Turbonomic can now ensure that it’s SaaS application always have a safe recovery option for its customer environments.
Challenges
- Turbonomic needed to automate SOC2 security and availability control enforcement and reporting.
- Turbonomic needed a cyber resilient disaster recovery solution for its SaaS application compute and storage resources to include threat detection.
- Turbonomic needed continual monitoring of its recovery risk posture as it adopted an AWS infrastructure.
- Turbonomic needed to ensure vulnerabilities were not reintroduced back into the production environment after a recovery.
- Elastio generates a real-time recovery risk assessment for their SaaS applications and data for SOC2 security and availability compliance.
- Elastio defends their applications and data from attacks by continually monitoring all of its compute and storage resources, inspecting them for ransomware and malware and securing the backups immutably, protecting them from malicious actors.
- Elastio mitigates business continuity risks, downtime and data loss by ensuring backups are recoverable at the time they are taken. If cyber threats or corruption are detected, forensics tools are available for response and recovery.
Building Cyber Resilient Recovery into SaaS Applications
Trust is essential to IBM’s customers, and they expect services like Turbonomic to be highly available and secure.
Building in SOC2 controls was a fundamental part of the process, because they were vital for ensuring application security and availability. The data security controls would serve to protect the software stack against cyberattack. The availability controls needed to include the ability to capture and back up all cloud resources dynamically, while identifying and mitigating threats and predicting capacity requirements in real time.
Turbonomic needed to automate the enforcement and reporting of these controls and have continuous monitoring of its recovery risk posture. Moreover, they had to ensure that vulnerabilities were not reintroduced back into the production environment during a recovery operation.
The container-based application uses AWS EKS and multiple persistent volumes to host the data, each of which is backed up using AWS’s high-performance block storage service Elastic Block Store (EBS). The application uses MySQL as its database platform, which is hosted in the container.
Ensuring business continuity attestation with proactive protection
The Turbonomic team is also responsible for managing ParkMyCloud, a cloud platform that helps IT teams manage, govern, and optimize spend across multi-cloud environments. It leverages a scale-out architecture based on AWS EC2, EBS volumes, and RDS MySQL.
Before the team deploys an application, it is first scanned for threats. Once it is in production, Elastio continually monitors, protects, and inspects the applications and data for detonated or undetonated ransomware and other forms of malware. It continuously evaluates the health of file systems as well to proactively guard against these threats. Elastio’s agentless component provides seamless protection for scale-out compute applications like PMC to ensure that every instance and volume is continuously protected, scanned for threats, and retained for cyber-resilient recoveries.
Elastio takes a much more comprehensive approach to mitigating the risk of ransomware and other threats than standard recovery snapshots. The service generates real-time recovery risk assessments for SaaS applications like Turbonomic and ParkMyCloud to ensure compliance with SOC2 security and availability demands. It also defends their applications against threats like ransomware by continuously monitoring all dependent compute and storage resources for potentially malicious activity and securing them with immutable recovery points.
Elastio also helps protect Turbonomic from zero-day attacks by ensuring that vulnerabilities cannot be reintroduced following a recovery operation. In doing so, it proactively mitigates the risks facing business continuity operations, such as downtime and data loss, while providing robust remediation and forensics for security teams.