IBM Storage Defender

IBM Storage Defender

Early threat detection and secure data recovery

 View Only

Use the built in 'four-eye' principle to avoid unwanted dataloss

By Mikael Lindström posted Wed March 17, 2021 03:46 PM

  
With the increased focus on security, simplicity and stability in Delivery organizations, we want be sure your backup data is safe, secure and available. One way to help with this is to follow our best practices and use the built-in software capability that prevents an administrator from performing an action that could cause a major incident, including data loss. This administrator action could have been unintentional or it could have been more nefarious, from a rogue administrator or hacker.

I strongly recommend that you enable the IBM Spectrum Protect "Command Approval" built-in functionality so that the four eyes principle (two-person rule) is enforced for any data destructive actions. IBM Spectrum Protect has a very simple procedure (via the Operations Center or command-line interface (CLI)) where the command approval feature provides an oversight process that prevents certain restricted actions (e.g. data deletion) from running until the action is approved by a second administrator. This provides an additional layer of security to ensure your backup data is protected.

I have personally worked in IT Emergencies caused by human errors or virus and knows that it is vital to create a "hard to do harm" IT environment. This four eye principle we have implemented is a key contributor to a solid IT infrastructure (and sleep at nights instead of working..).


Here is the IBM Spectrum Protect documentation regarding this topic:
https://www.ibm.com/support/knowledgecenter/en/SSEQVQ_8.1.11/srv.admin/t_cmdappr_mng.html
I also recommend that you watch these short videos to see how easily this is to enable and use:
https://www.youtube.com/watch?v=ZK81qK7vQNk
https://www.youtube.com/watch?v=SDYo-xVaf2g

0 comments
358 views

Permalink