<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>paul-adrien Faineant, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/paul-adrien-faineant/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/paul-adrien-faineant/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 06 May 2026 14:56:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>paul-adrien Faineant, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/paul-adrien-faineant/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Backups: The Last Line of Defense Against Ransomware Part 2 </title>
		<link>https://www.riskinsight-wavestone.com/en/2026/05/backups-the-last-line-of-defense-against-ransomware-part-2/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2026/05/backups-the-last-line-of-defense-against-ransomware-part-2/#respond</comments>
		
		<dc:creator><![CDATA[paul-adrien Faineant]]></dc:creator>
		<pubDate>Wed, 06 May 2026 14:56:14 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[air gapping]]></category>
		<category><![CDATA[Immutability]]></category>
		<category><![CDATA[Protecting Backups]]></category>
		<category><![CDATA[Risk-Based approach]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=29921</guid>

					<description><![CDATA[<p>This article is structured around four complementary approaches aimed at strengthening end‑to‑end backup security. After addressing, in Part 1, backup usability (1) and the security of the backup infrastructure (2), this second part focuses on the last two approaches: protecting...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/05/backups-the-last-line-of-defense-against-ransomware-part-2/">Backups: The Last Line of Defense Against Ransomware Part 2 </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span style="color: #000000;">This article is structured around four complementary approaches aimed at strengthening end‑to‑end backup security. After addressing, in Part 1, backup usability (1) and the security of the backup infrastructure (2), this second part focuses on the last two approaches: protecting backups against logical destruction (3) and identifying the residual risks associated with the measures implemented (4). </span></p>
<p style="text-align: justify;"><span style="color: #000000;" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1 style="text-align: justify;"><span style="color: #000000;"><b>3. Protecting backups against logical destruction</b> </span></h1>
<p style="text-align: justify;"><span style="color: #000000;">As part of a defense‑in‑depth approach to backup protection, and in light of the threat landscape observed, the assumption of an illegitimate takeover of components within the storage and backup infrastructure must be considered. </span></p>
<p style="text-align: justify;"><span style="color: #000000;">More generally, in order to effectively reduce the risk of data loss, best practice dictates ensuring that backups are not exposed to the same risks (cyber or otherwise) as the stored data. This approach is notably based on diversifying backup media, implementing physical or logical segregation, and maintaining at least one isolated copy that is both offline and off‑site. </span></p>
<p style="text-align: justify;"><span style="color: #000000;">The use of mechanisms designed to prevent the alteration or deletion of backed‑up data,even in the event of a successful attack on the storage and backup infrastructure, should therefore be considered. </span></p>
<p style="text-align: justify;"><span style="color: #000000;"><i>Immutability</i> and <i>air gapping</i> represent the two main approaches in this area. While these concepts are widely promoted by vendors, the solutions available and the residual risks associated with their implementation vary. It is therefore essential to fully understand the underlying mechanisms of these solutions in order to select the one that best addresses the required risk coverage. </span></p>
<p style="text-align: justify;"><span style="color: #000000;"><i>According to the Cyber Benchmark conducted by Wavestone, nearly 65% of organizations implement immutability or air</i>‑<i>gapping mechanisms, at least for critical functions, and 21% apply them across all of their backups.</i> </span></p>
<p style="text-align: justify;"><span style="color: #000000;" data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:259}"> </span></p>
<h2 style="text-align: justify;"><span style="color: #000000;"><b>Backup Immutability, an Increasingly Adopted Technique</b> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #000000;">&#8220;Data immutability means that data can be written but cannot be modified or deleted” (NIST). </span></p>
<p style="text-align: justify;"><span style="color: #000000;">Far from being uniform, its implementation relies on a variety of technical approaches whose robustness varies depending on whether they are based on hardware or software mechanisms. </span></p>
<p style="text-align: justify;"><span style="color: #000000;"><strong>a. Purely Hardware-Based Mechanisms </strong></span></p>
<ul style="text-align: justify;">
<li><span style="color: #000000;"><b>LTO WORM cartridges (with compatible hardware/firmware)</b> </span><br /><span style="color: #000000;">These magnetic tape cartridges allow data to be written once, preventing any subsequent modification or deletion, provided that the hardware and firmware support WORM (Write Once, Read Many) mode. </span></li>
</ul>
<p style="text-align: justify;"><span style="color: #000000;">     For more specific use cases : </span></p>
<ul style="text-align: justify;">
<li><span style="color: #000000;"><b>Blu</b>‑<b>ray jukeboxes</b> </span><br /><span style="color: #000000;">This robotic system uses WORM Blu‑ray discs to permanently store data, rendering it physically unalterable once written. </span></li>
<li><span style="color: #000000;"><b>Flash storage with WORM controller (firmware / e</b>‑<b>Fuse bit)</b> </span><br /><span style="color: #000000;">Some flash storage devices incorporate a controller with dedicated firmware or hardware mechanisms such as e‑Fuse bits, enabling data to be permanently locked after being written. </span></li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #000000;"><strong>b. Software-Based Mechanisms, Embedded or Appliance-Based </strong></span></p>
<ul style="text-align: justify;">
<li><span style="color: #000000;"><b>Hardware appliance with local management</b> </span><br /><span style="color: #000000;">This is a backup‑dedicated appliance, locally configured to enforce immutability policies, often through software locks or non‑modifiable retention periods. </span></li>
<li><span style="color: #000000;"><b>Hardware appliance with online management</b> </span><br /><span style="color: #000000;">This type of appliance enables remote management, sometimes via an out‑of‑band channel, ensuring that immutability policies cannot be altered even if the primary network is compromised. </span></li>
<li><span style="color: #000000;"><b>Software installed on the organization’s operating systems</b> </span><br /><span style="color: #000000;">Some software solutions allow immutability rules to be defined directly at the operating system level. However, this approach may be less robust, as it can be vulnerable if the host system is compromised. </span></li>
<li><span style="color: #000000;"><b>Cloud capabilities (e.g., Amazon S3 Glacier / Azure Blob Storage)</b> </span><br /><span style="color: #000000;">Cloud storage services offer immutability features through retention policies or WORM locks, ensuring that stored objects cannot be modified or deleted for a defined period. </span></li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #000000;">It should be noted that the level of immutability can be adjusted based on the nature of the data concerned, in order to optimize the balance between security requirements and operational constraints. </span></p>
<p style="text-align: justify;"><span style="color: #000000;">Immutability is increasingly observed as a mechanism deployed within backup protection strategies and remains more commonly implemented than air gapping. </span></p>
<p style="text-align: justify;"><span style="color: #000000;" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2 style="text-align: justify;"><span style="color: #000000;"><b>Backup Air Gapping : A Technique Observed but Less Optimized</b> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #000000;">An air gap<i>4</i> is defined as “an interface between two systems in which (a) the systems are not physically connected and (b) any logical connection is not automated (i.e., data is transferred across the interface only manually, under human control).” </span></p>
<p style="text-align: justify;"><span style="color: #000000;">Like immutability, air gapping can be implemented in various ways, including: </span></p>
<p style="text-align: justify;"><span style="color: #000000;"><strong>Physical implementations  :</strong></span></p>
<ol style="text-align: justify;">
<li><span style="color: #000000;"><b>Offline, protected tape storage (primarily at a remote site)</b> </span><br /><span style="color: #000000;">Magnetic tapes are removed from the active backup system and stored in a physically separate location, preventing any network or automated access. </span></li>
<li><span style="color: #000000;"><b>Tapes stored in a backup robot</b> </span><br /><span style="color: #000000;">Although physically connected, certain backup robot configurations allow tapes to be logically disconnected when not in use, thereby limiting the risk of unauthorized access. </span></li>
<li><span style="color: #000000;"><b>Other removable storage media such as disks (stored offline)</b> </span><br /><span style="color: #000000;">Hard drives or SSDs can be used to transfer data, then physically disconnected and stored in a secure environment, ensuring full isolation. </span></li>
<li><span style="color: #000000;"><b>Optical data diode transfer gateways</b> </span><br /><span style="color: #000000;">These devices enable one‑way data transfer, physically preventing any return flow of information or commands to the source system and providing a certain level of separation. When native support is not provided by backup software vendors, third‑party software agents enabling unidirectional transfer must be used in addition. </span></li>
</ol>
<p style="text-align: justify;"><span style="color: #000000;" data-ccp-props="{&quot;335559685&quot;:1080}"> </span></p>
<p style="text-align: justify;"><span style="color: #000000;"><strong>Logical Air‑Gap Implementations (Departing from Physical Isolation) :</strong></span></p>
<ol style="text-align: justify;">
<li><span style="color: #000000;"><b>“Saloon door” network ports opened only during synchronization</b> </span><br /><span style="color: #000000;">Network connections are temporarily enabled to allow data synchronization and then automatically disabled, thereby limiting the exposure window and requiring strict controls to ensure that only legitimate replication traffic is authorized. </span></li>
<li><span style="color: #000000;"><b>Isolation through access control and encryption capabilities</b> </span><br /><span style="color: #000000;">Strict access control mechanisms combined with encryption make it possible to restrict access to backups to precisely defined users and time windows. </span></li>
<li><span style="color: #000000;"><b>Backup as a Service (isolated private cloud / third</b>‑<b>party cloud)</b> </span><br /><span style="color: #000000;">Some externalized backup offerings provide full logical isolation by segregating customer environments and limiting network interactions to strictly controlled channels. However, the risk of compromise is not null, as illustrated by a successful attack in 2025 against an online backup service targeting firewall configurations. </span></li>
</ol>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #000000;">Subject to a risk analysis, particularly when relying on logical solutions, implementing data immutability should generally be prioritized over air gapping. </span></p>
<p style="text-align: justify;"><span style="color: #000000;">While immutability and air gapping constitute effective safeguards to preserve the integrity, and even the confidentiality, of traditional backups against risks of modification or exfiltration, other approaches that are more focused on operational optimization also warrant consideration. </span></p>
<p style="text-align: justify;"><span style="color: #000000;">In this context, the objective is no longer to secure full data copies, but rather to rely on alternative mechanisms enabling rapid and large‑scale restoration, often at the cost of certain trade‑offs. This is notably the case with snapshots, which have emerged as a preferred technical solution in environments where recovery performance takes precedence over backup completeness or robustness. </span></p>
<p style="text-align: justify;"><span style="color: #000000;" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2 style="text-align: justify;"><span style="color: #000000;"><strong>Snapshots: A Fast Recovery Solution, but Not a Full-Fledged Backup </strong></span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #000000;">To better understand what the concept of a snapshot technically entails, it is useful to refer to the definition provided by NIST: “A record of the state of a running image, typically captured as the differences between a reference image and the current state.” </span></p>
<p style="text-align: justify;"><span style="color: #000000;">In other words, a snapshot represents an instantaneous capture of the state of a file system or data volume at a given point in time. Unlike a full backup, it records only the blocks or files that have changed since the reference state. This mechanism, which is fast and resource‑efficient, is particularly well suited to environments where rapid recovery is a priority. It is therefore widely used in virtualized and cloud infrastructures. </span></p>
<p style="text-align: justify;"><span style="color: #000000;">However, this operational efficiency comes with notable trade‑offs in terms of backup quality. Snapshots do not constitute independent copies of data; they depend on the integrity of the host system. In the event of corruption of the primary volume, snapshots may become unusable. In addition, their lifecycle management (rotation, retention, application consistency) requires particular rigor to avoid operational drift. </span></p>
<p style="text-align: justify;"><span style="color: #000000;">While effective in accelerating business recovery, snapshots cannot replace a true backup strategy. They should be considered as a complement to more robust mechanisms that ensure long‑term data durability and integrity. </span></p>
<p style="text-align: justify;"><span style="color: #000000;">Whether dealing with snapshots or traditional backups, their integration into a protection architecture requires a thorough risk analysis, including the identification of residual vulnerabilities. </span></p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><span style="color: #000000;">4. <b style="font-size: revert;">Risk-Based approach and identification of residual risks</b><span style="font-size: revert; font-weight: revert;" data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:259,&quot;335559991&quot;:360}"> </span></span></h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #000000;">Given the stakes associated with irreversible data loss and/or prolonged disruption of critical business activities, risk analysis applied to backup mechanisms is not an optional step but rather a fundamental pillar of a consistent and well‑controlled backup strategy. </span></p>
<p style="text-align: justify;"><span style="color: #000000;" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2 style="text-align: justify;"><span style="color: #000000;"><b>Embedding Risk Analysis at the Core of Backup Management</b> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #000000;">Whether or not it is part of a formal certification or authorization process, conducting a risk analysis of backup mechanisms aims to ensure that the controls in place are aligned with identified threats and business continuity requirements. </span></p>
<p style="text-align: justify;"><span style="color: #000000;">In this context, a risk analysis applied to backups, based, for example, on the EBIOS Risk Manager (EBIOS‑RM) methodology proposed by ANSSI, makes it possible to assess existing controls, identify plausible attack scenarios such as compromise of the backup server or data tampering, and evaluate their likelihood. This approach helps prioritize security measures according to their potential impact on business activities, while ensuring that residual risks remain acceptable with regard to business objectives. </span></p>
<p style="text-align: justify;"><span style="color: #000000;">Monitoring residual risks, those that persist despite the implementation of protection measures, is a natural extension of the risk analysis process. It is therefore essential to identify, document, and integrate them into an ongoing security risk management strategy. By way of illustration, such residual risks may include: </span></p>
<ul style="text-align: justify;">
<li><span style="color: #000000;"><b>Insider threat :</b> A malicious administrator or an employee with privileged access may intentionally alter or delete backups. </span></li>
<li><span style="color: #000000;"><b>Compromise of the cloud backup service provider :</b> A compromise of the cloud provider, for example through the exploitation of non‑public vulnerabilities, could allow an attacker to access or manipulate backups while bypassing customer‑side security mechanisms. </span></li>
<li><span style="color: #000000;"><b>Compromise of customer (tenant) accounts :</b> Unauthorized access to customer accounts may result in loss of control over backups, including their deletion or alteration. </span></li>
<li><span style="color: #000000;"><b>Destruction of backup solution assets :</b> If the backup infrastructure is destroyed (physically or logically), restoring backups may become difficult or even impossible in the event of the loss of critical resources such as: </span>
<ul>
<li><span style="color: #000000;">Backup catalogs / backup tool databases </span></li>
<li><span style="color: #000000;">Secrets such as decryption keys </span></li>
</ul>
</li>
<li><span style="color: #000000;"><b>Technical compromise of the backup tool :</b> An attacker may render backups unusable by exploiting technical vulnerabilities in the backup software or the host system, including via low‑level out‑of‑band access mechanisms such as iLO or iDRAC. </span></li>
<li><span style="color: #000000;"><b>Compromise of administrative accounts :</b> Even with immutability mechanisms in place, functional compromise of administrative accounts may allow an attacker to disable or bypass protections before, and in some cases after, data is written (retention periods, time‑management mechanisms, etc.). </span></li>
<li><span style="color: #000000;"><b>Compromise of the backup tool’s cybersecurity controls :</b> If an attacker tampers with backup protection settings, such as encryption parameters (e.g., <i>encryption_secret</i>), backups may remain unusable.  </span></li>
</ul>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><span style="color: #000000;"><b>Once a secure backup solution is implemented, complement the analysis with periodic audits, Including Red Team Exercises</b> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #000000;">In addition to theoretical risk analysis and residual risk monitoring, periodic audits help identify vulnerabilities related to the implementation of the backup solution. Among the possible audit types, Red Team exercises aim to reproduce the behavior of an attacker seeking to destroy backups. These exercises also serve to test the effectiveness of the technical and human measures in place for protection, detection, and response to an attack. </span></p>
<p style="text-align: justify;"><span style="color: #000000;" data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:2,&quot;335559740&quot;:300}"> </span></p>
<h1 style="text-align: justify;"><span style="color: #000000;"><b>Conclusion</b> </span></h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #000000;">Protecting backups against ransomware relies on a holistic approach rather than a purely “product‑based” one : </span></p>
<ul style="text-align: justify;">
<li><span style="color: #000000;">Continuously verifying the reliability of backups to ensure effective reconstruction of the information system; </span></li>
<li><span style="color: #000000;">Securing the backup infrastructure by reducing its attack surface; </span></li>
<li><span style="color: #000000;">Protecting backed‑up data, with immutability as a priority; </span></li>
<li><span style="color: #000000;">Adopting a cross‑functional, risk‑driven approach to security management. </span></li>
</ul>
<p style="text-align: justify;"><span style="color: #000000;">The level of rigor required for backup security will continue to increase as attackers refine their techniques and strengthen their capabilities.  </span></p>
<p style="text-align: justify;"><span style="color: #000000;">Continuous vigilance and adaptation to the evolving threat landscape therefore remain the strongest allies of a resilient backup strategy. </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/05/backups-the-last-line-of-defense-against-ransomware-part-2/">Backups: The Last Line of Defense Against Ransomware Part 2 </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2026/05/backups-the-last-line-of-defense-against-ransomware-part-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Backups : The Last Line of Defense Against Ransomware &#8211; Part 1 </title>
		<link>https://www.riskinsight-wavestone.com/en/2026/04/backups-the-last-line-of-defense-against-ransomware-part-1/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2026/04/backups-the-last-line-of-defense-against-ransomware-part-1/#respond</comments>
		
		<dc:creator><![CDATA[paul-adrien Faineant]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 06:36:52 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cybercriminality]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=29548</guid>

					<description><![CDATA[<p>In 2025, ransomware attacks remained a persistent threat and increasingly targeted backup systems (21% of attacks targeted backups in 2021, compared with 90% in 2025 [1] ). Protecting backups,&#160;now also subject to strengthened regulatory requirements such as NIS 2,&#160;has therefore...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/04/backups-the-last-line-of-defense-against-ransomware-part-1/">Backups : The Last Line of Defense Against Ransomware &#8211; Part 1 </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span data-contrast="auto">In 2025, ransomware attacks remained a persistent threat and increasingly targeted backup systems (21% of attacks targeted backups in 2021, compared with 90% in 2025 [</span><span data-contrast="auto">1] </span><span data-contrast="auto">). Protecting backups,&nbsp;now also subject to strengthened regulatory requirements such as NIS 2,&nbsp;has therefore become a top priority in addressing this threat.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:360}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">This article presents four complementary approaches to strengthening end-to-end backup security:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<ol>
<li><strong>Continuously ensuring the availability of usable backups&nbsp;</strong></li>
<li><strong>Strengthening the security of the backup infrastructure against attacker takeover&nbsp;</strong></li>
<li><strong>Protecting backups against logical destruction&nbsp;</strong></li>
<li><strong>Identifying&nbsp;residual risks&nbsp;in light of&nbsp;the measures implemented&nbsp;</strong></li>
</ol>
<p>&nbsp;</p>
<p style="text-align: justify;"><span data-contrast="auto">This article is published in two parts: the first focuses on approaches 1 and 2, followed by a second publication covering approaches 3 and 4.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">The recommendations presented do not replace those set out in ANSSI guidelines, which define the fundamental principles of backup [</span><span data-contrast="auto">2]</span><span data-contrast="auto">&nbsp;practices.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-29535" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/image.png" alt="Renforcer la sécurisation des sauvegardes par 4 approches" width="579" height="519" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/image.png 579w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/image-213x191.png 213w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/image-44x39.png 44w" sizes="(max-width: 579px) 100vw, 579px" /></span></p>
<p style="text-align: center;"><em>Figure 1: Strengthening Backup Security Through Four Approaches&nbsp;</em></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:720}">&nbsp;</span></p>
<h1><b><span data-contrast="none">1. Continuously ensuring the availability of usable backups</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:1080,&quot;335559740&quot;:259,&quot;335559991&quot;:360}">&nbsp;</span></h1>
<p style="text-align: justify;"><span data-contrast="auto">To guarantee the availability of usable backups, it is essential to apply fundamental best practices.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<h2><b><span data-contrast="none">Ensuring backup completeness and consistency</span></b><span data-ccp-props="{}">&nbsp;</span></h2>
<p>&nbsp;</p>
<p style="text-align: justify;"><span data-contrast="auto">In the context of a ransomware attack, the primary&nbsp;objective&nbsp;of backups is to provide a reliable data source enabling the reconstruction of the information system. Backups are truly effective only if they&nbsp;contain&nbsp;all the elements&nbsp;required&nbsp;for full recovery. This notably includes&nbsp;businesscritical&nbsp;data, configurations of business applications and systems, installation sources, as well as critical operational data such as password vaults, licenses, and operational documentation.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">Backup completeness alone is not sufficient. The need for data&nbsp;consistency&nbsp;points across backups originating from different sources (e.g., a document management system (DMS) database and its associated files) must also be&nbsp;taken into account. Conducting a preliminary analysis helps&nbsp;facilitate&nbsp;data resynchronization across different repositories during the recovery phase.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">In addition, it is necessary to&nbsp;maintain&nbsp;backups of the&nbsp;infrastructure itself&nbsp;to enable identical reconstruction. These backups must include the backup catalog, software installation sources, encryption keys, and all other required secrets. A copy of configuration parameters should be stored in a separate location,&nbsp;such as an offline environment,&nbsp;distinct from the primary infrastructure,&nbsp;in order to&nbsp;limit the risk of a shared compromise.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p>&nbsp;</p>
<p style="text-align: justify;"><i><span data-contrast="none">According to the Cyber Benchmark conducted by Wavestone across more than 170 assessed organizations, approximately </span></i><b><i><span data-contrast="none">90%</span></i></b><i><span data-contrast="none">&nbsp;of the&nbsp;organizations&nbsp;observed&nbsp;perform&nbsp;regular&nbsp;data backups.</span></i>&nbsp;<br><i><span data-contrast="none">Among&nbsp;organizations&nbsp;that&nbsp;perform&nbsp;regular&nbsp;backups:</span></i><span data-ccp-props="{&quot;335559685&quot;:0}">&nbsp;</span></p>
<ul>
<li><i><span data-contrast="none">Approximately&nbsp;</span></i><b><i><span data-contrast="none">65%</span></i></b><i><span data-contrast="none">&nbsp;conduct&nbsp;</span></i><b><i><span data-contrast="none">restoration&nbsp;tests</span></i></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></li>
<li><i><span data-contrast="none">Approximately&nbsp;</span></i><b><i><span data-contrast="none">20%</span></i></b><i><span data-contrast="none">&nbsp;perform&nbsp;</span></i><b><i><span data-contrast="none">business data&nbsp;consistency&nbsp;checks</span></i></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">In this context, various controls must be defined and implemented on a regular basis.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<h2><b><span data-contrast="none">Testing Backup Reliability Through Regular Controls</span></b><span data-ccp-props="{}">&nbsp;</span></h2>
<p>&nbsp;</p>
<p style="text-align: justify;"><span data-contrast="auto">A first&nbsp;level of control aims to ensure that backups are effectively performed and remain usable. This can be based on the application of daily verification procedures relying on evidence such as reports, logs, and alerts. These checks may be manual or (semi)&nbsp;automated. However, an&nbsp;additional&nbsp;human review&nbsp;remains&nbsp;necessary to ensure that indicators and alerts are not misleading,&nbsp;particularly&nbsp;in the event that&nbsp;monitoring&nbsp;and control mechanisms have been compromised or disabled by an attacker.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">This first level also includes periodic restoration tests, carried out on representative scopes,&nbsp;in order to&nbsp;verify,&nbsp;where possible with the involvement of application or business subject-matter experts,&nbsp;the integrity and completeness of the data&nbsp;required&nbsp;for business recovery.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">The second level consists&nbsp;in&nbsp;ensuring that first-level checks are properly applied. It relies on independent controls or formalized processes. Dashboards may be used to centralize confidence-level indicators by correlating the results of daily operational checks with restoration test outcomes.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">Once the reliability of backups has been&nbsp;established, restoration processes should be&nbsp;optimized&nbsp;by regularly testing them and ensuring their effectiveness.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<h2><b><span data-contrast="none">Industrializing Restoration Processes to Optimize Recovery Time&nbsp;in the Event of&nbsp;a Compromise</span></b><span data-ccp-props="{}">&nbsp;</span></h2>
<p>&nbsp;</p>
<p style="text-align: justify;"><span data-contrast="auto">To reduce recovery time following a compromise, it is essential to industrialize restoration&nbsp;processes at&nbsp;scale&nbsp;in order to&nbsp;support mass recoveries. This requires preparing these processes in advance, testing them regularly, and adapting them to different destruction scenarios.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">As the restoration phase of an information system may extend over several weeks,&nbsp;or even several months,&nbsp;it is necessary to increase backup retention periods for the data to be restored,&nbsp;in order to&nbsp;prevent their loss through overwriting or premature deletion.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">Restoration processes must also include mechanisms to rapidly assess the state of&nbsp;backedup&nbsp;data by&nbsp;identifying,&nbsp;based on indicators of compromise,&nbsp;data that has been compromised,&nbsp;modified, or corrupted,&nbsp;so as to&nbsp;effectively target the&nbsp;appropriate restoration&nbsp;points.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<h2><b><span data-contrast="none">Integrating the Risk of Backup Compromise into the Restoration Strategy</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559740&quot;:259}">&nbsp;</span></h2>
<p>&nbsp;</p>
<p style="text-align: justify;"><span data-contrast="auto">To ensure reliable recovery following a compromise, it is essential to account, within the overall restoration strategy, for the risk of alteration or manipulation of&nbsp;backedup&nbsp;data. This involves addressing the risk of data alteration or manipulation occurring upstream of backup processing by the backup agent, for example:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<ul>
<li><span data-contrast="auto">Being able to rely on full backups created prior to the attacker’s intrusion, as&nbsp;identified&nbsp;during the&nbsp;initial&nbsp;investigations. In such cases, the&nbsp;backedup&nbsp;data can be considered uncompromised and used to rebuild systems and applications.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">When restoring unaltered application or system components that are not reinstalled from trusted sources, the restoration process must also include the application of security patches and hardening measures to prevent any&nbsp;subsequent&nbsp;compromise.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">The backup process alone cannot prevent potential data compromise before the data is handed over to it. Depending on the context,&nbsp;additional&nbsp;measures may be implemented, such as:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<ul>
<li><span data-contrast="auto">Protecting data integrity through system-level mechanisms and/or cryptographic&nbsp;means;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></li>
<li><span data-contrast="auto">Detecting data alteration through application-level validation,&nbsp;monitoring&nbsp;of “canary&nbsp;files” data, or the use of an EDR (Endpoint Detection and Response) solution.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">These topics must be addressed in addition to backup protection measures.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<h2><b><span data-contrast="none">Extending Backup and Restoration Best Practices to Cloud Environments</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559740&quot;:259}">&nbsp;</span></h2>
<p>&nbsp;</p>
<p style="text-align: justify;"><span data-contrast="auto">Finally, the backup rules defined for&nbsp;onpremises&nbsp;environments must be replicated and adapted to cloud environments.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p style="text-align: justify;"><i><span data-contrast="none">According to the Cyber Benchmark conducted by Wavestone, approximately 25% of the organizations observed have a regularly reviewed and updated backup policy covering both onpremises and cloud environments.</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:259}">&nbsp;</span></p>
<p style="text-align: justify;"><i><span data-contrast="none">In addition,&nbsp;around&nbsp;29% of&nbsp;organizations&nbsp;externalize&nbsp;a backup of&nbsp;their&nbsp;cloud data to&nbsp;another&nbsp;region&nbsp;or to an&nbsp;onpremises&nbsp;environment,&nbsp;ensuring&nbsp;resilience&nbsp;against&nbsp;cyberattacks&nbsp;and&nbsp;regularly&nbsp;testing&nbsp;this&nbsp;process.</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:259}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">Beyond the usability of backups, securing the infrastructure that hosts them&nbsp;represents&nbsp;an equally critical challenge,&nbsp;one that is sometimes insufficiently addressed.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<h1><b><span data-contrast="none">2. Strengthening the security of the backup infrastructure against attacker takeover</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559740&quot;:259}">&nbsp;</span></h1>
<p>&nbsp;</p>
<p style="text-align: justify;"><span data-contrast="auto">Before considering more advanced mechanisms, it&nbsp;is important to recall that effective backup protection first relies on best practices for securing the backup infrastructure, notably those documented by ANSSI</span><span data-contrast="auto">3</span><span data-contrast="auto">. A compromise of this infrastructure could indeed result in the alteration of backups (encryption, destruction, etc.).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p>&nbsp;</p>
<h2><b><span data-contrast="none">Ensuring Defense in Depth for the Backup Infrastructure</span></b><span data-ccp-props="{}">&nbsp;</span></h2>
<p>&nbsp;</p>
<p style="text-align: justify;"><span data-contrast="auto">These best practices include segregating production and backup environments, using dedicated administrative accounts, and hardening infrastructure components,&nbsp;particularly through the application of ANSSI hardening guides applicable to Windows, Linux, and other systems. They also apply to backup agents, which may&nbsp;constitute&nbsp;a propagation vector toward production systems.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">In addition to hardening measures, the backup infrastructure must be subject to both technical and cybersecurity monitoring.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<h2><b><span data-contrast="none">Implementing technical and cyber monitoring of backup infrastructures</span></b><span data-ccp-props="{}">&nbsp;</span></h2>
<p>&nbsp;</p>
<p style="text-align: justify;"><span data-contrast="auto">Technical monitoring of backup infrastructures helps ensure&nbsp;their proper&nbsp;operation and detect any anomalies. The effective handling of detected anomalies must be regularly reviewed.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">Cybersecurity monitoring of the backup infrastructure relies on&nbsp;appropriate logging&nbsp;and traffic analysis. It must be capable of detecting the main attack techniques&nbsp;observed&nbsp;in the wild.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<h2><b><span data-contrast="none">Maintaining&nbsp;Threat Intelligence Focused on Backup Systems</span></b><span data-ccp-props="{}">&nbsp;</span></h2>
<p>&nbsp;</p>
<p style="text-align: justify;"><span data-contrast="auto">Threat intelligence specifically targeting backup systems must be&nbsp;maintained, beyond the technical vulnerability monitoring performed as part of&nbsp;maintaining&nbsp;the backup infrastructure in a secure operating condition. This&nbsp;threat&nbsp;intelligence should cover attack techniques and tactics used against backup infrastructures,&nbsp;in order to&nbsp;anticipate&nbsp;potential attacks and adapt protection, detection, and response capabilities accordingly.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">Despite the measures implemented to prevent the compromise of backup infrastructures, the risk of logical destruction&nbsp;remains&nbsp;and must be&nbsp;anticipated.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}">&nbsp;</span></p>
<p>&nbsp;</p>
<h1>Reference</h1>
<p>[1] Wavestone, <a href="https://www.wavestone.com/en/insight/2024-wavestone-cert-report/">CERT</a></p>
<p>[2] ANSSI, <a href="https://messervices.cyber.gouv.fr/guides/fondamentaux-sauvegarde-systemes-dinformation">Sauvegarde des systèmes d&#8217;information</a></p>
<p>[3] ANSSI, <a href="https://messervices.cyber.gouv.fr/guides/fondamentaux-sauvegarde-systemes-dinformation">Sauvegarde des systèmes d&#8217;information</a></p>






<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/04/backups-the-last-line-of-defense-against-ransomware-part-1/">Backups : The Last Line of Defense Against Ransomware &#8211; Part 1 </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2026/04/backups-the-last-line-of-defense-against-ransomware-part-1/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
