Secure Your Cloud After Ransomware: Backup, Encryption & Access‑Control Guide

Following a massive ransomware breach that encrypted thousands of servers and stole sensitive data, this guide outlines four essential self‑check steps—data backup, encryption, server permission management, and platform user access control—along with JD Cloud’s concrete best‑practice actions to harden your infrastructure.

JD Cloud Developers
JD Cloud Developers
JD Cloud Developers
Secure Your Cloud After Ransomware: Backup, Encryption & Access‑Control Guide

Background

A recent ransomware attack on a major electronics manufacturer encrypted about 1,200 servers, stole roughly 100 GB of unencrypted files, and deleted 20–30 TB of backups. The attackers demanded 1,804.0955 BTC (≈ US$34.7 million), highlighting the critical importance of robust IT security.

Step 1: Data Backup Self‑Check

Self‑check: Verify whether critical data has off‑site disaster‑recovery copies.

Remediation: Enable cross‑region data synchronization to keep backups in another region, ensuring rapid recovery after attacks or natural disasters.

JD Cloud best practice: Use Object Storage → Space Management → Advanced Settings → Data Sync → Historical Data Sync to copy important data to another region, then configure Incremental Data Sync for ongoing updates.

Step 2: Data Encryption Self‑Check

Self‑check: Confirm that important and sensitive data are stored encrypted and that no keys are hard‑coded or stored in plaintext.

Remediation: Encrypt sensitive data, prohibit hard‑coded keys, and manage all keys securely with regular rotation.

JD Cloud best practice:

Key Management: Use the Key Management Service SDK to create and host keys; store only encrypted keys locally and decrypt via the SDK when needed.

Data Encryption: Use Data Security Center to create a protection instance, bind the data source, and configure fields for automatic encryption; enable default encryption for OSS objects.

Step 3: Server Permission Management Self‑Check

Self‑check: Ensure login servers have permission control, security auditing, and automated operation capabilities.

Remediation: Deploy a bastion host to enforce permission policies, define high‑risk commands, set time‑based login interception rules, and regularly audit sessions.

JD Cloud best practice: Use the Bastion service → create an instance → add users, hosts, accounts, and rules, then access servers through the bastion.

Step 4: Platform/Application User Permission Management Self‑Check

Self‑check: Verify that platform or application users are authorized according to roles or levels and that critical operations enforce access checks.

Remediation: Implement a role‑based permission mechanism, enforce access verification on key actions, and prevent privilege escalation.

JD Cloud best practice:

Sub‑account security: Set a strong IAM password policy, enable MFA, rotate credentials, and prohibit the JDCloudAdmin‑New role.

Main‑account security: Disable or delete all Access Keys for the primary account and use role‑based access instead.

Login and operation security: Enable virtual MFA, operation protection, and optional login‑IP protection.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

access controlencryptiondata backupcloud securityransomware
JD Cloud Developers
Written by

JD Cloud Developers

JD Cloud Developers (Developer of JD Technology) is a JD Technology Group platform offering technical sharing and communication for AI, cloud computing, IoT and related developers. It publishes JD product technical information, industry content, and tech event news. Embrace technology and partner with developers to envision the future.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.