Rubrik applies and utilizes encryption throughout the entire backup and recovery process, from ingest to restore. Whether data is local to the cluster or exists within the cloud, customers can be rest assured that their data, both at rest and in-flight, is encrypted and safe from ransomware and other malicious attacks.

Rubrik end-to-end encryption - Keeping your data safe from ransomware

Encryption is a process in which data is encoded in order to ensure it’s hidden or inaccessible to unauthorized users and devices. With ransomware and malicious threats on the rise, it’s essential that organizations ensure that their most valuable assets and sensitive data are encrypted and hidden away from bad actors. When we shift the conversation from production to backup data, it's essential that encryption be applied everywhere. Data Management solutions such as Rubrik become a global catalog containing point-in-time copies of all of your production data, making encryption even more important than ever. At Rubrik, we take a security first approach during our design, ensuring data is fully encrypted and, at the same time, providing an immutable file system to ensure that once data is written, it can never be changed. These principles help ease concerns since an organization's backups can always be used as their last line of defense. Rubrik’s encryption can be broken down into two different data buckets: Data at Rest and Data in Flight

Encrypting data at rest, everywhere!

Data at Rest Encryption (DARE) is a key strategy in deploying a defence in depth approach in the security world. DARE, along with Rubrik Zero Trust Data Security™ and immutable file system provide the groundwork for ensuring our customers are able to recover from nearly any cyber threat, while at the same time ensuring their data is always safe and hidden away from prying eyes. When it comes to encrypting data at rest, Rubrik provides a couple options: Software Encryption and Hardware Encryption.

Software Encryption

Rubrik software encryption for data at rest works on the application level, meaning all the work and encryption is performed through software. As data is ingested, Rubrik generates a unique one-time only symmetric Data Encryption Key (DEK). DEKs utilize the AES-256 cipher and are utilized to encrypt both the ingested backup data, along with any associated metadata generated by Rubrik. This process ensures that—without the associated DEK—the data is essentially unreadable, even by the Rubrik platform. This results in the need to store this associated DEK somewhere alongside the data itself.

img

While storing the generated DEK locally is an option, it does present a security risk as anyone with the DEK could potentially decrypt the data. To combat this, Rubrik leverages a technique known as envelope encryption. When the initial encryption process with the DEK has been completed, Rubrik will then encrypt the DEK with another key called a Key Encryption Key (KEK). The encrypted DEK is then stored alongside the ciphertext data, while any plaintext versions of it are immediately purged from memory. Therefore when Rubrik needs to read this data, it must pass through two phases of encryption, first decrypting the DEK with a KEK, then decrypting the data itself. To obtain and manage KEK’s, customers can leverage either the internal Trusted Platform Module (TPM) chip within the Rubrik appliance, or utilize an external Key Management Interoperability Protocol (KMIP) compliant key management server such as those provided by Hytrust or Cryptsoft. 

In both cases, Rubrik adopts security best practices by allowing customers to easily perform key rotation on their KEKs through either the UI or the RESTful API.
 

Hardware Encryption

Often federal, state, or local government agencies face the challenge of protecting growing amounts of sensitive data and are under strict regulations when it comes to encryption. To address these challenges Rubrik also offers platforms elevated to the highest level of protection with FIPS 140-2 Level 2 validated self encrypting hard disk and solid state drives.

Hardware encryption works much in the same way as software encryption, but rather than Rubrik performing the encryption of the data within software, the self-encrypting drives utilize drive firmware to perform the encryption. Each self-encrypting drive utilizes a password in order to generate it’s DEKs, and the DEKs never hit the memory space at all. These passwords, much like the Rubrik generated DEKs, are further encrypted by a KEK, again, managed through an internal TMP or external KIMP compliant key management server.

Encrypting data in flight, always!

While encryption at rest often gets the spotlight, it’s just as important that all data in flight is encrypted as well. Whether it be to prevent man in the middle attacks, packet sniffers, or overall malicious activity, it’s crucial that encryption be applied to data as it traverses the network. This importance is further solidified when dealing with a data management solution such as Rubrik. As you can imagine, a data management solution, well, manages data - and this involves not only becoming a central repository for all of your production data, but moving this data around by performing tasks to support features such as long term archival and replication. 

img

As shown above, we can see all of the external and internal communications between protected objects, the on-premises Rubrik platform, the cloud, and Rubrik Polaris. All communication in and out of the Rubrik platform is encrypted as follows:

  1. Communication between protected environments and Rubrik is fully encrypted. Communication to and from VMware vSphere environments utilizes the NBDSSL protocol, while communication to and from other protected sources is encrypted via TLS.
  2. Aside from ensuring every internode request is authorized and authenticated, all communication within the Rubrik cluster from node to node is encrypted via TLS, contributing the “trust nothing” approach of a zero-trust architecture
  3. When data is archived, whether to a public cloud storage provider or to an on-premises Object Store, NFS, or Tape Target, it is fully encrypted via TLS during the transfer. The data itself is also encrypted at rest, no matter the location.
  4. When leveraging Rubrik replication capabilities to replicate data to another Rubrik cluster for DR purposes, all communication between the clusters is completely encrypted via TLS
  5. Rubrik Polaris, a SaaS-based offering communicates with the on-premises Rubrik instance to provide multi-cluster management as well as a number of value-add services for customers. This communication is completely encrypted via TLS
  6. Many SaaS offerings around cloud-native protection within Rubrik Polaris also need to communicate with customer cloud environments. All communication between Rubrik Polaris and a customer cloud account is encrypted via TLS.

Furthermore, any requests made to the Rubrik platform, either through the UI or a RESTful API endpoint must be authenticated and authorized and are fully encrypted via TLS.

As we’ve illustrated, Rubrik is dedicated to providing end-to-end security no matter where your data resides. All data in flight is encrypted, and any data landing within the Rubrik platform, including archive locations, is encrypted at rest. But encryption isn’t the only safeguard Rubrik takes to give customers peace of mind.

Our entire software stack is built around the idea of Zero Trust Data Security, trusting nothing by default, providing Role-Based Access Control, supporting Multi-Factor Authentication, all backed by a distributed, immutable filesystem. To learn more about Rubrik’s Zero Trust Data Security architecture check out the solutions page.