LiveVault Server Security

Today, more companies than ever recognize the value and convenience of using online backup to protect their server data. If your company is considering BackUp Solutions' LiveVault Service, or any other online backup service, consider these questions:

  • Could an unauthorized individual gain access to backed-up data?
  • Could backed-up data be altered?
  • Will necessary data be available when needed?
  • Is data safe from fire, floods, and human error?

The LiveVault Service addresses all these concerns with the most secure solution available. For example, the LiveVault Agent encrypts all data before transferring it from your servers. All data remains encrypted at the Iron Mountain secure off-site Data Bunkers and on optional TurboRestore™ appliances. Only the customer controls the data encryption passwords. To ensure the physical security and availability of stored data, the LiveVault Service employs a fully redundant vaulting infrastructure at two Iron Mountain underground Data Bunkers.

Security for Data in Transit

Data Security

The LiveVault Service assures that the connection between application servers and Iron Mountain's secure off-site Data Bunkers is secure. The LiveVault Service uses the best electronic security methods, including:

  • Automatic, outbound-only connections: There is no added security risk to your environment. In particular, there are no inbound connections. The LiveVault Agent on your server communicates only with the LiveVault backend infrastructure. The LiveVault Agent initiates all connections from your server (outbound connections) over two ports reserved for the LiveVault Service, or over port 443 (the SSL port) if those ports are not available. Normally, there is no need to alter the firewall security perimeter. This makes installation particularly simple and secure.
  • Public key encryption for mutual authentication: There is no possibility of spoofing. The LiveVault backend infrastructure and the Agent independently validate certificates each time a connection is made. This authenticates the Agent to the electronic vault, and the vault to the Agent.
  • 256-bit Advanced Encryption Standard (AES) encryption of all data before transmission and storage: There is no possibility of eavesdropping on data transfer between the Agent and the electronic vault, and no possibility of Iron Mountain seeing your data on the vaults. 256-bit Advanced Encryption Standard is the level of encryption that banks and government agencies employ.
  • Customers control encryption passwords: Customers may keep their encryption passwords private, so there is no possibility of any BackUp Solutions employee accessing customer data. Iron Mountain also offers a free, optional encryption password escrow service that enables customers to recover data even if the encryption passwords are not available.
  • Customers can change encryption passwords: Whenever there is a potential security breach, such as when a trusted individual leaves a customer's company, the customer can simply change the data encryption passwords, which is similar to changing the door locks. Older backed-up data can still be restored, but only with the new password.
  • Protecting encryption keys and passwords: All data is encrypted (256-bit AES) at the source, using a unique encryption key. To guard against forgetting or losing encryption keys, The LiveVault Service offers a password-protected, user-changeable, human-friendly encryption key built on top of the machine-readable encryption key. As additional protection, there is the free option to escrow the key at Iron Mountain. A customer can change the password that accesses encrypted data, so that all data is only available with the new password (and not available with the old password).
  • Digital signatures: There is no possibility of corruption or modification of data. All communication between the LiveVault Agent and vault uses industry-standard SSL (Secure Sockets Layer). This prevents any accidental or malicious modification, and protects the integrity and confidentiality of all data.

Security for the LiveVault Web User Interface

The LiveVault Web user interface is convenient for customers to use because only a Web browser is needed for access. Security features of the Web user interface include:

  • Encrypted communication: Secure Sockets Layer (SSL) encryption protects the LiveVault Web user interface.
  • Data protection: The contents of backed-up files are not accessible.
  • Privacy protection: Because data encryption passwords are not set or accessed with the Web user interface, even if someone steals a user's login and password, they cannot restore data, except to the machine where it originated.
  • Strict password rules are available: A company can set password specifications for their account, such as minimum password length, reuse policy, expiration period, and requirement for non-alphabetic characters.
  • Limits on insider attacks: Customers can grant users only the rights and privileges necessary for their specific job duties. For example, a help desk person might have the ability to initiate restores, but not to set or change backup policies or add other users. Similarly, an IT administrator might have some (or limited) responsibilities for servers and users where they work, but not be able to see or manipulate servers or user accounts at other locations.

Physical Security for Data Stored in Electronic Vaults

Iron Mountain owns and operates off-site Data Bunkers that provide high-security environmentally-controlled storage for a variety of media. These Data Bunkers include data centers with redundant infrastructure. For example, the security features of one of two Data Bunkers used for the LiveVault Service include:

  • A 145-acre site, 200 feet underground.
  • Five-ton steel gates with 7x24 armed security.
  • OSHA-certified fire brigade and EPA-certified water treatment plant.
  • Redundant generators for full backup power for up to 7 days. Entrance to an Iron Mountain underground facility.
  • Redundant bandwidth providers.
  • A Level 9 (Ultra-Reliable Data Center) rating by independent security consultants BRUNS-PAK.

The data centers within the Data Bunkers have achieved SysTrust® certification, which satisfies the specific Trust Services Principles and Criteria of the American Institute of Certified Public Accountants (AICPA) and the Canadian Institute of Chartered Accountants (CICA). SysTrust examination assures that a system is reliable when measured against four essential principles: availability, security, integrity, and maintainability.

LiveVault Vaults

LiveVault data is stored in electronic vaults in each data center. When customers sign up for the LiveVault Service, their data is mirrored between vaults at each site for high availability. Iron Mountain constantly monitors the Data Bunkers, data centers, and vaults. In the unlikely possibility of a failure, backups are rerouted and continue automatically to the remaining vault. When the failure is repaired, all missing backup data replicates to the repaired or replaced vault. All other elements of the backend infrastructure, such as the Web servers, the backend database, and the command and control systems, are also redundant.

Storage Security features include:

  • The data center stores the 256-bit AES-encrypted backup files without decrypting them.
  • Every account has a unique encryption key and only the key that encrypted the file can decrypt it.
  • Secure, Reliable Server Protection
  • Strategic partners, including IBM, HP, and LexisNexis, have selected the LiveVault solution to protect their customers' valuable data.

Today, over 30,000 servers worldwide are under the protection of the LiveVault Service and customers have restored over 234 million files.

Data backed up with the LiveVault Service is automatically off-site and safer than it is in the customer's own facility. Customers rely on BackUp Solutions to have their data available when they need it, while protecting the privacy and integrity of the data.