Chapter 7: Access Control — RBAC, Multi-Tenancy & Quorum

Learning Objectives

Pre-Study Assessment

Answer these questions before reading the material to gauge your current understanding.

Pre-Quiz — Section 1: Role-Based Access Control

1. In Cohesity's RBAC model, what is the relationship between permissions and users?

Permissions are assigned directly to individual users
Permissions are assigned to roles, and roles are assigned to users
Permissions are inherited from the operating system
Permissions are granted automatically based on login frequency

2. Can a Cohesity user be assigned both the built-in Viewer role and the Super Admin role simultaneously?

Yes, all roles can be freely combined
No, default roles like Viewer cannot be combined with Admin or Super Admin
Yes, but only through the API
No, users can only hold one role at a time

3. When a user holds both an individually assigned custom role and an AD-group-inherited role, what are the effective permissions?

Only the individually assigned role applies
Only the AD group role applies
The union (combined set) of all assigned roles
The intersection (overlap) of all assigned roles

4. Which Cohesity feature restricts a user's access to specific VMs or storage arrays rather than granting cluster-wide access?

Quorum Groups
Organizations
Object-level access restrictions
VLAN segmentation
Pre-Quiz — Section 2: Multi-Tenancy & Quorum

5. In a Cohesity multi-tenant deployment, can a service provider decrypt a tenant's backup data if they have physical access to the drives?

Yes, physical access always implies data access
No, per-tenant encryption keys prevent this
Only if the tenant grants explicit permission
Yes, service providers hold a master decryption key

6. What is the recommended approval threshold formula for a Cohesity Quorum Group?

All members must approve unanimously
n/2 + 1 (a simple majority plus one)
Any single quorum member can approve
Two-thirds of all members

7. When a quorum member initiates a protected operation, what happens to their approval count?

Their request starts at 0 approvals like any other user
Their request is auto-approved (counts as 1 approval)
They are removed from the quorum for that request
The operation executes immediately without needing further approval

Section 1: Role-Based Access Control

Role-Based Access Control (RBAC) is a security model in which permissions are assigned to roles, and roles are assigned to users -- rather than granting permissions directly to individual users. Think of it like a corporate badge system: rather than programming each badge individually, you create badge tiers (Executive, Employee, Visitor), define what each tier can access, and then assign the appropriate tier to each person.

flowchart LR subgraph Users U1["Local User"] U2["AD Group Member"] U3["SSO User"] end subgraph Roles R1["Super Admin"] R2["Operator"] R3["Custom Role"] end subgraph Permissions P1["Manage Clusters"] P2["Run Protection Groups"] P3["Manage VMware Sources"] P4["View Dashboards"] end U1 --> R1 U2 --> R2 U3 --> R3 R1 --> P1 R1 --> P2 R1 --> P3 R1 --> P4 R2 --> P2 R2 --> P4 R3 --> P3 R3 --> P4

Built-in Roles

Cohesity ships with over a dozen predefined roles. The most important ones include:

RolePermissionsTypical Use Case
Super AdminFull access to all actions; can manage other admins. Cannot be deleted.Platform owner, security officer
AdminAdministrative privileges for cluster operationsDay-to-day cluster management
ViewerRead-only access to all workflowsAuditors, compliance reviewers
OperatorViewer privileges plus execute Protection Groups and recovery tasksOperations staff
Data SecurityCreate DataLock Views and set DataLock expirationCompliance teams
Self-ServiceManage clones, protection groups, policies with viewer accessApplication owners
DR AdminViewer capabilities plus manage DR workflowsDR coordinators

Important constraint: You cannot combine a default role such as Viewer with the Admin or Super Admin role. However, custom roles can be combined with Admin or Super Admin.

Custom Roles

When built-in roles do not match your needs, create custom roles with hand-picked privileges to enforce the principle of least privilege. Privileges span categories like Access Management, DataProtect Services, Recovery Management, Storage Management, and Source Access Control.

Steps: Navigate to Settings > Access Management > Roles > Add Custom Role > define name, description, and toggle specific privilege categories. Note: role names cannot be edited after creation.

Role Assignment: Local Users, AD Groups, and SSO

Cohesity supports three identity sources for role assignment:

When a user holds roles from multiple sources, effective permissions are the union of all assigned roles.

flowchart TD AD["Active Directory\nGroups & Users"] --> MAP["Cohesity Role\nMapping Engine"] SSO["SSO / IdP\n(Azure AD, Okta, Ping)"] --> MAP LOCAL["Local Cohesity\nAccounts"] --> MAP MAP --> ROLE_A["Role A\n(e.g., Admin)"] MAP --> ROLE_B["Role B\n(e.g., Custom Backup-Ops)"] ROLE_A --> EFF["Effective Permissions\n= Union of All Roles"] ROLE_B --> EFF EFF --> ACCESS["Access Granted\nto Cohesity Resources"]

Least Privilege

The principle of least privilege means every user should have only the minimum permissions necessary. Cohesity enforces this through:

Interactive RBAC Explorer

Click a user to see which role they hold and what permissions that role grants.

Local User
AD Group Member
SSO User
Super Admin
Operator
Custom Role
Manage Clusters
Run Protection Groups
Manage VMware Sources
View Dashboards

Key Points -- RBAC

Section 2: Multi-Tenancy Security

Multi-tenancy allows a single Cohesity cluster to serve multiple independent customers (tenants) with logical isolation. Cohesity implements this through Organizations. The analogy is an apartment building: all residents share the same physical structure, but each apartment has its own lock, utility meters, and lease agreement.

Organizations Architecture

Each Organization logically groups users and enforces data boundaries. Key properties:

Tenant Isolation Layers

Isolation LayerDescription
Namespace IsolationEach tenant has a dedicated data namespace with its own repositories
Per-Tenant EncryptionData-at-rest and data-in-flight encrypted per tenant; service providers cannot decrypt tenant data
VLAN Network SegmentationUnique VLAN ID per Organization isolates network traffic
Management-Level IsolationService providers cannot restore or download files from tenant backups
Policy IsolationProtection policies, SLA configs, and retention settings scoped per Organization

Critical security guarantee: Service providers cannot decrypt tenant data even with physical access to the hard drives, because per-tenant encryption keys are not accessible to the service provider.

Tenant Admin Delegation

Within each Organization, a tenant admin manages users and can:

Tenant admins operate within strict boundaries -- they cannot view other Organizations or access cluster-level settings.

Cross-Tenant Boundaries

Security boundaries are enforced via Zero Trust principles: data boundaries restrict access to specific VMs/NAS shares, fine-grained RBAC is scoped per data source, and ML-based anomaly detection monitors each tenant's backup ingestion rate and entropy to detect ransomware.

Optional trade-off: Cross-tenant deduplication yields 5-10% storage savings but shares a single encryption key across tenants. Organizations with strict compliance may forgo this.

Key Points -- Multi-Tenancy

Section 3: Quorum Groups for Privileged Actions

A Quorum is a multi-person authorization mechanism requiring a predefined number of approvers to sign off before a sensitive operation executes. The real-world analogy: a bank vault requiring two keys turned simultaneously -- no single person, no matter how trusted, can open it alone.

The Quorum Concept

Quorum Groups address the single-point-of-compromise scenario. If a privileged account is compromised or an insider acts maliciously, quorum protection prevents that single identity from executing destructive operations.

flowchart TD START["User initiates\nprotected operation"] --> CHECK{"Is user a\nquorum member?"} CHECK -- Yes --> AUTO["Auto-approve\n(count = 1)"] CHECK -- No --> PENDING["Request pending\n(count = 0)"] AUTO --> DASH["Request appears in\nQuorum Dashboard"] PENDING --> DASH DASH --> REVIEW["Quorum members\nreview request"] REVIEW --> APPROVE["Member clicks\nApprove"] REVIEW --> DECLINE["Member clicks\nDecline"] APPROVE --> THRESH{"Approval count\n>= threshold?"} THRESH -- Yes --> EXEC["Operation\nexecutes immediately"] THRESH -- No --> DASH DECLINE --> DENIED["Request denied\nor remains pending"]

Configuring Quorum

Cohesity provides predefined templates identifying which operations to protect. Cohesity advises against manually selecting individual operations unless instructed by support.

Approval threshold formula: Minimum approvals = n/2 + 1 where n = total quorum members.

Quorum Group SizeRecommended Min. Approvals (n/2+1)
3 members2 approvals
5 members3 approvals
7 members4 approvals
9 members5 approvals

Operations Requiring Approval

Typical quorum-protected operations include:

Defense Against Insider Threats

A critical design principle: quorum approvers do not need the RBAC permission to initiate the operation they approve. RBAC controls who can initiate; Quorum controls who can approve. This separation provides defense against:

ThreatHow Quorum Protects
Compromised admin credentialsAttacker cannot execute destructive ops without additional human approvals
Rogue insiderMalicious admin cannot act unilaterally; peers must approve
Poorly trained administratorAccidental destructive ops caught during approval review
Social engineeringMultiple people must be fooled, not just one

Interactive Quorum Simulation

Alice initiated "Delete Protection Policy." Her request was auto-approved (1/2). Click Bob or Carol to approve or decline. Threshold: 2 of 3.

A
Alice (auto)
B
Bob
C
Carol
Pending: 1 of 2 approvals

Key Points -- Quorum

Section 4: Access Control Best Practices

Separation of Duties

No single person should control all aspects of a critical process. In Cohesity administration:

FunctionRole(s)Quorum Member?
Platform infrastructureSuper AdminYes
Backup operationsCustom "Backup-Ops"No
Security and complianceData Security + custom access mgmtYes
Monitoring and auditViewerNo
Disaster recoveryDR AdminYes

Access Reviews

Break-Glass Procedures

Emergency access when normal workflows are unavailable (e.g., quorum members unreachable during an outage):

  1. Document the procedure -- define which scenarios warrant break-glass access and who can invoke it
  2. Use the Cohesity Support Admin role -- this built-in role allows Cohesity support to create a Super Admin user for customers who lose access
  3. Seal and audit -- after the emergency, review all actions taken, reset temporary credentials, document the incident
  4. Test periodically -- run break-glass drills to ensure the procedure works

How RBAC, Organizations, and Quorum Work Together

flowchart LR USER["User attempts\nan action"] --> RBAC{"RBAC Check:\nDoes role grant\nthis permission?"} RBAC -- No --> DENY1["Access Denied"] RBAC -- Yes --> ORG{"Org Check:\nIs target in user's\nOrganization scope?"} ORG -- No --> DENY2["Access Denied"] ORG -- Yes --> QUORUM{"Quorum Check:\nProtected operation?"} QUORUM -- No --> ALLOW["Action Executes"] QUORUM -- Yes --> APPROVAL["Quorum Approval\nWorkflow"] APPROVAL --> APPROVED{"Threshold\nmet?"} APPROVED -- Yes --> ALLOW APPROVED -- No --> DENY3["Action Blocked"]

Key Points -- Best Practices

Post-Study Assessment

Now that you have studied the material, answer these questions again to measure your progress.

Post-Quiz — Section 1: Role-Based Access Control

1. In Cohesity's RBAC model, what is the relationship between permissions and users?

Permissions are assigned directly to individual users
Permissions are assigned to roles, and roles are assigned to users
Permissions are inherited from the operating system
Permissions are granted automatically based on login frequency

2. Can a Cohesity user be assigned both the built-in Viewer role and the Super Admin role simultaneously?

Yes, all roles can be freely combined
No, default roles like Viewer cannot be combined with Admin or Super Admin
Yes, but only through the API
No, users can only hold one role at a time

3. When a user holds both an individually assigned custom role and an AD-group-inherited role, what are the effective permissions?

Only the individually assigned role applies
Only the AD group role applies
The union (combined set) of all assigned roles
The intersection (overlap) of all assigned roles

4. Which Cohesity feature restricts a user's access to specific VMs or storage arrays rather than granting cluster-wide access?

Quorum Groups
Organizations
Object-level access restrictions
VLAN segmentation

5. A managed service provider hosts 50 tenants on one Cohesity cluster. Which isolation layer ensures tenants cannot see each other's backup data even if they share the same physical nodes?

VLAN segmentation alone
Namespace isolation combined with per-tenant encryption
RBAC custom roles
Quorum Groups
Post-Quiz — Section 2: Multi-Tenancy & Quorum

6. What is the recommended approval threshold formula for a Cohesity Quorum Group?

All members must approve unanimously
n/2 + 1 (a simple majority plus one)
Any single quorum member can approve
Two-thirds of all members

7. When a quorum member initiates a protected operation, what happens to their approval count?

Their request starts at 0 approvals like any other user
Their request is auto-approved (counts as 1 approval)
They are removed from the quorum for that request
The operation executes immediately without needing further approval

8. In Cohesity's Quorum design, do quorum approvers need the RBAC permission to initiate the operation they are approving?

Yes, approvers must hold the same RBAC role as the initiator
No, RBAC controls initiation while Quorum controls approval -- they are separate
Only if the operation involves data deletion
Yes, and they must also be Super Admins

9. What built-in Cohesity role is specifically intended for emergency break-glass scenarios when customers lose access?

Super Admin
DR Admin
Cohesity Support Admin
Data Security

10. A Cohesity tenant admin in Organization "Acme-Corp" tries to view protection policies belonging to Organization "Globex." What happens?

They can view but not modify Globex policies
They are denied access -- tenant admins can only see resources within their Organization
They can view if they have the Viewer role
They need Quorum approval to view cross-tenant resources

11. Which of the following best describes how Cohesity's three access control mechanisms work together when a user attempts an action?

Quorum is checked first, then RBAC, then Organization scope
RBAC checks permission, then Organization checks scope, then Quorum checks if multi-person approval is needed
Organization scope is the only check; RBAC and Quorum are optional
All three checks run in parallel and any denial blocks the action

12. What is a potential downside of enabling cross-tenant deduplication in a Cohesity multi-tenant deployment?

It breaks namespace isolation
It shares a single encryption key across tenants, reducing encryption independence
It disables VLAN segmentation
It requires all tenants to use the same AD domain

Your Progress

Answer Explanations