Recover: Restoration & Resilience

IACS UR E26 Control 4.5: Recovery of Essential Services

The road back to “Business as Usual.” Recovery is the process of restoring compromised systems from verified backups and learning from the event. This phase ensures that the vessel is not only restored but is more resilient than it was before the attack.

Phase: Recover (Step 05)
01
Identify
02
Protect
03
Detect
04
Respond
05
Recover
Restoration & Lessons

Phase Objective: The Clean-Room Restoration

Recovery is a race against the clock. We focus on Immutable Backups and Sanitized Re-entry—restoring systems in a “Sandbox” to ensure we don’t accidentally re-infect the OT network.

PILLAR A

Backup & Restore

Maintaining “Golden Images” and executing the technical restoration of Category II and III assets.

PILLAR B

Forensic Clean-Up

Verifying system integrity and scanning restored data for hidden backdoors before full re-activation.

PILLAR C

Post-Incident Review

The “Lessons Learned” phase. Updating risk assessments and security plans based on the incident findings.

Resilience Tip for ETOs:

A backup is only as good as its last Restore Test. Every quarter, pick one non-critical workstation and perform a full restore from your “Golden Image” to ensure the process actually works in the middle of the ocean.

Scroll to Top