An average enterprise storage and backup device has 14 vulnerabilities, three of which are high or critical risk that could present a significant compromise if exploited, according to Continuity.
The findings underscore a significant gap in the state of enterprise storage and backup security, and shows how much it lags behind the security of other layers of IT. With the growing sophistication of data-centric attacks, the high volumes of data at risk and tightened regulations, enterprise storage and backup security clearly require urgent attention.
Securing enterprise storage and backup systems
“Securing enterprise storage and backup systems has become a critical part of organizations’ cyber resiliency strategies,” said Dennis Hahn, principal analyst, Data Center Storage and Data Management for analyst firm, Omdia. “As important as rapid data recovery is to business continuity if data is lost or stolen, it is arguably even more important to protect data anywhere it lives and not let storage and backup systems themselves become an entry point for attack.”
The report assessed 245 environments with 8,589 storage and backup devices from leading providers including Dell, NetApp, Veritas, Hitachi Vantara, Pure, Commvault and others.
Just over 60% of organizations were from the banking sector. Other industries included healthcare, financial services, telecommunications, media, shipping carriers, and IT Services.
Enterprise storage and backup device vulnerabilities
A total of 9,996 discrete security issues (e.g., vulnerabilities and security misconfigurations) were detected, spanning more than 270 security principles that were not adequately followed.
On average, an enterprise storage and backup device has 14 security risks, of which three are of high or critical risk rating, meaning each would present a significant compromise if exploited. This finding is practically identical to last year’s report, indicating little has been done to address this high-risk area.
While deployment of immutable storage is rising, this can lead to a false sense of security if not implemented properly, and unfortunately, the analysis detected a significant number of misconfiguration issues specific to these features.
Unpatched vulnerabilities in storage and backup systems are the main points of attack for most ransomware. Users are not aware of the fact that traditional vulnerability management tools do not cover those systems well.
The top five security risks
- Insecure network settings (use of vulnerable protocols, encryption ciphers, etc.)
- Unaddressed CVEs
- Access rights issues (over-exposure)
- Insecure user management and authentication
- Insufficient logging & auditing
“We conducted this research to offer greater insight into the scope of the problems in data storage and backup security,” said Gil Hecht, CEO of Continuity. “Not only did it help to quantify the high level of vulnerabilities and security misconfigurations in the average enterprise storage and backup system, it also underscores the importance of taking a proactive and automated approach to fixing them.”