Part of the RECOVER Playbook ← Return to Hub

Offline Backup Verification

Recovery Objective:

Ensure the “Last Line of Defense” is physically secure, uncorrupted, and ready for deployment without shore-side assistance.

An “Offline Backup” is only truly offline if it requires a human to walk to a cabinet and physically plug it in. In maritime cyber-security, this Air-Gap is your only 100% guarantee against Ransomware that targets backup servers.

The Immutable Storage Protocol

To meet UR E26 §4.5.2, manage recovery media using a strict rotation. If the ship is hit at 03:00, you must have a backup from 00:00 that was already unplugged.

Storage Type Security Status Purpose
NAS / Server ONLINE (At Risk) Daily automated snapshots; high convenience.
Removable SSD OFFLINE (Safe) Weekly manual clones; stored in ECR safe.
Master USB/DVD ARCHIVE (Safe) The “Factory Reset” image; stored in Captain’s safe.

The Restoration Drill (Quarterly)

A backup that has never been tested is a backup that doesn’t exist. Perform a “Dry Run” every 3 months:

  1. Selection: Choose one non-essential workstation (e.g., Office PC).
  2. Isolation: Disconnect the target PC from the network completely.
  3. Restore: Wipe the drive and apply the Golden Image from your offline media.
  4. Verify: Confirm OS boots, drivers load, and OT software launches.
  5. Log: Record the “Time to Restore” for the SMS (Safety Management System).

Physical Chain of Custody

Recovery media is a prime target for theft or physical tampering. Auditors look for controlled access:

  • Labeling: Every drive must be labeled with the Asset ID and Backup Date.
  • Location: Stored in fireproof/waterproof safe, away from magnetic sources (motors).
  • Integrity: Cross-reference the Identify Phase asset list to ensure 100% coverage.

Compliance Audit Response

If asked how you know backups aren’t infected: “We use a 7-day rotation. We always have one drive physically disconnected for longer than the standard incident detection window.”

Next Section

Integrity Verification

Integrity Verification Recovery Objective: Confirm that underlying network infrastructure and embedded controllers (PLCs...

Scroll to Top