The Cloud-Based Ransomware Recovery for VMware Cloud Foundation validated solution provides detailed design, implementation, configuration, and operation guidance on protecting business workloads running on a VMware Cloud Foundation instance against a ransomware attack by connecting the instance to VMware Cloud on AWS through the use of the VMware Live Cyber Recovery service.
A VMware by Broadcom validated solution is a well-architected and validated implementation, built and tested by VMware to help customers deliver common business use cases. VMware validated solutions are operational, cost-effective, reliable, and secure. Each solution contains a detailed design, implementation, and operational guidance.
Automation for This Design in VMware Cloud Foundation
VMware Cloud Foundation™ SDDC Manager® automates the implementation tasks for some design decisions. For the rest of the design decisions, as noted in the design implications, you must perform the implementation steps manually.
To provide a fast and efficient path to automating the Cloud-Based Ransomware Recovery for VMware Cloud Foundation implementation, this document provides Microsoft PowerShell cmdlets as code-based alternatives to completing certain procedures in each SDDC component's user interface.
For additional information, see PowerShell Module for VMware Validated Solutions.
Intended Audience
The Cloud-Based Ransomware Recovery for VMware Cloud Foundation documentation is intended for cloud architects and administrators who are familiar with and want to use VMware software and a cloud-based ransomware recovery solution with VMware Cloud Foundation.
Support Matrix
The Cloud-Based Ransomware Recovery for VMware Cloud Foundation validated solution is compatible with certain versions of the VMware products that are used for implementing the solution.
VMware Cloud Foundation Version |
Product Group |
Component Versions |
---|---|---|
5.2.1 |
Products part of VMware Cloud Foundation |
|
Solution-added products |
VMware Cloud on AWS |
|
VMware Live Cyber Recovery |
||
5.2.0 |
Products part of VMware Cloud Foundation |
|
Solution-added products |
VMware Cloud on AWS |
|
VMware Live Cyber Recovery |
||
5.1.1 |
Products part of VMware Cloud Foundation |
|
Solution-added products |
VMware Cloud on AWS |
|
VMware Live Cyber Recovery |
||
5.1.0 | Products part of VMware Cloud Foundation |
See VMware Cloud Foundation 5.1.0 Release Notes |
Solution-added products |
VMware Cloud on AWS |
|
VMware Live Cyber Recovery |
VMware Cloud Foundation Version |
Product Group |
Component Versions |
---|---|---|
5.0 |
Products part of VMware Cloud Foundation |
See VMware Cloud Foundation 5.0 Release Notes. VMware Aria Suite Lifecycle 8.10.0 (EOGS) |
Solution-added products |
VMware Cloud on AWS |
|
VMware Live Cyber Recovery |
||
4.5.2 |
Products part of VMware Cloud Foundation |
See VMware Cloud Foundation 4.5.2 Release Notes. VMware Aria Suite Lifecycle 8.10.0 (EOGS) |
Solution-added products |
VMware Cloud on AWS |
|
VMware Live Cyber Recovery |
||
4.5.1 |
Products part of VMware Cloud Foundation |
See VMware Cloud Foundation 4.5.1 Release Notes. vRealize Suite Lifecycle Manager 8.8.2 (EOGS) |
Solution-added products |
VMware Cloud on AWS |
|
VMware Live Cyber Recovery |
||
4.5.0 |
Products part of VMware Cloud Foundation |
See VMware Cloud Foundation 4.5.0 Release Notes. vRealize Suite Lifecycle Manager 8.8.2 (EOGS) |
Solution-added products |
VMware Cloud on AWS |
|
VMware Live Cyber Recovery |
The software component versions in this table are in End of General Support (EOGS) phase and are no longer generally supported by VMware. At the time of initial release and during the General Support phase, the software component versions in this solution are actively implemented, tested, and validated by VMware and VMware partners. See VMware Lifecycle Policies.
Before You Apply This Guidance
To design and implement the Cloud-Based Ransomware Recovery for VMware Cloud Foundation validated solution, your environment must have a certain configuration.
Workload Domain |
Deployment Details |
---|---|
Management domain |
Automated deployment using VMware Cloud Builder™. See the following VMware Cloud Foundation Documentation:
|
One or more virtual infrastructure workload domains |
Automated deployment by using SDDC Manager See the following VMware Cloud Foundation Documentation:
|
Overview of Cloud-Based Ransomware Recovery for VMware Cloud Foundation
By applying the Cloud-Based Ransomware for VMware Cloud Foundation validated solution, you connect a VMware Cloud Foundation instance to the VMware Live Cyber Recovery service to protect business workloads against a ransomware attack.
Stage |
Steps |
---|---|
1. Plan and prepare the VMware Cloud Foundation environment. |
Work with the technology team of your organization on configuring the physical servers, network, and storage in the data center. Collect the environment details and write them down in the VMware Cloud Foundation Planning and Preparation Workbook. |
2. Prepare the VMware Cloud Foundation instance. |
|
3. Configure VMware Cloud on AWS |
|
4. Configure the VMware Live Cyber Recovery service. |
|
Update History
Revision |
Description |
---|---|
09 OCT 2024 |
|
23 JUL 2024 |
|
28 MAY 2024 |
|
26 MAR 2024 |
|
30 JAN 2024 |
|
07 NOV 2023 |
Initial release. |