Chapter 3: System Hardening — WORM Storage & Encryption

Learning Objectives

Pre-Quiz: Test Your Current Knowledge

Answer these questions before studying the material. Do not worry about getting them wrong — this measures your starting point.

Pre-Quiz — WORM Storage Technology

1. An attacker compromises a Cohesity cluster admin account. Which mechanism prevents them from deleting WORM-protected backups?

RBAC policies that restrict the admin role from deletion
DataLock retention locks that are enforced regardless of user role
Network segmentation that blocks deletion API calls
Encryption that makes the data unreadable to the attacker

2. A financial firm operating under SEC Rule 17a-4(f) enables Enterprise mode DataLock. Six months later, auditors require Compliance mode. What is the correct transition path?

Disable Enterprise mode first, then enable Compliance mode
Upgrade directly from Enterprise mode to Compliance mode (one-way)
Deploy a new cluster in Compliance mode and migrate data
Contact Cohesity support to perform a mode switch

3. A legal team requests that specific backup snapshots from last quarter be preserved indefinitely for ongoing litigation. Which feature should be used?

Extend the DataLock retention policy to 99 years
Place a legal hold on the specific snapshots
Disable garbage collection on the cluster
Replicate the snapshots to FortKnox
Pre-Quiz — Encryption & Key Management

4. Why does Cohesity use a two-tier DEK/KEK architecture with external KMS rather than storing a single encryption key on-cluster?

To double the encryption strength from AES-128 to AES-256
To ensure the data encryption key is never stored in plaintext alongside encrypted data
To allow multiple users to decrypt data with different passwords
To reduce the computational cost of encryption operations

5. During a key rotation event on a Cohesity cluster, what happens to existing encrypted data?

All data is re-encrypted with the new key during a maintenance window
Data remains encrypted with its original key; only new writes use the new key
The old key is destroyed and a migration process converts all data
A background process gradually re-encrypts data over the next 90 days

Section 1: WORM Storage Technology

WORM (Write Once Read Many) storage ensures that once data is committed, it becomes immutable for a defined retention period. Unlike access-control-based protection that can be bypassed with stolen credentials, WORM makes it so nobody can delete data until the retention clock expires.

SpanFS: Immutability at the Foundation

Cohesity's immutability starts at the filesystem layer. SpanFS stores all backup snapshots in a read-only state within internal Views that are inaccessible from outside the cluster. Every incremental backup is written to a zero-cost clone marked read-only upon completion. When a restore is requested, the system clones the internal view before exposing it, keeping the original untouched.

Cohesity Ransomware Defense: Three Phases

PhaseCapabilityHow It Works
PreventImmutable filesystem with DataLock and WORMBackup data cannot be modified or deleted during retention
DetectMachine-learning anomaly detectionContinuously monitors backups for anomalies; recommends last known clean copy
RespondInstant mass restoreScalable restoration capabilities enable rapid recovery at scale
flowchart LR A["Prevent\nImmutable Filesystem\nDataLock & WORM"] --> B["Detect\nML Anomaly Detection\nIdentify Clean Copy"] B --> C["Respond\nInstant Mass Restore\nRapid Recovery"] style A fill:#2d6a4f,color:#fff,stroke:#1b4332 style B fill:#e9c46a,color:#000,stroke:#b08c2a style C fill:#264653,color:#fff,stroke:#1a323d

DataLock: Policy-Driven Immutability

DataLock applies a role-based lock to backup snapshots, storing them in WORM format with a "Lock Until" expiration date. During retention, the snapshot cannot be deleted by anyone — including cluster administrators. Only a user with the Data Security RBAC role can manage DataLock policies, enforcing separation of duties.

sequenceDiagram participant DS as Data Security User participant PP as Protection Policy participant PR as Protection Run participant SN as Snapshot DS->>PP: Enable DataLock (30-day retention) PP->>PR: Policy applied to scheduled run PR->>SN: Snapshot created SN->>SN: Lock applied (Lock Until = now + 30 days) Note over SN: Days 1-30: DELETE DENIED for all users SN->>SN: Lock expires after 30 days Note over SN: Day 31+: Normal retention policies resume

Compliance Mode vs. Enterprise Mode

FeatureCompliance ModeEnterprise Mode
Protection levelDisk-level WORMFile-level WORM
Regulatory complianceSEC 17a-4(f), FINRA 4511(c), CFTC 1.31No regulatory designation
Deletion during retentionNo user can delete or modifyRoot user can delete
Who manages settingsData Security role onlyAdmin or Data Security role
Mode switchingCannot downgrade (one-way)Can upgrade to Compliance (one-way)
stateDiagram-v2 [*] --> Disabled: Initial state Disabled --> EnterpriseMode: Enable Enterprise Disabled --> ComplianceMode: Enable Compliance EnterpriseMode --> ComplianceMode: One-way upgrade allowed ComplianceMode --> ComplianceMode: Cannot downgrade or disable

DataLock vs. Legal Hold

CharacteristicDataLockLegal Hold
TriggerAutomatic (policy-based)Manual (event-driven)
DurationTime-bound (defined retention)Indefinite (until removed)
ScopeAll snapshots matching a policySpecific selected snapshots
Primary use caseRegulatory compliance, ransomware protectionLitigation, investigations, audits
When configuredBefore data is created (proactive)After data exists (reactive)
💾 Write 🔒 Lock 🔓 Expire
Animation: WORM Snapshot Lifecycle — Data is written, locked for the retention period, then the lock expires

Key Points — WORM Storage

Section 2: Data-at-Rest Encryption

While WORM protects data from deletion, encryption protects it from being read. Cohesity encrypts all data at rest using AES-256-GCM (Advanced Encryption Standard, 256-bit keys, Galois/Counter Mode).

AES-256-GCM: What Each Part Means

Software vs. Hardware Encryption

ApproachMechanismAdvantage
Software-based (primary)Runs on cluster nodes using Intel AES-NI hardware accelerationNo hardware dependency; drives can be replaced without affecting FIPS certification
Self-Encrypting Drives (SEDs)Dedicated encryption hardware built into the physical driveDefense-in-depth: protects data even if software encryption is bypassed
PLAINTEXT DATA AES-256-GCM + Key CIPHERTEXT
Animation: Data-at-rest encryption flow — plaintext is encrypted with AES-256-GCM to produce ciphertext

Encryption Scope: Per-View-Box Keys

Cohesity manages encryption keys at the View Box (storage domain) level. Each View Box maintains independent encryption keys, providing workload isolation. If one View Box's keys were compromised, data in other View Boxes remains protected. This is especially valuable in multi-tenant environments where cryptographic isolation between tenants is required.

Key Points — Encryption

Section 3: Key Management

Encryption is only as strong as the protection of its keys. Cohesity supports both an internal KMS for simplicity and external KMS via KMIP for stronger separation of keys from data.

Internal KMS

The built-in Internal KMS automatically generates encryption keys and stores them as encrypted keys on the cluster's SSDs. It requires no additional infrastructure. However, since keys reside on the same system as encrypted data, it is analogous to locking your house and leaving the key under the doormat — adequate for basic needs but not for high-security requirements.

External KMS via KMIP

For stronger security, Cohesity integrates with external KMS systems through KMIP (Key Management Interoperability Protocol):

The DEK/KEK Architecture

With external KMS, Cohesity uses a two-tier key architecture:

ComponentWhat It IsWhere It Lives
DEK (Data Encryption Key)Directly encrypts/decrypts dataGenerated by cluster; cached in memory
EDEK (Encrypted DEK)The DEK encrypted with the KEKStored on cluster (encrypted form)
KEK (Key Encryption Key)Master key that encrypts/decrypts the DEKExternal KMS only
KEK IDPointer to the KEKStored on cluster
sequenceDiagram participant Svc as Cluster Service participant Cluster as Cohesity Cluster participant KMS as External KMS Svc->>Cluster: Request data access Cluster->>Cluster: Retrieve EDEK and KEK ID Cluster->>KMS: Send KEK ID via KMIP KMS->>KMS: Look up KEK by ID KMS->>Cluster: Return KEK Cluster->>Cluster: Decrypt EDEK with KEK to obtain DEK Cluster->>Cluster: Cache DEK in memory Cluster->>Svc: Return decrypted data Note over Cluster: DEK cached; subsequent reads skip KMS

Key Rotation

Key Escrow and Disaster Recovery

Key Points — Key Management

Section 4: Immutability Best Practices

Layered Immutability Strategy

Best practice is defense-in-depth with immutability at multiple layers:

LayerMechanismProtection
Layer 1: Primary ClusterOn-cluster DataLockLocal snapshots locked; first line of defense
Layer 2: Replicated ClusterPolicy-based air gap + DataLock on targetGeographic separation; second admin domain
Layer 3: Cyber VaultCohesity FortKnoxNetwork-isolated, Cohesity-managed cloud vault
flowchart LR SRC["Production\nData Source"] --> L1 subgraph L1["Layer 1: Primary Cluster"] L1A["Local Snapshots\nDataLock Protected"] end L1 -->|"Auto\nReplication"| L2 subgraph L2["Layer 2: Replicated Cluster"] L2A["Remote Snapshots\nDataLock Protected"] end L2 -->|"Vault\nCopy"| L3 subgraph L3["Layer 3: FortKnox Vault"] L3A["Network-Isolated\nCyber Vault Copy"] end style L1 fill:#d4edda,stroke:#28a745 style L2 fill:#cce5ff,stroke:#007bff style L3 fill:#f8d7da,stroke:#dc3545

An attacker would need to simultaneously compromise three separate administrative domains with different access controls, network isolation, and geographic locations — an effectively impossible scenario.

Compliance Requirements: SEC, FINRA, CFTC

RegulationRequirementRequired Mode
SEC Rule 17a-4(f)Records in non-rewriteable, non-erasable formatCompliance mode
FINRA Rule 4511(c)Records preserved in WORM formatCompliance mode
CFTC Regulation 1.31(c)-(d)Compliance-grade storage for trading recordsCompliance mode

Cohesity's Compliance mode has been independently assessed by Cohasset Associates. Key planning considerations:

Testing and Validating Immutability

Immutability is not "set and forget." Validate quarterly:

  1. Attempt to delete a DataLock-protected snapshot with admin credentials — confirm denial
  2. Verify only Data Security role users can modify DataLock policies
  3. Create a test snapshot with short retention; confirm it becomes deletable only after expiry
  4. Place a legal hold, let normal retention expire, verify snapshot is preserved
  5. Verify DataLock enforcement on replicated copies at the target cluster
  6. Confirm encryption status for all View Boxes in the cluster dashboard
  7. If using external KMS cluster, disable one server and verify continued data access

Key Points — Best Practices

Post-Quiz: Test Your Understanding

Now that you have studied the material, answer these questions again along with new ones. Compare your results with the pre-quiz.

Post-Quiz — WORM Storage Technology

1. An attacker compromises a Cohesity cluster admin account. Which mechanism prevents them from deleting WORM-protected backups?

RBAC policies that restrict the admin role from deletion
DataLock retention locks that are enforced regardless of user role
Network segmentation that blocks deletion API calls
Encryption that makes the data unreadable to the attacker

2. A financial firm operating under SEC Rule 17a-4(f) enables Enterprise mode DataLock. Six months later, auditors require Compliance mode. What is the correct transition path?

Disable Enterprise mode first, then enable Compliance mode
Upgrade directly from Enterprise mode to Compliance mode (one-way)
Deploy a new cluster in Compliance mode and migrate data
Contact Cohesity support to perform a mode switch

3. A legal team requests that specific backup snapshots from last quarter be preserved indefinitely for ongoing litigation. Which feature should be used?

Extend the DataLock retention policy to 99 years
Place a legal hold on the specific snapshots
Disable garbage collection on the cluster
Replicate the snapshots to FortKnox

4. What is the fundamental difference between how WORM and traditional access controls protect backup data?

WORM uses encryption while access controls use authentication
Access controls restrict who can delete; WORM prevents anyone from deleting until retention expires
WORM only protects against external threats while access controls protect against internal threats
WORM requires additional hardware while access controls are software-only

5. In Compliance mode, who can manage DataLock settings, and why is this restriction important?

Any cluster administrator, because they need full control for operations
Only users with the Data Security role, enforcing separation of duties so a compromised admin account alone cannot alter WORM policies
Only Cohesity support engineers, ensuring vendor oversight of compliance settings
Both admin and Data Security roles, with two-person approval required
Post-Quiz — Encryption & Key Management

6. Why does Cohesity use a two-tier DEK/KEK architecture with external KMS rather than storing a single encryption key on-cluster?

To double the encryption strength from AES-128 to AES-256
To ensure the data encryption key is never stored in plaintext alongside encrypted data
To allow multiple users to decrypt data with different passwords
To reduce the computational cost of encryption operations

7. During a key rotation event on a Cohesity cluster, what happens to existing encrypted data?

All data is re-encrypted with the new key during a maintenance window
Data remains encrypted with its original key; only new writes use the new key
The old key is destroyed and a migration process converts all data
A background process gradually re-encrypts data over the next 90 days

8. A managed service provider hosts backup data for multiple clients on a single Cohesity cluster. How does Cohesity's encryption architecture ensure client data isolation?

Each client gets a separate physical cluster with its own encryption
Each View Box maintains independent encryption keys, providing cryptographic isolation per tenant
All clients share a single encryption key but use separate RBAC policies
Client data is encrypted in transit but stored unencrypted at rest

9. An organization loses access to their external KMS and all KEK backups. What is the impact on their encrypted Cohesity data?

Data is temporarily inaccessible but can be recovered by resetting the cluster
Data is permanently unrecoverable because the DEKs cannot be decrypted without the KEK
Cohesity has a master recovery key that can decrypt all data
The cached DEKs in memory will continue working indefinitely

10. Why does Cohesity use software-based encryption with Intel AES-NI rather than relying solely on self-encrypting drives?

Software encryption is more secure than hardware encryption
It removes hardware dependency so drives can be replaced without affecting FIPS certification
Self-encrypting drives are not compatible with Cohesity's filesystem
Software encryption is faster than hardware encryption
Post-Quiz — Immutability Best Practices

11. Why does a layered immutability strategy (DataLock + replication + FortKnox) provide stronger protection than DataLock alone?

Because DataLock alone does not actually prevent deletion
Because each layer uses a different administrative domain and network boundary, requiring simultaneous compromise of all three
Because FortKnox uses a different encryption algorithm than the primary cluster
Because replication doubles the encryption key length

12. An organization enables Compliance mode DataLock but later realizes they do not actually need regulatory compliance. What are their options?

Downgrade to Enterprise mode since they do not need compliance features
They must continue operating in Compliance mode because it cannot be downgraded or disabled once enabled
Disable DataLock entirely and re-enable in Enterprise mode
Contact Cohasset Associates to remove the compliance designation

Your Progress

Answer Explanations