Skip to main content

Protect against ransomware attacks on ASA r2 storage systems

Contributors netapp-aherbin

For enhanced protection against ransomware attacks, replicate snapshots to a remote cluster, then lock the destination snapshots to make them tamper-proof. Locked snapshots cannot be deleted accidentally or maliciously. You can use locked snapshots to recover data if a storage unit is ever compromised by a ransomware attack.

Initialize the SnapLock compliance clock

Before you can create tamper-proof snapshots, you must initialize the SnapLock compliance clock on your local and destination clusters.

Steps
  1. Select Cluster > Overview.

  2. In the Nodes section, select Initialize SnapLock Compliance Clock.

  3. Select Initialize.

  4. Verify that the compliance clock is initialized.

    1. Select Cluster > Overview.

    2. In the Nodes section, select three blue columns on white background; then select SnapLock Compliance Clock.

What’s next?

After you have initialized the SnapLock compliance clock on your local and destination clusters, you are ready to create a replication relationship with locked snapshots.