Skip to main content
Penn Information Systems & Computing Systems Home

Search form

System Status
  • Get Started
    • IT Staff
    • Faculty
    • Staff
    • Students
    • Alumni & Guests
    • ISC Staff
  • Services
    • — Services A to Z —
    • Accounts, Access & Security
      • Access Management Services
      • Active Directory
      • Identity Management Services
      • Information Security Services
    • Applications & Data Analytics
      • Application Development & Delivery
      • Data Analytics
        • Data Analytics at Penn
      • Integration Development & Delivery
    • Backup, Storage & Platforms
      • BackItUp
      • Cloud Solutions
      • Data Center & Colocation Solutions
      • Database & Application Platform Support & Consulting
      • Endpoint Management
      • Recovery Solutions
      • Storage
      • Virtual Desktop
      • Virtual Server Hosting
    • Community, Support & Learning
      • Classroom Technology Services
      • Desktop Engineering
      • IT Community Events
      • LinkedIn Learning
      • Tech Center
    • Consulting & Professional Services
      • Brokered Products
      • HireIT
      • Systems Support & Consulting
      • Technology Forecasting
    • Email, Calendaring & Collaboration
      • Classlists
      • Penn Email Routing
      • PennBox
      • PennNet Mailing Lists
      • PennO365
      • PennZoom
      • SMTP-Relay
      • Secure Share
    • Networks & Connectivity
      • Firewall Services
      • Network Design & Installation
      • PennNet
        • Network Names & Numbers
        • MAGPI (Penn's Internet2 Regional Optical Network)
      • PennNet Ethernet Ports
      • Wireless at Penn
    • Phone, TV & Video
      • Broadcasting Studio
      • Contact Center
      • Live Video Streaming
      • Penn Video Network
      • PennFlex Phone
      • PennNet Phone
      • Traditional Telephony
      • Video Content Management
      • Video Production
        • Producing Video Content
    • Web Hosting
      • Web Services
    • — Service Rates —
    • — Service Level Agreements —
  • Security
    • Office of Information Security
    • Security Services
    • Special Projects
    • Policies & Procedures
    • Training & Awareness
  • Collaborations
    • Computing Policies
    • Engaging Penn’s IT Community
    • Identity & Access Management
    • Penn IT Strategic Plan
    • Cloud First
    • Next Generation Unified Communications
    • Penn Bot
    • IT Advisory Groups
      • Common Solutions
      • IT Roundtable
      • Network Policy Committee
      • Penn Technology Investment Committee (PTIC)
        • About PTIC
        • The PTIC IT Development Fund
    • Special Interest Groups (SIGs)
      • Audio-Visual (AV-SIG)
      • Cloud Computing (Cloud-SIG)
      • Data Visualization (DataViz-SIG)
      • Developer SIG (Dev-SIG)
      • High-Performance Computing (HPC-SIG)
      • Instructional Technology SIG
      • Linux SIG
      • Macintosh Networking Group (MacNet)
      • Mobile Technologies (Mobile-SIG)
      • O365 Special Interest Group
      • PC Networking Group (PC-Net)
      • Project Partners SIG
      • Security SIG
      • Social Media SIG
      • Splunk Special Interest Group
      • Super User Group (SUG)
      • Web SIG
    • Technology Services Strategy Review Board
  • News
  • Events
  • About
    • Overview
    • Leadership & Groups
    • Purpose & Values
    • Strategic Goals
    • Recognition
    • Staff Profiles
    • Tech Jobs @ Penn
    • Contact Us
  • Hot Topics
  • Get IT Help
    • Help for Students
    • Help for Faculty & Staff
    • Help for Alumni
    • Help for Guests & Others
    • Resources for IT Staff

You are here

Home » Secure Backup Best Practice

Secure Backup Best Practice

Ransomeware attacks can paralyze an organization when losing access to the data needed for daily operation. One of the best practices to avoid ransomware catastrophe is to back up the organization's data regularly. Simply:

  1. Backup on a regular basis.
  2. Keep backups on separate device/s. 
  3. Store backup offline.
  4. Test the backups regularly. 
Create Backup
  • Backup servers should require authentication of backup clients and of backup administrators
  • Employ Role-Based Access Control (RBAC) for all backups to determine who can make backups and who can restore from backups
  • Backups should be encrypted at rest
  • When sending backups, use encryption in transit (SSH or SFTP/FTPS for example)
  • Create “golden master” (the final version of a software compilation or configuration prior to release into production) prior to host deployment on the network
  • Create snapshot after initial system build to hasten recovery time
  • Create snapshots after major configuration changes to hasten recovery time
  • Ensure that some backups exist in offline media to help recover from data corruption/ransomware
  • Prepare for a rebuild on different hardware/platforms. Consider whether a system image has a compatibility issue. It is best to store source code, executable, or license with backups
Isolate Backup
  • Read/overwrite access-controlled outside the ecosystem being attacked
  • Immutability setting on backup devices: admins can't delete
  • Two-factor for backup admins
  • AWS S3 Object Versioning (and lock, w/bucket creation)
  • Any other architecture where the backup is no longer modifiable from the system that produced the data
Test Backup
  • Test backups regularly
  • Spot check file system backups
  • For large/critical applications, consider documenting the length of time it takes to recover from backup for disaster recovery and planning purposes
Recover Backup
  • Employ role-based access control lists for all recoveries
  • Ensure backup date/time precedes date/time of first known exploitation
  • Create an isolated environment to test the recovery of backups that may still contain malicious code
    • When recovering from an incident, attain a list of IoC’s from the Incident Commander and test backup for the existence of IoC’s prior to recovery on production/live environments
    • Virtual machines may be restored to an isolated “host only” network
Additional Resources
  • ISC's Security Logging Services (Splunk)
  • Multi-State Information Sharing & Analysis Center on Ransomware Guide
  • CISA Stop Ransomware

Visit ISC on LinkedIn

Print
InfoSec Home
Resources

ISC Backup, Storage&Platforms

Duo Integration with SSH, RDP, and VPN

Contact InfoSec
  • Computing Policies
  • Tech Jobs @ Penn
System Status

© 2023 THE UNIVERSITY OF PENNSYLVANIA — 3401 Walnut Street, Philadelphia, PA 19104 — Report accessibility issues and get help — For ISC Staff