corso/website/blog/2023-3-13-dataprotection-gumbo.md
Georgi Matev 148a13d7bb
Data protection gumbo blog (#2762)
Blog about Data Protection Gumbo session 
---

#### Does this PR need a docs update or release note?

- [ ]  Yes, it's included
- [ ] 🕐 Yes, but in a later PR
- [x]  No

#### Type of change

<!--- Please check the type of change your PR introduces: --->
- [ ] 🌻 Feature
- [ ] 🐛 Bugfix
- [ ] 🗺️ Documentation
- [ ] 🤖 Test
- [ ] 💻 CI/Deployment
- [ ] 🧹 Tech Debt/Cleanup

#### Issue(s)

#### Test Plan

<!-- How will this be tested prior to merging.-->
- [x] 💪 Manual
- [ ]  Unit test
- [ ] 💚 E2E
2023-03-13 18:23:12 +00:00

80 lines
5.2 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

---
slug: dataprotectiongumbo
title: "Talking M365 with the Data Protection Gumbo"
description: "Georgi Matev, Head of Product at Alcion, discusses Saas and M365 data protection on Data Protection Gumbo"
authors: gmatev
tags: [corso, microsoft 365, backups, SaaS data protection, ransomware]
date: 2023-3-13
image: ./images/data_protection_gumbo.png
---
![Data Protection Gumbo, https://dataprotectiongumbo.com/](./images/data_protection_gumbo.png)
I recently sat down to talk with [Demetrius Malbrough](https://www.linkedin.com/in/backuprecoverypro/) on a recent
episode of his [Data Protection Gumbo podcast](https://dataprotectiongumbo.com/). We covered several topics related
to data protection for SaaS services in general and M365 specifically as well as the role of open source tools like
Corso can play to help secure this data. I have summarized some of the key discussion points below, but I highly
recommend listening to the [full episode](https://dataprotectiongumbo.com/184-exploring-microsoft-365-backup-and-recovery-alcion/).
Also, if you aren't following the podcast and Demetrius already, you should!
<!-- truncate -->
## Cloud adoption and security risks
Weve been hearing and reading about companies moving to the cloud for the past decade, but in the wake of the COVID
pandemic and lockdowns, cloud migration has been truly accelerated. Remote workforce models and distributed teams are
here to stay, and adopting SaaS services has allowed companies to quickly accomplish this transition.
With a much more open network topology, properly securing and administering a myriad of SaaS services is a challenge,
and the risks increase as SaaS services become targets of malicious actors who recognize the business value of that data.
## SaaS data isnt automatically safe
While many SaaS vendors publish their version of a shared responsibility model, it's not something that folks
naturally internalize. SaaS service customers often overestimate that the service availability and reliability
guarantees extend to full protection of customer data.
Unfortunately, this is more of an illusion. If access to a SaaS service is compromised, it will respond to malicious
traffic just as well as it would respond to legitimate requests. This makes some of the traditional defenses
(for example, service side encryption, data redundancy, etc) ineffective. With the increased adoption of SaaS services, we'll
see an increase in ransomware and other style attacks against them.
## Common attack vectors
Depending on the service, the initial attack vectors will typically be through direct credential leaks or, in more sophisticated
cases, through obtaining delegated access through phishing attacks. The result is that malicious actors obtain API-level
access to the targeted service.
From there actors can exfiltrate data and use the service APIs to client-side encrypt user data with keys that they
control. Depending on the privilege of the comprised credentials, the attackers can turn off access to native service
defenses. For example, in the case of Microsoft 365, a highly privileged account can manipulate and disable file
versioning settings before overwriting user data with encrypted content.
While we haven't seen a lot of these attacks publicized yet, I expect that will change as SaaS services become
priority targets.
## SaaS data protection considerations
First, acknowledge that SaaS data, such as M365 files, is of high business value and criticality (likely to include financial
models, operations plans, company IP, etc) and therefore it will be attacked.
Second, recognize that while helpful for traditional data protection scenarios like accidental deletion, SaaS service
native features (for example, previous versions and multi-level recycle bin) may not be sufficient to protect you against
all treats.
Third, determine your appetite for risk exposure when a breach occurs vs. the cost of a data protection solution.
Depending on your budget, youll have a choice to (A) accept the risk and rely on the level of protection offered by native
features (if they exist, higher licensing tier may be required) or (B) explore commercial data protection solutions.
If you like none of these options, you can also explore what might be available as Open Source tooling in this
domain, so that you can get establish at least a basic level of protection without directly incurring additional licensing
costs.
## Corso is a great open source option for M365
We at [Alcion](https://alcion.ai/) have discussed the topics above with a number of IT professionals from both SMBs
and the enterprise companies, and realized that the penetration of M365 data protection solutions is relatively low
compared to the importance of the data stored. This is due to a combination of overestimating Microsofts responsibility
for M365 customer data as well as budgetary considerations, especially on the smaller side of the SMB segment.
To raise awareness for the importance of M365 backups and lower the entry barrier, our team introduced
[Corso](https://corsobackup.io/) - a free, secure, and open-source backup solution for Microsoft 365. If you found my
conversation with Demetrius and the topics above interesting, give [Corso](https://corsobackup.io/) a try!