Security guidance for backup
Once we have decided on a backup strategy, it is essential to comply with certain guidelines that ensure the security of our backups:
- Isolated environment with access control: To prevent unauthorized access, restrict access to the backup environment. Restricting access can be achieved with the following:
- IP whitelisting: Only allow specific IPs to access the backup storage, especially if it’s external.
- User access control: Differentiate between general users and admins. Use roles and permissions to grant differential access.
- Access through a VPN: Access to the resources that contain the backups should be permitted for individuals who are on the same network.
- Zero trust model: Implement a zero trust security model where no user or device is trusted by default, whether inside or outside the network.
- At rest encryption with rotatable encryption keys: Encrypt backups when stored. Always use modern encryption standards. Regularly rotate the encryption...