Evaluate Cohesity cluster security posture against compliance frameworks
Configure data retention policies aligned with regulatory requirements
Implement legal hold procedures for e-discovery and compliance
Integrate Cohesity with third-party security solutions for Zero Trust architecture
Pre-Quiz: Test Your Current Knowledge
Answer these questions before studying the material. You will see the same questions again at the end to measure what you learned.
Pre-Quiz — Section 1: Compliance and Regulatory Frameworks
1. Which Cohesity feature helps enforce GDPR's data minimization principle by ensuring data is not kept longer than necessary?
A. YARA rulesB. Automated retention policiesC. FortKnox virtual air gapD. Cortex XSOAR playbooks
2. What does a SOC 2 Type II audit evaluate that a Type I audit does not?
A. Whether cryptographic modules meet FIPS standardsB. Whether controls existed at a single point in timeC. Whether controls operated effectively over a sustained periodD. Whether the platform is authorized for federal cloud adoption
3. When preparing evidence for a HIPAA audit on Cohesity, which step involves using ML-based data classification?
A. Exporting RBAC configurationB. Running a scan to locate where PHI resides across backup environmentsC. Documenting AES-256 encryption settingsD. Pulling user audit trail logs for the review period
Pre-Quiz — Section 2: Data Retention and Legal Holds
4. What happens to backup snapshots when a legal hold is applied in Cohesity?
A. Snapshots are immediately moved to FortKnoxB. Normal retention expiration is suspended and data is preservedC. Snapshots are encrypted with an additional key layerD. Snapshots are replicated to a secondary cluster
5. How does DataLock differ from a standard retention policy?
A. DataLock applies only to archived data, not local snapshotsB. DataLock prevents deletion or modification even by administratorsC. DataLock automatically classifies data using MLD. DataLock replaces the need for Quorum authorization
Pre-Quiz — Section 3: Zero Trust Design Principles
6. Which of the four pillars of Cohesity's Threat Defense architecture addresses SIEM and SOAR integrations?
A. Data ResiliencyB. Access ControlC. Detection & AnalyticsD. Extensibility
7. What is the purpose of Quorum authorization in Cohesity's Zero Trust model?
A. It encrypts data using multiple keys simultaneouslyB. It requires multiple authorized individuals to approve critical operationsC. It distributes backup data across multiple geographic regionsD. It scans backup data for malware using multiple engines
8. Why is source-side anomaly detection significant compared to backup-cycle detection?
A. It uses less storage spaceB. It provides earlier identification of threats rather than waiting for the next backupC. It replaces the need for YARA rulesD. It only works with cloud-based workloads
9. In the Cohesity-Microsoft Sentinel integration, what component serves as the data connector between Helios and Sentinel?
A. A Cortex XSOAR playbookB. An Azure Function AppC. A Cohesity SpanFS ViewD. A CrowdStrike Falcon sensor
10. What is the primary difference between SIEM and SOAR platforms in a security operations workflow?
A. SIEM handles encryption while SOAR handles access controlB. SIEM focuses on detection and analysis while SOAR automates the responseC. SIEM is cloud-only while SOAR is on-premises onlyD. SIEM replaces SOAR in modern security architectures
11. Which tool does Cohesity support for creating custom threat detection rules to hunt for specific indicators of compromise in backup data?
A. Sigma rulesB. Snort signaturesC. YARA rulesD. Suricata patterns
12. Which Cohesity feature provides a "virtual air gap" by isolating backup copies in a separate Cohesity-managed environment?
A. DataLock WORMB. Security AdvisorC. FortKnoxD. Quorum
Section 1: Compliance and Regulatory Frameworks
Organizations managing sensitive data must comply with a growing web of regulations. Think of a compliance framework as a blueprint for a building's safety systems: it specifies what protections are required, how they must be tested, and what evidence proves they are in place.
GDPR, HIPAA, SOX, and PCI-DSS Requirements
Each regulatory framework emphasizes different aspects of data protection, but they share common themes: encryption, access control, auditability, and data minimization.
Framework
Focus Area
Key Requirements
Cohesity Capability
GDPR
EU personal data protection
Data minimization, right to erasure, breach notification
DPA, automated retention, AES-256, MFA, ML classification
HIPAA
Protected health information
Encryption at rest/transit, access controls, audit logs
AES-256, granular RBAC, user audit trails
SOX
Financial record integrity
Internal controls, audit trails, data retention
Immutable snapshots, DataLock WORM, audit logging
PCI-DSS
Payment card data
Encryption, access restriction, monitoring
AES-256, RBAC, SIEM integration, ML classification
graph LR
subgraph Frameworks
GDPR["GDPR"]
HIPAA["HIPAA"]
SOX["SOX"]
PCI["PCI-DSS"]
end
subgraph Common_Requirements
ENC["Encryption"]
AC["Access Control"]
AUD["Auditability"]
DM["Data Minimization"]
end
subgraph Cohesity_Capabilities
AES["AES-256 Encryption\n(FIPS-validated)"]
RBAC["Granular RBAC\n+ MFA"]
TRAIL["User Audit Trails\n+ Security Advisor"]
RET["Automated Retention\nPolicies"]
end
GDPR --> ENC & AC & AUD & DM
HIPAA --> ENC & AC & AUD
SOX --> AUD & DM
PCI --> ENC & AC & AUD
ENC --> AES
AC --> RBAC
AUD --> TRAIL
DM --> RET
Mapping Cohesity Features to Compliance Requirements
Cohesity maintains an extensive set of security certifications that serve as independent validation:
Certification
Description
SOC 2 Type II
Annual audit evaluating security, availability, and confidentiality controls over a sustained period
ISO 27001
ISO/IEC 27001:2022 certification for information security management
FIPS 140-2
Cryptographic module validated at Level 1 standard
Common Criteria
Certified at EAL2+ ALC_FLR.1
FedRAMP Moderate
Authorized for federal cloud adoption
DoD Authorization
Authorization to Operate for DoD, DoE, and intelligence networks
Analogy: Think of certifications like a restaurant's health inspection grades posted in the window. A SOC 2 Type II audit does not just check that controls exist on a single day -- it evaluates whether they operated effectively over a sustained period, like a health inspector returning multiple times throughout the year.
Compliance Reporting and Audit Evidence
Passing an audit requires proving controls are in place. Cohesity supports this through:
User Audit Trails -- comprehensive logs of every login, configuration change, data access, and administrative action
ML-Based Data Classification -- identifies PII, PHI, and payment card data across backup environments
Security Advisor -- continuous security posture assessment with a dashboard view of cluster configuration against best practices
Worked Example: Preparing for a HIPAA Audit
Encryption verification -- document AES-256 encryption for data at rest and in transit
Access control documentation -- export RBAC configuration and MFA enforcement status
Data classification report -- run ML scan to locate all PHI across the backup environment
Audit trail export -- pull user access logs for the review period
Cohesity maps to GDPR, HIPAA, SOX, and PCI-DSS through platform certifications (SOC 2 Type II, ISO 27001, FIPS 140-2, FedRAMP), built-in security features (AES-256, RBAC, audit trails), and ML-based data classification.
DataLock WORM is assessed as compliant with SEC 17a-4(f) and FINRA Rule 4511(c) for financial services.
Section 2: Data Retention and Legal Holds
Data retention is the practice of keeping data for a defined period. Getting it wrong creates risk in both directions: delete too early and you violate regulations; keep too long and you increase storage costs and attack surface.
Configuring Retention Policies and Schedules
Analogy: A retention policy is like an expiration date on food packaging. Just as a grocery store removes expired products from shelves, Cohesity automatically expires snapshots once they pass their retention period.
Parameter
Description
Example
Backup frequency
How often snapshots are created
Daily at 2:00 AM
Local retention
How long snapshots stay on primary cluster
30 days
Archival retention
How long copies are kept in archive
7 years
Replication retention
How long copies are kept on remote cluster
90 days
Policy assignment
Which protection groups use this policy
"HIPAA-Regulated-Workloads"
Implementing Legal Holds for E-Discovery
A legal hold (litigation hold) is a directive to preserve all data relevant to pending or anticipated litigation. When active, normal retention expiration is suspended -- data must not be deleted regardless of policy.
E-discovery is the process by which electronically stored information is identified, collected, and produced for legal proceedings. Cohesity's legal hold ensures relevant backup data remains available and unaltered.
Worked Example: Implementing a Legal Hold
Identify relevant data -- determine which protection groups, sources, or time ranges are relevant
Apply legal hold -- overrides normal retention policy, preventing automatic expiration
Document the hold -- record scope, date, authorizer, and related legal matter
Monitor the hold -- verify held snapshots remain intact; audit trail confirms no modification
Release the hold -- once legal matter concludes, snapshots resume normal retention lifecycle
DataLock (Retention Lock) and WORM Protection
DataLock is Cohesity's implementation of time-bound WORM (Write Once Read Many) protection. It prevents snapshots from being deleted or modified before their lock period expires -- even by administrators.
Combined with Quorum (multi-person approval for critical changes), DataLock creates a robust chain of custody. No single individual can circumvent retention controls, and the platform contains no service back-doors.
Analogy: DataLock is like a time-locked safe at a bank. Once something is placed inside and the timer is set, nobody -- not even the bank manager -- can open it until the timer expires.
Data Lifecycle Management
Creation -- protection policies define when snapshots are taken and how many copies are created
Expiration -- snapshots past retention period (with no legal hold) are automatically deleted
Compliance verification -- audit trails record every retention event
Animation Slot 1: Data lifecycle flow showing a snapshot moving through creation, tiering, legal hold override, and eventual expiration with audit trail logging at each stage.
Retention policies automate data lifecycle; legal holds override expiration for e-discovery preservation.
DataLock provides WORM protection that no single administrator can bypass.
Quorum ensures multi-person approval for critical retention changes -- no service back-doors.
Section 3: Zero Trust Design Principles
Zero Trust is a security model based on "never trust, always verify." Unlike perimeter-based security that assumes everything inside the network is safe, Zero Trust treats every access request as potentially hostile.
Analogy: Traditional security is like a castle with a moat -- once you cross the drawbridge, you are trusted everywhere. Zero Trust is like a modern high-security building where every door requires a badge scan, every floor requires separate authorization, and cameras monitor continuously.
Four Pillars of Cohesity's Threat Defense Architecture
FortKnox adds SaaS-based data isolation functioning as a "virtual air gap." Even if an attacker compromises the primary cluster, FortKnox-isolated copies remain safe in a separate Cohesity-managed environment.
Microsegmentation and Least-Privilege Access
Microsegmentation in Cohesity means access is compartmentalized so compromising one credential does not grant access to all data:
Granular RBAC -- privileges assigned by role; a backup operator cannot modify security settings
Quorum Authorization -- critical operations require approval from two or more authorized individuals; no service back-doors
Quorum eliminates single points of compromise -- no individual can authorize critical operations alone.
Source-side anomaly detection catches threats earlier than backup-cycle-only detection.
Section 4: Third-Party Security Integration
Modern SOCs aggregate alerts from dozens of sources. Cohesity's Extensibility pillar ensures backup intelligence flows into the broader security ecosystem.
SIEM Integration
A SIEM (Security Information and Event Management) platform collects, correlates, and analyzes security events. Integrating Cohesity means backup anomalies and ransomware alerts appear alongside firewall logs and endpoint alerts.
Microsoft Sentinel Integration
The architecture uses an Azure Function App as the data connector between Cohesity Helios and Microsoft Sentinel's Log Analytics Workspace.
Deploy the Cohesity Data Connector from Azure Marketplace
Configure Cohesity cluster credentials in the Function App
Set Function App authentication parameters
Establish Log Analytics workspace connectivity
Customize alert routing rules
SOAR Integration for Automated Response
SOAR (Security Orchestration, Automation, and Response) automates incident response through playbooks triggered by security alerts.
Analogy: SIEM is a building's security camera system -- it records and alerts. SOAR is the automated response that triggers sprinklers, sounds alarms, unlocks exits, and calls the fire department -- all within seconds.
Cortex XSOAR Integration Pipeline
Detection -- Cohesity Helios monitors with AI; detects encryption spikes or unusual change rates
Automated Triage -- XSOAR initiates playbooks to assess scope and severity
Recovery -- locate and restore clean data from immutable backups
sequenceDiagram
participant C as Cohesity Helios
participant X as Cortex XSOAR
participant T as Security Team
participant R as Recovery
C->>C: AI monitors backup data
C->>C: Detects anomaly
C->>X: Sends alert with context
X->>X: Initiates triage playbook
X->>T: Notifies incident response team
X->>X: Isolates affected systems
T->>R: Confirms attack, authorizes recovery
R->>C: Locates clean immutable backup
C->>R: Restores from pre-attack snapshot
R->>T: Recovery complete
Animation Slot 2: SOAR automated response pipeline showing the timeline from anomaly detection through automated triage, team notification, and recovery with time indicators at each stage.
Antivirus and Malware Scanning
Native Next-Gen Antivirus -- built-in engines scan backup data for known ransomware/malware
Custom YARA Rules -- security teams create custom detection rules for specific IOCs
SIEM (Sentinel, Splunk) for centralized monitoring; SOAR (XSOAR, ServiceNow) for automated response.
Integrations create a feedback loop: Cohesity shares backup intelligence with security tools, and those tools feed threat intelligence back.
The Cohesity Marketplace is the central hub for security integrations across endpoint, network, and vulnerability domains.
Post-Quiz: Test What You Learned
Answer the same questions again now that you have studied the material. Click "Complete Session" when finished to compare your scores.
Post-Quiz — Section 1: Compliance and Regulatory Frameworks
1. Which Cohesity feature helps enforce GDPR's data minimization principle by ensuring data is not kept longer than necessary?
A. YARA rulesB. Automated retention policiesC. FortKnox virtual air gapD. Cortex XSOAR playbooks
2. What does a SOC 2 Type II audit evaluate that a Type I audit does not?
A. Whether cryptographic modules meet FIPS standardsB. Whether controls existed at a single point in timeC. Whether controls operated effectively over a sustained periodD. Whether the platform is authorized for federal cloud adoption
3. When preparing evidence for a HIPAA audit on Cohesity, which step involves using ML-based data classification?
A. Exporting RBAC configurationB. Running a scan to locate where PHI resides across backup environmentsC. Documenting AES-256 encryption settingsD. Pulling user audit trail logs for the review period
Post-Quiz — Section 2: Data Retention and Legal Holds
4. What happens to backup snapshots when a legal hold is applied in Cohesity?
A. Snapshots are immediately moved to FortKnoxB. Normal retention expiration is suspended and data is preservedC. Snapshots are encrypted with an additional key layerD. Snapshots are replicated to a secondary cluster
5. How does DataLock differ from a standard retention policy?
A. DataLock applies only to archived data, not local snapshotsB. DataLock prevents deletion or modification even by administratorsC. DataLock automatically classifies data using MLD. DataLock replaces the need for Quorum authorization
Post-Quiz — Section 3: Zero Trust Design Principles
6. Which of the four pillars of Cohesity's Threat Defense architecture addresses SIEM and SOAR integrations?
A. Data ResiliencyB. Access ControlC. Detection & AnalyticsD. Extensibility
7. What is the purpose of Quorum authorization in Cohesity's Zero Trust model?
A. It encrypts data using multiple keys simultaneouslyB. It requires multiple authorized individuals to approve critical operationsC. It distributes backup data across multiple geographic regionsD. It scans backup data for malware using multiple engines
8. Why is source-side anomaly detection significant compared to backup-cycle detection?
A. It uses less storage spaceB. It provides earlier identification of threats rather than waiting for the next backupC. It replaces the need for YARA rulesD. It only works with cloud-based workloads
9. In the Cohesity-Microsoft Sentinel integration, what component serves as the data connector between Helios and Sentinel?
A. A Cortex XSOAR playbookB. An Azure Function AppC. A Cohesity SpanFS ViewD. A CrowdStrike Falcon sensor
10. What is the primary difference between SIEM and SOAR platforms in a security operations workflow?
A. SIEM handles encryption while SOAR handles access controlB. SIEM focuses on detection and analysis while SOAR automates the responseC. SIEM is cloud-only while SOAR is on-premises onlyD. SIEM replaces SOAR in modern security architectures
11. Which tool does Cohesity support for creating custom threat detection rules to hunt for specific indicators of compromise in backup data?
A. Sigma rulesB. Snort signaturesC. YARA rulesD. Suricata patterns
12. Which Cohesity feature provides a "virtual air gap" by isolating backup copies in a separate Cohesity-managed environment?
A. DataLock WORMB. Security AdvisorC. FortKnoxD. Quorum