Best practices for Clumio’s platform
Tags
To efficiently apply Clumio protection rules, standardize your tag naming convention. Standardizing tags helps Clumio identify resources that need to be protected across all accounts and regions in your organization. For example, establish a Clumio Tag naming convention that correlates to Clumio Policies:
- Tag Key: Clumio Value: Gold = Gold Policy
- Tag Key: Clumio Value: Silver = Silver Policy
- Tag Key: Clumio Value: Bronze = Bronze Policy
Monitor Clumio functions
After you have successfully finished setting up, start monitoring Clumio to make sure that your assets continue to be backed up as expected.
Reports
Use Clumio reports to monitor Clumio daily. For consistent monitoring, set up the Compliance Report and Activity Report.
Compliance report
The Compliance Report evaluates your asset backup and retention policy implementation to meet compliance requirements. See Compliance report for more information.
Consumption report
The Consumption Report displays the credit consumption details of all assets backed up by Clumio. You can view your consumption data in credits, dollars (cost per credit), or usage metrics (GB consumed). See Consumption report for information.
Operational tasks report
The Operation Tasks Report displays the SecureVault Backup, Clumio Snap, and restore activities of all assets protected by Clumio. See Operational tasks report for more information.
Audit report
The Audit Report represents a chronological history of the system activities that users have performed through the Clumio UI or REST API. Use the Audit Report to find out who made what changes in the Clumio product, and to ensure that everything is in compliance with your business requirements. See Audit report for more information.
Activity
Alerts
The Alerts page, available in the Activity widget on the left pane menu, shows you when there are issues affecting the assets in your Clumio environment, for example if a backup or a restore fails. The Activity widget displays a number highlighted in red to indicate the number of alerts raised on your system that require attention. See Alerts for more information.
Tasks
The Tasks page, available in the Activity widget on the left pane menu, displays the status of all of the tasks that are queued, underway, completed, or aborted. The Activity widget displays a number highlighted in blue to indicate the number of tasks currently running on your system. See Tasks for more information.
Set up security and establish access management
Control user access to Clumio. Enable bring your own key (BYOK) encryption to encrypt your backed up date with your own key instead of the unique CMK created for you by Clumio.
User provisioning
Add users to the platform. Identify who needs access to Clumio, then invite them using Access Management Settings.
SSO / MFA
The Clumio platform provides users with the ability to set up Multi-factor Authentication (MFA) or Single Sign On (SSO) to provide an additional layer of security. Any SAML 2.0 compliant Identity Provider can be configured with Clumio. See Authentication for detailed instructions on how to configure an SSO provider or MFA.
BYOK encryption
For additional security and compliance needs, you can encrypt the backup data stored in Clumio using AWS CMKs created and managed in your AWS account (BYOK), giving you the ability to control and monitor access to the stored backup data. See Encryption for more information.
Organizational units
Organizational units (OUs) allow you to create logical buckets of assets within your organization made up of groupings, such as departments, so that users can access and manage only the assets relevant to their work. Group data sources into OUs to reflect how users are permitted to access information, for example by AWS accounts. See Organizational Units for detailed instructions.
Roles
Roles provide different levels of access to different types of users within your organization. Roles range from a Super Admin who has full access to all operations within the Clumio UI, to a Reporting/Audit Admin who has view-only access to the UI and can generate reports. See Roles for more information.
Updated 5 months ago