speaker:were red teaming the, uh, the, yeah, the um, yeah, which is what, which
Speaker:is what sneakers is about as well.
Speaker:Please watch that movie.
Speaker:Just, just a good movie.
Speaker:is it a strict requirement that the copy be
Speaker:for it to be air gapped, or would you consider a case
Speaker:where someone takes a backup
Speaker:I.
Speaker:removes it from the tape drives, puts it on a shelf or in a safe in the
Speaker:location, or a tape robot as an example?
Speaker:That
Speaker:those are two very different things that you just said.
Speaker:Yeah.
Speaker:but I'm
Speaker:These, these are great questions.
Speaker:You're so good at asking these questions.
Speaker:Prasanna.
Speaker:Um, so technically no the term air gap, right?
Speaker:Like in it parlance.
Speaker:Generally refers to a computer that isn't connected to the network.
Speaker:Right.
Speaker:Then there's, there's computers that are like almost air gapped,
Speaker:Yeah.
Speaker:right.
Speaker:Where, where they're like massively firewall walled off or, you know.
Speaker:Right.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Uh, I can think back to, um, being at, uh, Amazon.
Speaker:When I worked at Amazon, I had a contract there in.
Speaker:98 and they had a computer that was a payment processing computer and it
Speaker:was basically one, one way traffic.
Speaker:So, so to go to your question, yeah.
Speaker:Technically.
Speaker:The term air gap could apply to a tape that has been taken out and
Speaker:is in a, in a safe, you know, in a, in a safe place on premises.
Speaker:But that would just, if that's your only copy, that would violate what?
Speaker:3, 2, 1, rule.
Speaker:Yes, that would violate the 3, 2, 1 rule.
Speaker:Right?
Speaker:Three copies of data on two different media, one of which is offsite and, yeah.
Speaker:that works.
Speaker:For the first scenario I described
Speaker:But, but let me, you, you talked about, you also talked about a,
Speaker:a second scenario, which is, a tape in a tape library that is
Speaker:accessible to the system air gaped.
Speaker:And I'm gonna say absolutely not, right?
Speaker:Because why?
Speaker:Because I can electronically control that tape library.
Speaker:I can put that tape in the tape drive and I can erase that
Speaker:tape so that is not air gapped.
Speaker:Even though there is technically
Speaker:That
Speaker:a gap of air between the thing.
Speaker:Yeah,
Speaker:like what
Speaker:yeah,
Speaker:I think as we talk about modern air gaps and
Speaker:yeah,
Speaker:have changed the words, I think it's good to understand the history.
Speaker:yeah.
Speaker:Absolutely.
Speaker:And so that is the gold standard by which anything that wants to call
Speaker:itself air gap, uh, is measured.
Speaker:Back then we were predominantly concerned with, um, fires, floods,
Speaker:terrorist attacks, et cetera.
Speaker:And we still are concerned with those things.
Speaker:It's just that the likelihood of those is much less than the likelihood
Speaker:of something else, which would be
Speaker:Ransomware
Speaker:ransomware or, or any kind of a cyber attack.
Speaker:But yeah, ransomware definitely.
Speaker:I agree that cyber attacks make it difficult, but I wonder if
Speaker:that's sort of a, what do you say?
Speaker:just kind of like a secondary effect, right?
Speaker:But do you think that it's because having disconnected systems is
Speaker:nearly impossible these days
Speaker:yeah, we'll get to that.
Speaker:I, I'm just saying that back then we were predominantly concerned with physical
Speaker:things that needed a physical separation.
Speaker:Now we're concerned, primarily, while we're still concerned with those things,
Speaker:Yeah.
Speaker:somewhat dealt with many of those things with a lot of technologies, a
Speaker:lot of replication, a lot of highly available systems, especially for,
Speaker:um, uh, mission critical systems.
Speaker:But we have not.
Speaker:Necessarily kept up with this relatively new threat, which is, you
Speaker:know, the idea of, of a cyber attack and, and, and a ransomware attack.
Speaker:And there is also, so that's the new reason why air gap is even
Speaker:more important than it was before.
Speaker:What is the reason that backup systems don't.
Speaker:Really have air gaps as I define them earlier.
Speaker:because.
Speaker:,They're connected, right?
Speaker:And typically these backup systems aren't, are no longer using tape, right?
Speaker:You're now
Speaker:using things like de-duplicated storage.
Speaker:Uh, you might be using the cloud, right?
Speaker:You have all these other options, and so you're not really using tape anymore.
Speaker:And
Speaker:Yeah.
Speaker:the new backup technologies that we talked about, like incremental forever, which
Speaker:aren't, which tape isn't so friendly with.
Speaker:No.
Speaker:No, they're not.
Speaker:Yeah.
Speaker:Uh, our previous episode we talked about the concept of incremental
Speaker:forever and what a great thing it is, but it would not work very well.
Speaker:So, you know, I. Like, I wanna make sure people understand me here.
Speaker:Like I, I definitely am on the record of being a, a friend of tape.
Speaker:Right.
Speaker:And tape has a lot of uses and, and it's got a lot of life left in it until someone
Speaker:invents something that offers everything, that tape offers at the price point
Speaker:to tape offers it, tape will continue.
Speaker:You know, there, there's a, there's a guy that, um, um, storage
Speaker:Zillow was his Twitter name.
Speaker:I don't know if it still is, but.
Speaker:Uh, mark Toomey, and he used to say that like there will be, like, there'll be a
Speaker:nuclear apo apocalypse, and, and somewhere in the world there will be somebody
Speaker:with a mainframe and some tape, right?
Speaker:Yeah.
Speaker:It's not going anywhere anytime soon.
Speaker:There's all sorts of possible other things that we're talking about to
Speaker:maybe supplant tape, but, but it's not going anywhere anytime soon, but.
Speaker:It definitely is not.
Speaker:Uh, yeah.
Speaker:Let's go back to my concept.
Speaker:I'm definitely a friend of tape.
Speaker:Having said that, there are a lot of reasons why we moved off the tape
Speaker:for, um, on-premises backup, right?
Speaker:There were a lot of really good reasons.
Speaker:I mean, there were.
Speaker:There were re like downsides of tape, right?
Speaker:Specifically having to do with how fast tape was and how slow backup was.
Speaker:And it was a fundamental mismatch.
Speaker:And that's really the core reason why we moved off of tape.
Speaker:And then we got a lot of really cool things like incremental forever, the
Speaker:idea being able to replicate backups.
Speaker:Now we can have an onsite backup and an offsite backup.
Speaker:Without touching a tape, without doing anything, it's just magic.
Speaker:And we have on-prem and off-prem, we can back up using deduplication, we
Speaker:can back up across the, the internet,
Speaker:Yep.
Speaker:would've thought.
Speaker:Right?
Speaker:Um, but
Speaker:But
Speaker:as you mentioned already,
Speaker:Yeah.
Speaker:the big drawback from a cybersecurity perspective is that there's no air
Speaker:gap, not an air gap as defined.
Speaker:Previously and.
Speaker:we talked about in the beginning.
Speaker:and I think this is why many vendors have now sort of modified the
Speaker:Yeah,
Speaker:to now call it a virtual air gap.
Speaker:A logical air gap.
Speaker:Like to, basically nuance it versus
Speaker:yeah.
Speaker:definition.
Speaker:My.
Speaker:My experience has been, they don't even, they don't even nuance it.
Speaker:They just say air GAed and they only use those terms when pushed.
Speaker:Right.
Speaker:Um, and uh, they'll just say it's, it is air GAed.
Speaker:Yeah.
Speaker:Right.
Speaker:And they'll, and, and I'm gonna say no, it's not
Speaker:Yeah.
Speaker:for
Speaker:let's talk about what some of vendors now call air gap, quote
Speaker:unquote air quotes, right?
Speaker:But
Speaker:Yeah,
Speaker:use the word virtual air gap just for the
Speaker:sure.
Speaker:podcast, just to refer
Speaker:Yeah,
Speaker:definition
Speaker:yeah,
Speaker:using?
Speaker:yeah.
Speaker:So, um, basically
Speaker:I would, I would put it into like two categories.
Speaker:One is that if it's in a storage system that refers to itself as worm, right?
Speaker:That's right.
Speaker:One's read many, in other words, a, a. Immutable storage system,
Speaker:meaning that the data cannot be
Speaker:Yep.
Speaker:deleted there.
Speaker:And, and these are two different things I I want to definitely separate.
Speaker:There is there is storage that is damn near immutable,
Speaker:Yep.
Speaker:right?
Speaker:Even tape that's immutable isn't really immutable because you can take, you
Speaker:can take a hammer, a what'd you say?
Speaker:A what?
Speaker:fire to it,
Speaker:Yeah, yeah, yeah.
Speaker:Flame thrower, right?
Speaker:Um, same thing with optical media and, and anything that claims to be immutable.
Speaker:Nothing is a hundred percent immutable.
Speaker:Um, but there are storage systems that even if you, um, root it,
Speaker:basically, you can't overwrite the data
Speaker:Yep.
Speaker:that's there.
Speaker:Now, having said that, again, you could set fire to it.
Speaker:Right.
Speaker:Um, which is why when we, we start talking about cloud copy, so that's one way
Speaker:in which that they say it's something.
Speaker:get to sort of the immutable right, versus the other one.
Speaker:Maybe we should talk about like if we kind of distill down what the
Speaker:air gap provided, right, or what they're looking for air gap to
Speaker:Yeah, sure.
Speaker:really about making sure that the data doesn't go away
Speaker:Yeah.
Speaker:there is a cyber attack or something else like that.
Speaker:Exactly.
Speaker:That's pretty much the whole reason of an air gap.
Speaker:And so how can we do that
Speaker:Yeah.
Speaker:an electronic world, in an online world, in a cloud world?
Speaker:How can we ensure that when the feces hits the rotary oscillator, that you
Speaker:know that it it, that you will have at least one copy that is somewhere
Speaker:that you know is available to you.
Speaker:And so this is a great technology that a lot of vendors offer and
Speaker:it's been around for a long time.
Speaker:I wanna say I first heard about this almost two decades ago
Speaker:The concept of immutable storage.
Speaker:Yeah, yeah, yeah.
Speaker:right.
Speaker:Um.
Speaker:so it's been around for a while.
Speaker:It does offer some great capabilities, but also some drawbacks.
Speaker:I think the biggest being, you write to it, if you ever want to
Speaker:delete it for whatever reason,
Speaker:Yeah,
Speaker:needed.
Speaker:sorry.
Speaker:accidentally wrote something I shouldn't have.
Speaker:I needed to reduce my retention periods for legal reasons.
Speaker:Whatever it is,
Speaker:Yeah,
Speaker:delete it.
Speaker:yeah.
Speaker:Sorry, not sorry on that one.
Speaker:Right.
Speaker:Um, and so, uh, and, and, and when we talk about immutable and, and
Speaker:we've done an episode or two on that.
Speaker:There are various levels of immutable immutability right there.
Speaker:There are, you know, basically append only file systems.
Speaker:There are, um, but many of them have kind of a back door, uh, that then you need to
Speaker:look into what does it take to use that back to get to the back door, and, you
Speaker:know, all of that, that different stuff.
Speaker:But, um, the, the best ones are.
Speaker:Storage level, immutable, so that even if you got super all powerful,
Speaker:you know, uh, then you, you wouldn't be able to do anything.
Speaker:to get to delete the data is basically to physically break
Speaker:Right.
Speaker:Right, right.
Speaker:And um, so that's one thing.
Speaker:And then the other thing is basically I am.
Speaker:Right.
Speaker:So, uh, identity and access management.
Speaker:So we have a copy that's not technically immutable in the cloud, but it's
Speaker:just impossible to get to it, right?
Speaker:Um, and the idea is that you use, you use a different, uh, IAM system for this copy
Speaker:than you do for the rest of the world.
Speaker:And you also, um, you, you basically put many levels of protection, right?
Speaker:Obviously you, you have MFA, you have, um, you know, pass keys.
Speaker:You have all of the best security that you have available to you.
Speaker:And,
Speaker:you know, and you just, you just follow all of the best practices to.
Speaker:Ensure as best as possible that even if somebody got a username
Speaker:and password, they wouldn't be able to do, you know, the, you, you,
Speaker:you protect it as much as you can.
Speaker:I agree with that.
Speaker:And I think another thing you can consider is this could either be
Speaker:something like when you said IAM, right?
Speaker:And putting access controls, right.
Speaker:Another mechanism is you.
Speaker:There are two ways I look at it.
Speaker:Either you do it yourself, so
Speaker:Mm-hmm.
Speaker:creating separate AWS
Speaker:Right.
Speaker:Right.
Speaker:uh, putting it in.
Speaker:If you run primarily on Amazon, maybe you're backing up to Microsoft Azure,
Speaker:Mm-hmm.
Speaker:Mm-hmm.
Speaker:So you're kind of segregating your, and isolating your environment.
Speaker:Another mechanism is maybe you end up using a cloud service provider.
Speaker:Yep.
Speaker:service provider that actually provides these services for you and kind of
Speaker:gives you that separation that you
Speaker:Yeah.
Speaker:Essentially they have the key to the vault.
Speaker:Yeah.
Speaker:And, um, speaking of cloud service providers, I was thinking about
Speaker:with the first one with immutable.
Speaker:There are backup vendors, cloud backup vendors, that while the
Speaker:backups as they're writing it, are, they're not using immutable storage
Speaker:because immutable storage and dedupe
Speaker:Geez, don't
Speaker:really go well together very well.
Speaker:Um.
Speaker:At least in terms of the way cloud does
Speaker:yeah,
Speaker:costing and everything.
Speaker:So they don't use immutable storage on the backend because there is cloud, there is
Speaker:immutable storage available in the cloud.
Speaker:If they don't use that in the backend, but then what they do is they have
Speaker:software level immutable storage built into their product that would basically
Speaker:says even if you were a cloud admin of this particular backup product, you would
Speaker:not be able to using the backup product, um, you know, delete the data, uh, to
Speaker:basically prematurely expire your backups.
Speaker:And then also built into the configuration is that there's, again, with the IAM,
Speaker:there's all these protections so that there's no way to get to the data in the
Speaker:cloud except through their application.
Speaker:And then they make the application, you know, uh.
Speaker:Immutable as I may call.
Speaker:And so this is the way they make their, their virtual air gap.
Speaker:So I wanted to ask you, so I agree with these two approaches for how you
Speaker:achieve protection against cyber attacks,
Speaker:Yeah.
Speaker:right?
Speaker:Which is what, uh, air gap is supposed to provide,
Speaker:Right.
Speaker:air gap.
Speaker:So we talked about controls.
Speaker:I know some vendors, they offer sort of a mechanism to create a
Speaker:secure vault for their backups.
Speaker:Mm-hmm.
Speaker:Um, these vendors though though mechanisms that they use this because
Speaker:they are using storage level replication
Speaker:Right,
Speaker:is they actually do things like kill the network connection when not needed
Speaker:right.
Speaker:and have separate management.
Speaker:Uh, domains between source and destination and the vault,
Speaker:Yeah.
Speaker:You know?
Speaker:you that
Speaker:Yeah.
Speaker:so you're not
Speaker:I,
Speaker:this connected all the time
Speaker:yeah, I, I, yeah.
Speaker:That's really good.
Speaker:I, I think this falls into basically a third category, which is a simulated.
Speaker:A simulated air gap.
Speaker:Right.
Speaker:Um, even, even more virtual than the, well, it's, it's, it's
Speaker:simulated in that they're doing their best, like, like you said, like
Speaker:shutting off the, the connection.
Speaker:Uh, so that at least when they're not actively replicating that
Speaker:the, that there is literally no connection to that, to that device.
Speaker:Yeah.
Speaker:That is, that is another topic.
Speaker:That is another method.
Speaker:Yeah.
Speaker:I like that.
Speaker:I do wonder, so just since we're talking about that, I wonder how it is if you go
Speaker:through like Tor to then connect to your backup infrastructure, your vault, right?
Speaker:The onion router, if you will.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Well, I know some, some companies you, you open up a Tor browser and
Speaker:you're fired, but, um, um, yeah, i'm not a dark web guy, so, uh, and,
Speaker:and I think that's a good thing.
Speaker:But, but because of that, I, I, I have no, I have no opinion on that.
Speaker:Yeah.
Speaker:Yeah.
Speaker:But so regardless though, I think it is important people to understand when
Speaker:companies today talk about air gaps, I.
Speaker:of the time, it's probably referring to virtual air gaps where it's relying
Speaker:on something like immutability or IAM or network connectivity order
Speaker:to provide some form of isolation.
Speaker:It may not be as perfect as what we had initially with tapes, but it still
Speaker:satisfies some of those use cases that are needed to, uh, handle cyber attacks.
Speaker:Yeah.
Speaker:Uh, yeah.
Speaker:So unless they're using the word tape, then yeah.
Speaker:It's, it's, it's gonna be, it's gonna be virtual.
Speaker:but it's even hard though because as we talked about in one of
Speaker:the previous episodes, right, about tapes and is it dead?
Speaker:Right?
Speaker:Hyperscalers are using tape.
Speaker:You don't
Speaker:Yep.
Speaker:they're like, what is actually being done.
Speaker:And so for you to figure out is something truly air gapped or not,
Speaker:may be even more difficult these days.
Speaker:Yeah, it's the, you know, the old phrase of on the internet, nobody
Speaker:knows if you're a dog, you know, nobody knows if you're a tape.
Speaker:Yeah.
Speaker:Um, but yeah, so hopefully that helps understand like, what,
Speaker:what, what was an air gap?
Speaker:What, why was it there?
Speaker:And.
Speaker:Just, you know, when you're comparing it, just don't any
Speaker:more than the term immutable.
Speaker:Don't just take a term and go, oh, it's air gapped.
Speaker:Right?
Speaker:What?
Speaker:How is it air gapped?
Speaker:How is it air gabbed as I make air quotes?
Speaker:Air quoted air gap, um, ask questions, understand what they're doing, and then,
Speaker:you know, and, uh, unless they're making a copy and putting it on tape and then
Speaker:handing it to a man in a van, uh, it's not really air gapped, at least in terms of
Speaker:not the, not the OG as the kits would say.
Speaker:I think maybe that's the thing to think about too, is.
Speaker:you really need that level of protection?
Speaker:Yes.
Speaker:I'm sorry.
Speaker:I got, I got excited.
Speaker:Or what are you looking to solve?
Speaker:And a lot of that comes down to what are the needs of your business and
Speaker:what is the impact from a cyber attack and how you're protecting yourself.
Speaker:Exactly.
Speaker:Exactly.
Speaker:All right.
Speaker:And on that note, I will say thank you once again, sir. For, uh, well first for,
Speaker:you know, goading me to get my taxes done.
Speaker:And second, we're doing another good episode of the.
Speaker:I, I like air gaps.
Speaker:Uh, yeah.
Speaker:It's definitely something that comes up and think I'm getting to that
Speaker:point in my career where when people misuse a phrase, it kind of irks me.
Speaker:I'm like,
Speaker:Yeah, yeah,
Speaker:So.
Speaker:yeah.
Speaker:Uh, I'll just say this.
Speaker:It is because it is because you're older, right?
Speaker:Even though you're not as old as me, you're still older than,
Speaker:you know, these whipper snapper.
Speaker:And I got, I had this image.
Speaker:I was, I was at Lowe's yesterday and I was checking out.
Speaker:I was just checking, you know, I just had some, I was buying
Speaker:some screws and then, uh, I.
Speaker:Then I, I got in, I got in line and there was this guy that was
Speaker:older than me and they only had the self-checkout lines open.
Speaker:There were, there was no actual checkout.
Speaker:He was like, can't even, can't even hire anybody to run the registers anymore.
Speaker:I'm like, oh my God, dude.
Speaker:Like,
Speaker:it was just, it made me laugh.
Speaker:Um, anyway.
Speaker:All right, well that is a wrap.
Speaker:The backup wrap up is written, recorded, and produced by me w Curtis Preston.
Speaker:If you need backup or Dr. Consulting content generation or expert witness
Speaker:work, check out backup central.com.
Speaker:You can also find links from my O'Reilly Books on the same website.
Speaker:Remember, this is an independent podcast and any opinions that
Speaker:you hear are those of the speaker and not necessarily an employer.
Speaker:Thanks for listening.