12.5

4 Copyright © Acronis International GmbH, 2003-2020
2 Operations
2.1 Backup security
It is recommended to encrypt your backups. As a result, a backup will be stored encrypted at rest and
a user will have to enter the encryption password in order to restore or view the saved encrypted
backup.
For more details how to encrypt backups, refer to the Acronis Cyber Backup 12.5 web help
(https://www.acronis.com/support/documentation/AcronisCyberBackup_12.5/#37608.html).
2.2 Recommended backup destinations
You can choose the backup destination that will be appropriate to your security risk model, as
outlined in the following table:
Destination
Security protocols
Tenant isolation capability
Cloud storage
TLS, client-server certificate
yes
Local folder
no
Network folder
SMB/CIFS
no
Acronis Cyber Infrastructure
TLS, client-server certificate
yes
NFS folder
no
Secure zone
no
SFTP
SSH2
no
Acronis Storage Node
TLS
no
2.3 Administrator assignment
For security reasons, it is highly recommended to limit the list of administrators who can fully
manage Acronis Cyber Backup.
The recommended way of assigning an administrator is a group in Active Directory.
2.4 Organization units
Organizing the structure
With the Advanced license, it is possible to create organizational units and add administrators to
them. This allows you to delegate backup management to other people whose access permissions
will be strictly limited to the units assigned to them.
Administrator accounts can be created at the unit or organization level. Each account has a view
scoped to their area of control. Users only have access to their own backups.
To learn more about the types of administrators and their control area, refer to the Acronis Cyber
Backup 12.5 web help.
(https://www.acronis.com/support/documentation/AcronisCyberBackup_12.5/index.html#39120.ht
ml)