Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • AI & Machine Learning

S3 Security, Azure Local Backup & PowerShell Automation

Veeam
03/20/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Amazon S3 Resource Control Policies provide critical top-level security boundaries for backup data, preventing common misconfigurations where buckets are provisioned without clear usage policies or appropriate access restrictions.
  • Luca's detailed guide for configuring Veeam Backup and Replication with Azure Local (formerly Azure Stack HCI) fills an important content gap with step-by-step instructions, screenshots, and troubleshooting guidance for this hybrid cloud platform.
  • Chris's PowerShell automation script for silent Enterprise Manager installation demonstrates practical automation approaches, with community feedback requesting video demonstrations and potential AI agent integration.
  • Derek's article on USB device authorization with Veeam Hardened Repository reveals the security-by-design approach while highlighting the complexity of workarounds when physical access is needed.
  • Upcoming community events include a Veeam 100 show on Terraform automation for VB365 (July 10th) and a new BDC vodcast featuring T-Systems discussing their Veeam Data Cloud VCSP experience.

S3 Security with Resource Control Policies

The episode opens with a discussion of Eric's article on enhancing security for backups stored in Amazon S3 using Resource Control Policies (RCP). These policies provide a top-level security boundary that defines maximum permissions across AWS resources, even for IAM roles and service accounts. The panel emphasizes that S3 has become a standard for backup storage, making proper access controls critical. RCPs help prevent common misconfigurations where buckets are provisioned without clear usage policies, potentially exposing backup data. The discussion highlights how these policies protect against scenarios where a bucket initially intended for one purpose gets repurposed without appropriate security adjustments.

Azure Local Backup Configuration

Luca's comprehensive walkthrough of configuring Veeam Backup and Replication with Azure Local (formerly Azure Stack HCI) receives praise for its detailed screenshots and troubleshooting guidance. The panel notes Microsoft's recent rebranding has created some confusion, but Azure Local represents an important hybrid cloud alternative as the virtualization market evolves. The article fills a content gap with step-by-step instructions for integrating these systems, including prerequisite configuration and common pitfalls. Both guests appreciate the thorough documentation approach, particularly for administrators who prefer visual guides over dense text.

PowerShell Automation and Community Challenges

Chris's PowerShell script for silent installation of Veeam Enterprise Manager sparks discussion about automation best practices. The script downloads installation files directly from Veeam's repository and executes without requiring manual credential entry. Luis suggests enhancing the article with video demonstrations or live execution examples, while Andrei playfully challenges Chris to create an AI agent that could perform the installation. The conversation evolves into a proposal for a Veeam 100 show episode featuring Chris demonstrating the automation live. The panel also reviews Derek's article on USB device authorization errors with Veeam Hardened Repository, acknowledging the security-by-design approach while noting the complexity of the workaround process.

Community Updates and Summer Programming

The episode concludes with community announcements, including Charlie winning Blog of the Month for his automated tape import and reporting article. The upcoming Veeam 100 show on July 10th will feature Corinne and Chris demonstrating how to automate Veeam Backup for Microsoft 365 setup using Terraform, promising to reduce deployment time from weeks to days. The panel also highlights a new BDC vodcast format featuring T-Systems International discussing their experience building offerings on Veeam Data Cloud as a VCSP. Both guests encourage the community to stay engaged while also taking time to enjoy summer, with Andrei noting the extreme heat in Berlin and Luis emphasizing work-life balance.

Chapters

0:00 - Introduction and Guest Welcome
2:44 - S3 Resource Control Policies
6:48 - Azure Local Backup Configuration
11:48 - PowerShell Automation Scripts
16:04 - Hardened Repository USB Issues
23:03 - Blog of the Month Winner
25:25 - Veeam 100 Show Preview
28:03 - BDC Vodcast Series
32:18 - Closing Thoughts

Key Quotes

4:02 "You don't want any random people all over Internet to access your data."
6:01 "You don't want to reuse a bucket that it was permitted to write, and then you're using it for, as he said, publishing pictures on a website. So everybody can reach that and also can write into it."
8:30 "It's another interesting variant that people should be aware of. And with Microsoft trying to push Azure as much as possible to anyone, and for anyone doing any businesses these days, this is a NICE alternative to traditional Azure, to traditional cloud, because you can have a hybrid approach over here."
18:12 "Physical security is so important as the virtual security. So if somebody, a bad actor, has access to your physical machine, it is super cool that the Linux is also Hardened, that even though if they plug a USB that is not being allowed, it will get the error."
20:14 "It feels a little bit wrong because it was already designed. It's supposed to be secure. Why do you have to do additional things? ..."
30:51 "A lot of service providers from the very beginning, they were concerned because it kind of, sometimes the expectation is that it's going against their businesses, but it's wrong."

Categories:
  • » Data Protection » Backup & Recovery
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Cloud Security
  • Data Protection
  • Backup & Recovery
  • Best Practices
  • Technical Deep Dive
  • How-To
  • S3 Security
  • Resource Control Policies
  • Azure Local
  • Azure Stack HCI
  • PowerShell Automation
  • Enterprise Manager
  • Hardened Repository
  • USB Device Security
  • Veeam Data Cloud
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: S3 Security, Azure Local Backup & PowerShell Automation

              Upcoming Webinar Calendar

              • 03/26/2026
                01:00 AM
                03/26/2026
                Reclaim Network Clarity and Accountability with Netskope DEM
                https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
              • 03/26/2026
                05:00 AM
                03/26/2026
                ITDR's Role in Strengthening Critical Security Architecture
                https://www.truthinit.com/index.php/channel/1863/itdrs-role-in-strengthening-critical-security-architecture/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-municipal-risk-through-ai-and-city-scale-cyber-resilience/
              • 03/26/2026
                01:00 PM
                03/26/2026
                Making GPUs Available On Demand (Without Breaking the Budget)
                https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
              • 04/08/2026
                01:00 PM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/
              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/30/2026
                10:00 AM
                04/30/2026
                SaaS Data Protection Insights: Key Findings from the 2026 Keepit Annual Report
                https://www.truthinit.com/index.php/channel/1868/saas-data-protection-insights-key-findings-from-the-2026-keepit-annual-report/

              Upcoming Events

              • Mar
                26

                Reclaim Network Clarity and Accountability with Netskope DEM

                03/26/202601:00 AM ET
                • Mar
                  26

                  ITDR's Role in Strengthening Critical Security Architecture

                  03/26/202605:00 AM ET
                  • Mar
                    26

                    HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience

                    03/26/202601:00 PM ET
                    • Mar
                      26

                      Making GPUs Available On Demand (Without Breaking the Budget)

                      03/26/202601:00 PM ET
                      • Apr
                        08

                        Managing Configuration at Scale Across Group Policy and Intune

                        04/08/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version