We (too) need to protect backup storage from encrypting ransomware (aka Cryptolockers), and feel we are not doing enough: we are glad if you can give some advice or even just web links that may help us.
We have an ordinary proxmox pve/pbs setup:
* 2 Proxmox pve with nightly backup on a Pbs (ACL permission role: DataStoreBackup)
* the Pbs is (baremetal) in another region, reachable with a public IP:8007
* one remote pbs that rsync everything
(then we have a secondary backup, limited to some directories of VM and CT, under borg/borgmatic/rsync.net)
Pbs storage is on ZFS, the backup storage is not encrypted: should it be?
Ordinary firewall rules: nothing special.
We also backup some directory of the proxmox hosts, as well, with a
Since we know that a backup client, with ACL permission role: DataStoreBackup can backup itself, but can also read his own backups, we are afraid that an encrypting ransomware could easily reach backups, too (removing them, for example).
We have an ordinary proxmox pve/pbs setup:
* 2 Proxmox pve with nightly backup on a Pbs (ACL permission role: DataStoreBackup)
* the Pbs is (baremetal) in another region, reachable with a public IP:8007
* one remote pbs that rsync everything
(then we have a secondary backup, limited to some directories of VM and CT, under borg/borgmatic/rsync.net)
Pbs storage is on ZFS, the backup storage is not encrypted: should it be?
Ordinary firewall rules: nothing special.
We also backup some directory of the proxmox hosts, as well, with a
proxmox-backup-client
basic script: here we need an advice on how to protect the password.Since we know that a backup client, with ACL permission role: DataStoreBackup can backup itself, but can also read his own backups, we are afraid that an encrypting ransomware could easily reach backups, too (removing them, for example).