BSDCan2019 - 1.8

BSDCan 2019
The Technical BSD Conference

Aaron Poffenberger
Day Talks #2 - 18 May - 2019-05-18
Room DMS 1110
Start time 16:00
Duration 01:00
ID 1096
Event type Lecture
Track Security
Language used for presentation English

Road Warrior Disaster Recovery

Secure, Synchronized, and Backed-up

Many of us spend days and weeks planning, and implementing strategies for disaster recovery in the server room, whether corporate or personal. How many of us, however, can really say we're prepared to recover our primary computing system in the office ... or on the go? Or that it's secure enough that if it were lost, stolen, or seized we wouldn't lose important data, or lose sleep?

In this talk we'll look at the various strategies available to us to ensure our laptops are secure, synchronized, backed up and ready to recover.

Whether at the office or at home, we spend a lot of time ensuring our systems are secure and backed-up, ready to recover in case of disaster. When it comes to our workstations, which are often laptops, we've often done little more than enable full-disk encryption and perhaps the odd occasional rsync for backups.

Full-disk encryption is usually adequate protection against data loss due to opportunistic theft or casual loss. 10 years ago that might have been enough. But the times have changed.

Today our laptops carry more than just our working files. They often include the entire corporate code repository, passwords and authentication keys, as well as personal files and data. Are our portable computers hardened against directed attack? Are we prepared for border-patrol agents or other state officials demanding passwords or unfettered access to our computing systems ... or online accounts?

We're also more mobile. We expect to work when we want and where. How many of us can honestly say we could recover all -- or enough -- of our computing environment from bare metal in a day, half-day, or hour to be productive ... halfway across the globe?

In this talk we'll look at the risks to the vast amounts of data we so casually carry around. We'll review strategies and techniques to reduce or mitigate those risks, as well as prepare our systems for easier recovery, at rest or on the go.

We'll look at:

  • Risks
  • Machine physical security
  • Encryption
  • Data synchronization options
  • On-the-go backup solutions
  • On-the-go recovery
  • Preparing to cross international borders