Chapter 1: Introduction to Cohesity Data Cloud & Security Architecture

Learning Objectives

1.1a Cohesity Data Cloud: Architecture & Core Components

Pre-Quiz: Platform Architecture

1. What is a key architectural feature that eliminates single points of failure in a Cohesity cluster?

A dedicated master node manages all operations Each node has a separate storage array attached via SAN There is no master node; all nodes participate equally A standby failover node is reserved for disaster recovery

2. A hospital needs to access the same medical images via NFS, SMB, and S3 simultaneously. Which Cohesity component makes this possible?

DataProtect CloudArchive SpanFS FortKnox

3. How does Cohesity's cluster architecture scale to meet growing backup demands?

By replacing existing nodes with higher-capacity models By adding commodity nodes linearly without replacing existing hardware By connecting to external SAN arrays for additional storage By offloading all growth to cloud-only storage tiers

4. Which SpanFS feature enables unlimited snapshots without performance degradation?

Global Deduplication Distributed NoSQL Store SnapTree (B+ Tree Metadata) Multi-Protocol Support

5. What distinguishes Cohesity SmartFiles from CloudArchive?

SmartFiles is for backup and recovery; CloudArchive is for file sharing SmartFiles provides active multiprotocol file/object services; CloudArchive provides long-term archival to cloud providers SmartFiles only supports S3; CloudArchive supports NFS and SMB SmartFiles runs only in the cloud; CloudArchive runs only on-premises

Key Points

Cluster Architecture

Cohesity runs on clusters of interconnected commodity x86 nodes. Each node is hyperconverged -- bundling compute, storage, and networking -- so there is no separate storage array. A minimum deployment starts at three nodes. The architecture is masterless: every node participates equally, which eliminates single points of failure and allows dynamic data rebalancing as nodes are added or removed.

flowchart LR subgraph Cluster["Cohesity Cluster (No Master Node)"] direction LR N1["Node 1\nCompute + Storage + Network"] N2["Node 2\nCompute + Storage + Network"] N3["Node 3\nCompute + Storage + Network"] N4["Node N\n(Scale Linearly)"] end N1 <--> N2 N2 <--> N3 N3 <--> N4 N1 <--> N3 N2 <--> N4 subgraph SpanFS["SpanFS Distributed File System"] direction LR D1["Global Deduplication"] D2["Unlimited Snapshots"] D3["Multi-Protocol Access\nNFS / SMB / S3"] end Cluster --> SpanFS

SpanFS Features

FeatureDescription
SnapTree (B+ Tree Metadata)Distributed metadata structure enabling unlimited snapshots with no performance impact
Distributed NoSQL StoreConsistent, distributed store for metadata management at scale
Multi-Protocol SupportSimultaneous NFS, SMB, and S3 access on the same data
Global DeduplicationVariable-length deduplication across all workloads and protocols
Strict ConsistencyData resiliency through strict consistency across all nodes
No Master NodeFully distributed; scales linearly with dynamic rebalancing

Data Cloud Components

ComponentPrimary FunctionProtocols/TargetsUse Case
DataProtectBackup & recoveryVM, physical, DB, cloud, K8sDaily backups, instant recovery
SmartFilesFile & object servicesNFS, SMB, S3Unstructured data management
CloudArchiveLong-term archivalAWS S3/Glacier, Azure Cool, GCS NearlineCompliance retention
Animation: Data Flow Through Cohesity Platform Components
flowchart TD subgraph Services["Cohesity Data Cloud Services"] DP["DataProtect\nBackup & Recovery"] SF["SmartFiles\nFile & Object Services"] CA["CloudArchive\nLong-Term Archival"] end subgraph Cloud["Cloud Services"] CT["CloudTier"] CR["CloudReplicate"] FK["FortKnox\nCyber Vault"] SC["SiteContinuity"] end subgraph Foundation["SpanFS Foundation"] FS["SpanFS Distributed File System\nSnapTree | NoSQL Store | Global Dedup"] end DP --> FS SF --> FS CA --> FS CT --> FS CR --> FS FK --> FS SC --> FS
Post-Quiz: Platform Architecture

1. What is a key architectural feature that eliminates single points of failure in a Cohesity cluster?

A dedicated master node manages all operations Each node has a separate storage array attached via SAN There is no master node; all nodes participate equally A standby failover node is reserved for disaster recovery

2. A hospital needs to access the same medical images via NFS, SMB, and S3 simultaneously. Which Cohesity component makes this possible?

DataProtect CloudArchive SpanFS FortKnox

3. How does Cohesity's cluster architecture scale to meet growing backup demands?

By replacing existing nodes with higher-capacity models By adding commodity nodes linearly without replacing existing hardware By connecting to external SAN arrays for additional storage By offloading all growth to cloud-only storage tiers

4. Which SpanFS feature enables unlimited snapshots without performance degradation?

Global Deduplication Distributed NoSQL Store SnapTree (B+ Tree Metadata) Multi-Protocol Support

5. What distinguishes Cohesity SmartFiles from CloudArchive?

SmartFiles is for backup and recovery; CloudArchive is for file sharing SmartFiles provides active multiprotocol file/object services; CloudArchive provides long-term archival to cloud providers SmartFiles only supports S3; CloudArchive supports NFS and SMB SmartFiles runs only in the cloud; CloudArchive runs only on-premises

1.1b Cloud Services & Hybrid Deployment Models

Pre-Quiz: Cloud Services

1. What is the primary purpose of Cohesity FortKnox?

To provide real-time antivirus scanning of backup data To store immutable data copies in a Cohesity-managed cloud vault, creating a virtual air-gap To manage role-based access control across clusters To provide automated OS patching for cluster nodes

2. Which Cohesity cloud service automatically moves cold data to cloud object storage while keeping metadata on-premises?

CloudReplicate SiteContinuity FortKnox CloudTier

3. An organization wants automated failover and failback orchestration for mission-critical workloads. Which service should they use?

DataProtect SiteContinuity CloudArchive SmartFiles

Key Points

Cloud-Native Services

Beyond DataProtect, SmartFiles, and CloudArchive, Cohesity extends into hybrid and multi-cloud environments with several cloud-native services:

Hybrid Deployment Model

Organizations can run Cohesity entirely on-premises, entirely in the cloud, or in a hybrid configuration. All deployment models are managed through a single control plane (Helios), providing centralized visibility and policy management across geographies, sites, and cloud regions.

Post-Quiz: Cloud Services

1. What is the primary purpose of Cohesity FortKnox?

To provide real-time antivirus scanning of backup data To store immutable data copies in a Cohesity-managed cloud vault, creating a virtual air-gap To manage role-based access control across clusters To provide automated OS patching for cluster nodes

2. Which Cohesity cloud service automatically moves cold data to cloud object storage while keeping metadata on-premises?

CloudReplicate SiteContinuity FortKnox CloudTier

3. An organization wants automated failover and failback orchestration for mission-critical workloads. Which service should they use?

DataProtect SiteContinuity CloudArchive SmartFiles

1.2a Threat Defense: Layered Security & Four Pillars

Pre-Quiz: Threat Defense Architecture

1. Which defensive layer in Cohesity's defense-in-depth model addresses east-west traffic with encryption and micro-segmentation?

Perimeter Host Internal Network Applications

2. A single compromised administrator account attempts to delete all backup policies. Which Cohesity feature prevents this?

DataLock WORM Security Advisor scanning Quorum Authorization (two-person approval) Global Deduplication

3. Which Threat Defense pillar specifically addresses data exfiltration through behavioral analytics and threat intelligence?

Pillar 1: Data Resiliency Pillar 2: Access Control Pillar 3: AI-Driven Detection and Analytics Pillar 4: Extensibility

4. What does DataLock provide?

Encryption of data in transit using TLS 1.3 Time-bound WORM capability preventing modification or deletion before lock expiry Real-time threat detection using YARA rules Integration with third-party SIEM platforms

5. How does Cohesity's Threat Defense Architecture align with industry frameworks?

It follows ISO 27001 exclusively It aligns with the NIST Cybersecurity Framework and addresses three stages of ransomware evolution It is based solely on the MITRE ATT&CK framework It follows PCI DSS controls only

Key Points

Seven Defensive Layers

LayerWhat It ProtectsExample Controls
1. HumanPeople and processesSecurity awareness training, RBAC, SSO, MFA
2. PhysicalFacilities and hardwareGuards, biometrics, fire suppression
3. PerimeterNetwork boundaryNext-gen firewalls, vulnerability testing, DDoS prevention
4. Internal NetworkEast-west trafficData encryption in transit, filtering, micro-segmentation
5. HostOperating systemsAutomated patching, endpoint AV, OS hardening
6. ApplicationsSoftware layerAI/ML anomaly detection, least privilege, encryption
7. DataThe data itselfAI detection, access controls, encryption at rest, immutability
flowchart TD L1["Layer 1: Human\nTraining, RBAC, SSO, MFA"] L2["Layer 2: Physical\nGuards, Biometrics, Fire Suppression"] L3["Layer 3: Perimeter\nFirewalls, Vulnerability Testing, DDoS Prevention"] L4["Layer 4: Internal Network\nEncryption in Transit, Micro-Segmentation"] L5["Layer 5: Host\nOS Hardening, Patching, Endpoint AV"] L6["Layer 6: Applications\nAI/ML Anomaly Detection, Least Privilege"] L7["Layer 7: Data\nEncryption at Rest, Access Controls, Immutability"] L1 --> L2 --> L3 --> L4 --> L5 --> L6 --> L7

Four Pillars of Threat Defense

Pillar 1: Data Resiliency -- Immutability (DataLock WORM), FIPS-validated AES-256 encryption at rest and in transit, fault tolerance through distributed architecture with strict consistency.

Pillar 2: Access Control -- MFA, granular RBAC, Quorum Authorization (two-person approval for destructive operations), continuous monitoring with SIEM/SOAR integration.

Pillar 3: AI-Driven Detection -- Data classification to find sensitive data, adaptive behavioral analytics for anomaly detection, near real-time threat detection with native AV and Google-powered threat intelligence, custom YARA rules.

Pillar 4: Extensibility -- Integrations with Cisco SecureX, Tenable, and broader cloud/endpoint/identity/SIEM/SOAR ecosystem.

Animation: Four Pillars of Threat Defense Building on SpanFS
Post-Quiz: Threat Defense Architecture

1. Which defensive layer in Cohesity's defense-in-depth model addresses east-west traffic with encryption and micro-segmentation?

Perimeter Host Internal Network Applications

2. A single compromised administrator account attempts to delete all backup policies. Which Cohesity feature prevents this?

DataLock WORM Security Advisor scanning Quorum Authorization (two-person approval) Global Deduplication

3. Which Threat Defense pillar specifically addresses data exfiltration through behavioral analytics and threat intelligence?

Pillar 1: Data Resiliency Pillar 2: Access Control Pillar 3: AI-Driven Detection and Analytics Pillar 4: Extensibility

4. What does DataLock provide?

Encryption of data in transit using TLS 1.3 Time-bound WORM capability preventing modification or deletion before lock expiry Real-time threat detection using YARA rules Integration with third-party SIEM platforms

5. How does Cohesity's Threat Defense Architecture align with industry frameworks?

It follows ISO 27001 exclusively It aligns with the NIST Cybersecurity Framework and addresses three stages of ransomware evolution It is based solely on the MITRE ATT&CK framework It follows PCI DSS controls only

1.2b Security Advisor & Data Resilience vs. Data Security

Pre-Quiz: Security Advisor

1. What is the core workflow of Cohesity Security Advisor?

Deploy, configure, monitor Scan, score, remediate Detect, isolate, recover Encrypt, backup, archive

2. A backup system can survive any hardware failure and recover data perfectly, but any user on the network can read the backup files. What security dimension is missing?

Data resilience Data availability Data security (confidentiality and access control) Data deduplication

3. Security Advisor is available to Cohesity customers at what cost?

It requires a premium security license It is included with DataProtect but not SmartFiles No additional cost -- available to all customers globally It requires purchasing the Threat Defense add-on

Key Points

Data Resilience vs. Data Security

Data resilience ensures data survives hardware failure, corruption, disaster, or ransomware encryption. It answers: "Can we get our data back?"

Data security ensures unauthorized parties cannot read, modify, or exfiltrate data. It answers: "Is our data safe from unauthorized access?"

A backup system with strong resilience but weak security is like a bank vault with an indestructible door but no lock. Cohesity addresses both: Pillar 1 ensures recoverability, while Pillars 2-4 ensure security.

Security Advisor

Security Advisor scans the Cohesity environment and produces a quantitative security posture score. It evaluates access control settings, audit logs, encryption, and more. Administrators can drill into details and receive specific remediation recommendations.

flowchart LR A["Run Security\nAdvisor Scan"] --> B["Receive Security\nPosture Score"] B --> C{"Score\nAcceptable?"} C -->|Yes| D["Monitor &\nMaintain"] C -->|No| E["Review Detailed\nRecommendations"] E --> F["Remediate\nConfiguration Gaps"] F --> A D -.->|"Periodic Rescan"| A

Worked Example: A new branch cluster scores 62/100. Security Advisor flags: MFA not enabled, audit logs not forwarded to SIEM, backup policies missing DataLock. After remediation, the score rises to 91/100.

Post-Quiz: Security Advisor

1. What is the core workflow of Cohesity Security Advisor?

Deploy, configure, monitor Scan, score, remediate Detect, isolate, recover Encrypt, backup, archive

2. A backup system can survive any hardware failure and recover data perfectly, but any user on the network can read the backup files. What security dimension is missing?

Data resilience Data availability Data security (confidentiality and access control) Data deduplication

3. Security Advisor is available to Cohesity customers at what cost?

It requires a premium security license It is included with DataProtect but not SmartFiles No additional cost -- available to all customers globally It requires purchasing the Threat Defense add-on

1.3 COH350 Exam Domain Overview

Pre-Quiz: Exam Domains

1. Which three exam domains together account for over half (54%) of the COH350 exam?

Security Assessment, Incident Response, Monitoring & Reporting System Hardening, User & Access Management, Network Security Secure Data Management, Network Security, Security Assessment Monitoring & Reporting, System Hardening, Incident Response

2. The COH350 exam has 60 questions in 90 minutes. What is the passing score?

70% (42 correct) 80% (48 correct) 60% (36 correct) 50% (30 correct)

Key Points

Seven Exam Domains

DomainWeightTopics
System Hardening22%WORM storage, encryption, attack surface reduction, system access security
User & Access Management17%MFA, SSO, RBAC, Active Directory, multi-tenancy, quorum groups
Network Security15%Protocol access control, encryption of backup data in transit
Security Assessment13%Compliance, data retention, attack protection, Zero Trust
Incident Response & Remediation13%Recovery procedures, clean room operations
Monitoring & Reporting10%Audit logging, syslog, ransomware monitoring, alerts
Secure Data Management10%Data isolation methods, cyber vaulting

Exam Logistics

DetailSpecification
Duration90 minutes
Questions60
Passing score60% (36 correct)
Cost$200 USD
Validity2 years

Study Strategy

  1. Start with System Hardening (22%) -- heaviest domain, foundational topics pay dividends across other domains.
  2. Follow with User & Access Management (17%) and Network Security (15%) -- these three domains = 54% of the exam.
  3. Study Security Assessment (13%) and Incident Response (13%) together -- both connect security policies to operations.
  4. Finish with Monitoring (10%) and Secure Data Management (10%) -- important but narrower scope.
Post-Quiz: Exam Domains

1. Which three exam domains together account for over half (54%) of the COH350 exam?

Security Assessment, Incident Response, Monitoring & Reporting System Hardening, User & Access Management, Network Security Secure Data Management, Network Security, Security Assessment Monitoring & Reporting, System Hardening, Incident Response

2. The COH350 exam has 60 questions in 90 minutes. What is the passing score?

70% (42 correct) 80% (48 correct) 60% (36 correct) 50% (30 correct)

1.4 Security Fundamentals for Data Management

Pre-Quiz: Security Fundamentals

1. In a ransomware attack, the attacker encrypts all production data and threatens to publish it online. Which two elements of the CIA triad are under attack?

Confidentiality and Integrity Availability and Confidentiality Integrity and Availability Only Availability

2. Under Zero Trust, a backup operator with valid credentials and MFA wants to delete a protected backup policy. What additional control does Cohesity enforce?

The operator must connect from the corporate VPN A second administrator must approve via Quorum Authorization The deletion is automatically scheduled for 30 days later No additional control; valid credentials and MFA are sufficient

3. Which regulatory framework provides the Identify, Protect, Detect, Respond, Recover structure that Cohesity explicitly aligns to?

GDPR HIPAA NIST Cybersecurity Framework PCI DSS

4. Which CIA triad principle is most directly addressed by Cohesity's DataLock (WORM) feature?

Confidentiality Integrity Availability Non-repudiation

5. A financial services firm must maintain immutable audit trails for financial records. Which regulation drives this requirement?

HIPAA GDPR SOX (Sarbanes-Oxley) PCI DSS

Key Points

CIA Triad in Backup & Recovery

PrincipleGeneral DefinitionApplication to Backup & Recovery
ConfidentialityOnly authorized parties can access dataEncryption at rest/in transit; RBAC and MFA
IntegrityData has not been tampered withDataLock WORM; checksums verify no alteration
AvailabilityData is accessible when neededFault tolerance; recovery meets RTO/RPO targets
flowchart TD subgraph Attack["Ransomware Attack Vectors"] A1["Encrypt Data\n(Destroy Availability)"] A2["Threaten to Leak\n(Violate Confidentiality)"] A3["Alter Records\n(Compromise Integrity)"] end subgraph Defense["Cohesity Threat Defense Response"] D1["Immutable Backups\n+ Fault Tolerance"] D2["AES-256 Encryption\n+ RBAC + MFA"] D3["DataLock WORM\n+ Checksums"] end A1 -->|"Countered by"| D1 A2 -->|"Countered by"| D2 A3 -->|"Countered by"| D3

Zero Trust Principles

Regulatory Landscape

RegulationScopeRelevance to Data Protection
NIST CSFUS federal & critical infrastructureIdentify, Protect, Detect, Respond, Recover -- Cohesity's primary alignment framework
GDPREU personal dataEncryption, access controls, right to deletion
HIPAAUS healthcareEncryption, audit logging, access controls for PHI
SOXUS public companiesImmutable audit trails, data retention for financial records
PCI DSSPayment card dataEncryption, access control, network segmentation
Post-Quiz: Security Fundamentals

1. In a ransomware attack, the attacker encrypts all production data and threatens to publish it online. Which two elements of the CIA triad are under attack?

Confidentiality and Integrity Availability and Confidentiality Integrity and Availability Only Availability

2. Under Zero Trust, a backup operator with valid credentials and MFA wants to delete a protected backup policy. What additional control does Cohesity enforce?

The operator must connect from the corporate VPN A second administrator must approve via Quorum Authorization The deletion is automatically scheduled for 30 days later No additional control; valid credentials and MFA are sufficient

3. Which regulatory framework provides the Identify, Protect, Detect, Respond, Recover structure that Cohesity explicitly aligns to?

GDPR HIPAA NIST Cybersecurity Framework PCI DSS

4. Which CIA triad principle is most directly addressed by Cohesity's DataLock (WORM) feature?

Confidentiality Integrity Availability Non-repudiation

5. A financial services firm must maintain immutable audit trails for financial records. Which regulation drives this requirement?

HIPAA GDPR SOX (Sarbanes-Oxley) PCI DSS

Your Progress

Answer Explanations