Loading
March 31 2026

Confidently recover cloud apps with cloud rebuild in Cohesity Data Cloud

Boost application resilience with new orchestration capabilities, and your infrastructure-as-code templates.

Cohesity Data Cloud

Today we’re excited to introduce a major enhancement to Cohesity Data Cloud: cloud rebuild. Organizations can use these new capabilities to quickly restore cloud applications after a cyberattack or another adverse event. The new features are generally available

Administrators can accelerate the recovery of cloud environments using Terraform files and perform an orchestrated recovery of select AWS services into a designated recovery environment. 

This unique approach—using validated infrastructure-as-code (IaC) definitions as the source of truth—helps organizations restore cloud applications to known good states faster, more accurately, and without manual reconstruction.  

Why your cloud app recovery plans should use IaC files and a clean room

Cloud rebuild in Cohesity Data Cloud features two components: the aforementioned IaC files as a “source of truth” for the desired state of the environment and integration with the Cohesity Clean Room Solution.

In the event of a cyber incident, customers can use existing Cohesity Clean Room Solution capabilities to investigate and eradicate threats, before restoring clean resources into production. This allows organizations to restore business services quickly and accurately, without reintroducing risk.

Here’s a closer look at how this works in practice.

  1. Define the cloud application using infrastructure as code.
    Cohesity Data Cloud ingests Terraform configuration files, the Terraform state file, and automatically discovers the application resources and dependencies within minutes.  

  2. Protect and version IaC files and workloads.
    Cohesity Data Cloud backs up the processed Terraform configuration files and state file over time, creating point-in-time versions aligned to your recovery objectives. In addition, supported workloads declared in the configuration files are protected within Cohesity Data Cloud.

    During recovery, users select the desired point-in-time IaC definition, which is then used to recreate the infrastructure before workloads are restored into the rebuilt environment.

  3. Configure automated recovery workflows.
    Use Cohesity Data Cloud to define blueprint-based workflows that orchestrate the recovery of the cloud environment, including infrastructure and protected workloads. These workflows control recovery sequencing, dependency mapping, and target recovery environments—ensuring cloud applications are restored in the correct order and brought back online consistently and predictably.

  4. Investigate and validate application workloads in a clean room during cyber incidents.
    Use Cohesity’s advanced security capabilities: cyber recovery orchestration and threat protection to rapidly recover and scan application workloads for threats in an isolated recovery environment (clean room). This provides a safe space to validate recommended recovery points, perform forensic analysis without exposing production systems to risk, and mitigate threats. Create a clean and production-ready backup copy once a trusted recovery point is identified.

  5. Execute cloud application recovery.
    Restore the cloud application into the desired recovery environment, ensuring application modules are recovered in the right sequence, and with orchestration handled automatically.

Why this matters now

Rebuilding cloud applications after a disaster, outage, or cyberattack is far more complex than just restoring the data. Modern apps run on highly distributed, ephemeral infrastructure that spans compute, containers, storage, IAM roles, and network controls. Over time, configuration drift, misconfigurations, and third-party dependencies create structurally fragile environments that are difficult to secure—and even harder to rebuild—with confidence.

Traditional backup tools were designed primarily to restore data, not to automatically protect and orchestrate recovery of cloud applications at scale. In the cloud, where infrastructure constantly evolves, this limitation becomes critical to address.

That’s why we’ve delivered a fresh approach to application resilience.

Take the next step to better cyber resilience

Deploy these new capabilities in your cloud environments, and you’ll be able to:

  • Recover supported cloud applications quickly and accurately. Restore select AWS workloads, as defined by Terraform, to rebuild infrastructure, configurations, and data. This ensures applications operate properly after outages or cyberattacks.

  • Rebuild applications exactly as designed. Use validated IaC definitions to automatically discover application dependencies and ensure environments are restored to known good states.  

  • Restore without reintroducing risk. Validate and scan data in an isolated clean room before restoration, preventing malware from being brought back into production. 

  • Reduce downtime and operational risk. Automate and orchestrate recovery to reduce recovery time and human error during high-pressure incidents.

Cohesity helps organizations like yours restore business operations quickly, securely, and with confidence—strengthening both business continuity and cyber resilience.

Ready to learn more?

 

Written By