Meeting Compliance, Security, and SLA Standards with a Meraki Backup Solution

In technology-reliant business environments, large enterprises face immense pressure to maintain seamless network operations while adhering with rigorous business continuity and disaster recovery (BCDR) standards. These requirements are often dictated by regulatory compliance mandates, corporate security policies, and service level agreements (SLAs). Failure to meet these standards can result in costly disruptions, compliance violations, and damaged reputations.

However, when you have hundreds of networks and thousands of devices across geographically dispersed locations, the challenge of meeting those requirements can be pretty daunting. You typically have dozens of IT administrators and engineers managing your networks and devices.

So, at any given time, it’s possible for a configuration change to be taking place somewhere in your organization. You’re therefore subjected to an increased risk of human error that may in turn cause network configurations to deviate from those standards and potentially lead to downtime.

If you’re using Cisco Meraki to manage your networks and network devices, we have the perfect solution for you. Boundless Safeguard is a Meraki-API powered solution that you can incorporate into your overarching business continuity and disaster recovery strategy.

Before we elaborate more on Boundless Safeguard, let’s first review the challenges you may face in connection with regulatory compliance mandates, corporate security policies, and SLAs.

Table of Contents

Network Uptime and Disaster Recovery are Now Business Requirements

The ability to maintain optimal uptime and recover quickly from an operational disruption are now essential to enterprise networks. They’re not just qualities enterprises aspire to. Rather, they’re now considered crucial business requirements.

For instance, if your business is governed by the Payment Card Industry Data Security Standard (PCI DSS), PCI DSS 4.0 Requirement 6.5.1 compels you to implement a set of procedures for when changes are made to system components. As further stipulated in the requirement, those procedures must enable you to address potential failures and to return to a secure state. In the context of PCI DSS, system components include network devices.

Similarly, if your business is subject to the General Data Protection Regulation (GDPR), Article 32 requires you to possess the ability “to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident”. This means that if the personal data in question is accessed through your network, then you have to make sure you possess that ability.

In addition to regulations like PCI DSS and GDPR, you may also have to meet SLAs, particularly SLA provisions that call for high levels of uptime. If your SLA calls for 99.9% uptime, you’re only allowed up to 22.5 hours of downtime per year. Or if it calls for 99.99% uptime, then you must not exceed 4.5 hours of downtime per year.

When you’re dealing with hundreds of networks and thousands of devices, returning to a secure state in a timely manner or limiting downtime to a maximum of 22.5 hours per year, let alone 4.5 hours per year, is no easy task. To achieve these levels of uptime in your Meraki network, you have to employ a highly capable backup and recovery solution.

Meet Compliance, Security, and SLA Standards with Boundless Safeguard

Boundless Safeguard is an advanced Meraki network backup and recovery solution that primarily:

  • tracks Meraki configuration changes anywhere in your organization,
  • automatically backs up configurations in timestamped snapshots,
  • and then enables you to restore specific configuration backups with just a few clicks.

It’s hard to articulate the value of this solution with just a few bullet points. Let’s dive deeper and walk you through some of its key features, and then highlight the benefits in the succeeding section.

Change Log Detection and Automatically Triggered Snapshot

Safeguard monitors the Meraki change log at intervals of 1 to 5 minutes. Every time configurations change, the changes are automatically captured in a time-stamped snapshot. The solution backs up configurations down to the device level regardless how large your organization is or how many networks and devices you have in it. 

For example, in the screenshot shown below, Safeguard has backed up 309 networks, 5 templates, and 1786 devices belonging to the Waystar Royco organization. 

Having a solution that automatically backs up network configuration changes across your entire enterprise is crucial for ensuring effective disaster recovery. If something bad happens to your network — whether due to a natural disaster, cyber attack, or human error — and you need to revert to a known good configuration, you can only perform that reversion if you have backup copies of trusted configurations. If you rely on manual methods to carry out this task, you might fail to capture some changes. Safeguard’s automated backup process ensures that all configuration changes available through an endpoint are captured.

Preview Change Logs and Perform Point-in-time Comparisons

Once a backup is stored, you can review it in the Snapshot Events page. Safeguard gives you access to back ups for organizational-level configurations, as well as template and network configurations under that organization.

When you access an Entity (a network, template, or organization settings), you can see all saved backups associated with that entity. Each backup is accompanied by a change log that details what was modified, the specific timestamp, and who committed the change. This way, if someone makes an ad hoc configuration change—such as temporarily opening a firewall port or adjusting a VLAN setting—you have a way of knowing.

When reviewing a specific backup, you can compare configurations before and after the change. This comparison provides valuable context, helping you assess whether the change could have security implications. If it does, you can investigate further to determine if it was part of a legitimate operation or potentially malicious activity.

Based on your findings, you can take the appropriate action. For example, if the activity is legitimate, you can ensure that settings are restored once the temporary change is no longer needed. If the activity appears malicious, you can alert your incident response or cybersecurity team and promptly revert to a known secure configuration.

In addition to the change log, you can also review all network and device configuration settings at a specific timestamp by clicking the Backup tab.

There’s also the Compare tab, where you can compare the configurations of different timestamps. You’ll find this useful in several operations. For instance, you can use it to:

  • Choosing the most favorable configuration before executing a restore
  • Documenting changes as part of your change management policy
  • Performing root-cause analysis in the event of a cyber incident.

Download Configuration Settings in a JSON File

Each backup can be downloaded as a JSON file, which has a structured and easily searchable format. You can parse the contents of a JSON file, incorporate them into your audit reports, and then present those reports to compliance auditors for review.

Perform a Configuration Restore

Safeguard combines comprehensive Meraki network backup functionality with fast and flexible recovery. Once you’ve identified a good backup you wish to revert to, you can then perform a point-in-time configuration restore. Select a snapshot event, then choose either a partial or full restore.

A full restore restores all settings, whereas a partial restore lets you to select only those specific settings that you wish to roll back. This feature can come in handy if you wish to revert to previous configurations while keeping configuration changes that you already find appropriate.

Deleted Network / Template Recovery

To reduce clutter, some IT admins make it a habit to delete old network and template configurations. But what if an admin deletes a configuration by accident? That’s not a problem. Safeguard allows you to recover a deleted configuration in just a few clicks.

Just bear in mind that if you delete a network configuration, all devices associated with the network in question will also be removed. Hence, you would have to re-map those devices as part of your recovery process.

Summary of Benefits When Using Safeguard for Standards Compliance

Boundless Safeguard offers the following benefits when used as a Meraki backup and recovery solution for regulatory, security policy, and SLA compliance.

Enables Fast and Reliable Network Recoveries

Safeguard provides enterprises the ability to achieve rapid and reliable network recovery in the event of a misconfiguration-related outage. This capability is essential in meeting stringent regulatory, corporate policy, and SLA uptime or disaster recovery requirements.

Provides an Audit Trail

Each timestamped backup — along with its detailed configuration change logs and other associated information — plus the downloadable JSON files, can serve as part of your audit trail. Audit trails or audit logs are required by data protection laws and regulations, such as PCI DSS, GDPR, and the US Health Insurance Portability and Accountability Act (HIPAA), for investigation and review purposes.

Simplifies Regulatory Compliance Efforts

While it’s theoretically possible to achieve BCDR compliance using manual methods, a manual approach is always time-consuming and prone to human errors. Not only that, it demands much greater administrative overhead. If your IT team is already overloaded with other tasks, you should strive to use automated solutions whenever possible. Boundless Safeguard is the right solution for automated configuration-related BCDR.

Conclusion

Meraki networks are increasingly being used by large enterprises that also happen to be facing various compliance requirements pertaining to disaster recovery. Boundless Safeguard offers a powerful solution that automatically backs up network configurations across entire organizations and then enables quick, effortless recovery.

Would you like a firsthand experience with a fast, easy, and reliable Cisco Meraki disaster recovery solution? Book a quick Boundless Safeguard demo now.

Stay up to speed.
Subscribe to our newsletter.

We Are Unveiling A New Brand Identity

We are proud to announce the launch of our new brand identity, marking a significant milestone in our evolution. This rebrand reflects our commitment to continuous innovation, agility, and automation — always moving forward.