According to Statista:
“In 2022, roughly 68 percent of the worldwide reported cyberattacks were ransomware. In the fourth quarter of 2022, nearly 155 million ransomware attacks were detected worldwide. As of 2023, the highest share of companies victimized by ransomware were in Singapore and Austria, while the United States ranked first by the number of such attacks.”
The goal of this article is not to give you specific “how-tos” of implementing Ransomware protection, as those can vary based on your specific environment and cloud provider. Its primary purpose is to point out that there are two sides of protecting against a ransomware attack: prevention and recovery.
This is similar to what we do in everyday life to protect ourselves from an auto accident. We take action to protect ourselves in both the prevention and the recovery phase. Here is what it looks like.
PREVENTION – we do what we can to prevent an accident occurring in the first place:
RECOVERY – what we do in order to be able to recover from an accident if one occurred despite our best prevention efforts:
Image Source: Gartner
As with the example above, when we want to prevent a ransomware attack, there are certain measures we must take in order to minimize the chance of one occurring in the first place. This is where the effort for ransomware protection begins.
While this is not an exhaustive list, some of the common examples are:
Again, this is the phase where a ransomware attack has happened, even though we implemented prevention measures. If we find ourselves in this situation and then start asking the “What to do?” question, we are actually in trouble.
Therefore, it is important to take steps before an attack occurs in order to increase our likelihood of recovering after the unfortunate event of being attacked.
During a ransomware attack files, data, or systems are being encrypted. The attacker then demands money in order to provide a decryption key. It is as if the attacker locks our system and now wants money to provide the key that unlocks it.
Therefore, if this has happened, the goal here is to be in a position where we don’t need the key at all. This can be achieved IF we have taken steps to be able to completely reproduce our: environment, system, and data. If we have the ability to do so and do it fairly quickly, having the key of the attacker would not be necessary for business continuity.
So what can be done in order to not need the attacker’s key? The following measures can be taken long before an attack occurs.
Automate your infrastructure provisioning. Create an automatic process that allows you to quickly and easily recreate your entire Production environment, along with all of its configuration. Using Infrastructure as Code (IaC) tools to automate the provisioning of cloud infrastructure will help ensure a known good state and enable fast recovery in the event of a ransomware attack.
If you have a solid automated infrastructure process, you should be able to recreate your Production environment in a different data center region, which your attacker will not have penetrated. This will give you the base of rebuilding your entire system in a new environment.
Automate the deployment of your entire Production system. Create a solid CI/CD pipeline which allows you to deploy your entire Production system to any environment that you point it to. This way, if you have created and configured a brand new environment (using the step above) in a new data center region, you can now deploy the latest code, files, and data on top of it.
In order to be able to execute the above two steps you need to ensure that your latest source code is also backed up. This is important because if the attacker manages to encrypt your source code, you will not be able to stand up a new instance of your production system, even if you have automated processes for both infrastructure and deployment.
Therefore, you need to have regular source code backup processes, which make copies of all your source code at an offsite location.
Example: In a previous software company where I used to work all of our systems, including the source code, were hosted in Azure Cloud. Therefore, we implemented a source code backup process, which created backup copies in AWS.
Similarly to backing up your source code files you need to have backup processes for all of your data. This should include both databases and any data files.
Ensure regular and automated backups of critical data. Store backups in a separate, isolated environment to prevent ransomware from spreading to them. Also, regularly test the restoration process to ensure backups are functional.
Create a step by step DR plan to ensure that your team is able to seamlessly execute the restoration steps in the event of an attack or disaster.
Ensure that all of the processes you have in place will actually work and that your team will have the ability to create a fully independent and complete instance of your production environment, system, and data.
Practice test runs of the DR plan twice a year, or once per quarter to make sure that it is being updated as your environment changes.
Having a solid DR plan will be helpful not only in the aftermath of a ransomware attack but also in the recovery effort of a disaster.
Example: Another real example from my work experience is – our Azure data center was completely shut down by a lightning strike in the midwest, which caused our system to be down for 2 full days.
If you are looking to boost your company’s technological capabilities and drive innovation, consider engaging a Fractional Chief Technology Officer (CTO). A Fractional CTO can provide strategic guidance, technical expertise, and leadership on a part-time basis, tailored to your specific needs and budget. By leveraging the experience and insights of a Fractional CTO, you can optimize your technology roadmap, enhance productivity, and stay ahead in today’s competitive landscape.
Want to know more? Explore my Fractional CTO services.
No one is guaranteed immunity from a ransomware attack. If you don’t want to suffer the consequences of a ransomware attack, take some steps ahead of time. Create measures to prevent an attack, but also do not neglect the steps which would allow you to recover from one. Don’t be the company that implements only preventative measures and hopes they will never be penetrated. Be the company that can recover even in the face of an actual attack. Be the type of company that would not need the attacker’s key in order to continue to function.