Forum Discussion

hiromasa_y2g's avatar
3 years ago

About encryption of NBU8.2 Cloud Catalyst by KMS

Hi all,

The customer plans to build Cloud Catalyst with NetBackup 8.2.
At that time, the customer is preparing to encrypt with NetBackup KMS.

MSDP(non-encrypt) -> CC(encrypt) -> Cloud

Cloud Catalyst encryption by KMS encrypts the duplicated backup data when uploading it to the cloud. Is the encryption key at that time only the key set in the wizard at the beginning? Or does the encryption key change every time?

Also, is there a way to check that the backup data on the cloud side is encrypted?

Thank you for your support.

6 Replies

    • hiromasa_y2g's avatar
      hiromasa_y2g
      Level 3

      Thank you for your reply.

      However, what is written here is the confirmation method when encryption is performed at the time of backup, isn't it?
      CloudCatalyst encrypts the backed up data when it is uploaded to the cloud, so we couldn't verify the encryption with this procedure.

      In addition, I know that I can check the existence of KMS in the property item of Storage Server of Cloud Catalyst ("MSDPCLD: kmsenabled" etc.).
      However, I don't know how to make sure that the data uploaded by CloudCatalyst is encrypted.

      • Nicolai's avatar
        Nicolai
        Moderator

        Whenever a Netbackup image is copied or duplicated, the image information is updated in the Netbackup database.

        One Netbackup image can have many FRAG(ments) depending on backup size and number of copies. You can inspect this change by running "bpimagelist -backupid" before and after duplication or a Netbackup image.

        If a fragment is encrypted, field 28 of the FRAG line contain the KMS key tag. This is proof of the data being encrypted. Of cause you cannot see the FRAG lines for could catalyst before the copy is made. You need to wait after the image has been uploaded to the cloud. 

        To verify a encrypted backup. Move the KMS key to "depreciated" state and try to restore - as written in the "How to verify KMS encrypted the backup". The restore should fail with status code 85.

        You may want to bookmark this technote:

        How to interpret the different fields in "bpimagelist -l" output?

        https://www.veritas.com/support/en_US/article.100017904