Offline Backup Verification
Recovery Objective:
Ensure the “Last Line of Defense” is physically secure, uncorrupted, and ready for deployment without shore-side assistance.
An “Offline Backup” is only truly offline if it requires a human to walk to a cabinet and physically plug it in. In maritime cyber-security, this Air-Gap is your only 100% guarantee against Ransomware that targets backup servers.
The Immutable Storage Protocol
To meet UR E26 §4.5.2, manage recovery media using a strict rotation. If the ship is hit at 03:00, you must have a backup from 00:00 that was already unplugged.
| Storage Type | Security Status | Purpose |
|---|---|---|
| NAS / Server | ONLINE (At Risk) | Daily automated snapshots; high convenience. |
| Removable SSD | OFFLINE (Safe) | Weekly manual clones; stored in ECR safe. |
| Master USB/DVD | ARCHIVE (Safe) | The “Factory Reset” image; stored in Captain’s safe. |
The Restoration Drill (Quarterly)
A backup that has never been tested is a backup that doesn’t exist. Perform a “Dry Run” every 3 months:
- Selection: Choose one non-essential workstation (e.g., Office PC).
- Isolation: Disconnect the target PC from the network completely.
- Restore: Wipe the drive and apply the Golden Image from your offline media.
- Verify: Confirm OS boots, drivers load, and OT software launches.
- Log: Record the “Time to Restore” for the SMS (Safety Management System).
Physical Chain of Custody
Recovery media is a prime target for theft or physical tampering. Auditors look for controlled access:
- Labeling: Every drive must be labeled with the Asset ID and Backup Date.
- Location: Stored in fireproof/waterproof safe, away from magnetic sources (motors).
- Integrity: Cross-reference the Identify Phase asset list to ensure 100% coverage.
Compliance Audit Response
If asked how you know backups aren’t infected: “We use a 7-day rotation. We always have one drive physically disconnected for longer than the standard incident detection window.”
Next Section
Integrity Verification
Integrity Verification Recovery Objective: Confirm that underlying network infrastructure and embedded controllers (PLCs...
