<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Risk-Based approach - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/risk-based-approach/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/risk-based-approach/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 06 May 2026 14:56:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Risk-Based approach - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/risk-based-approach/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Backups: The Last Line of Defense Against Ransomware Part 2 </title>
		<link>https://www.riskinsight-wavestone.com/en/2026/05/backups-the-last-line-of-defense-against-ransomware-part-2/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2026/05/backups-the-last-line-of-defense-against-ransomware-part-2/#respond</comments>
		
		<dc:creator><![CDATA[Axel Petersen]]></dc:creator>
		<pubDate>Wed, 06 May 2026 14:56:14 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[air gapping]]></category>
		<category><![CDATA[Immutability]]></category>
		<category><![CDATA[Protecting Backups]]></category>
		<category><![CDATA[Risk-Based approach]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=29921</guid>

					<description><![CDATA[<p>This article is structured around four complementary approaches aimed at strengthening end‑to‑end backup security. After addressing, in Part 1, backup usability (1) and the security of the backup infrastructure (2), this second part focuses on the last two approaches: protecting...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/05/backups-the-last-line-of-defense-against-ransomware-part-2/">Backups: The Last Line of Defense Against Ransomware Part 2 </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span style="color: #000000;">This article is structured around four complementary approaches aimed at strengthening end‑to‑end backup security. After addressing, in Part 1, backup usability (1) and the security of the backup infrastructure (2), this second part focuses on the last two approaches: protecting backups against logical destruction (3) and identifying the residual risks associated with the measures implemented (4). </span></p>
<p style="text-align: justify;"><span style="color: #000000;" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1 style="text-align: justify;"><span style="color: #000000;"><b>3. Protecting backups against logical destruction</b> </span></h1>
<p style="text-align: justify;"><span style="color: #000000;">As part of a defense‑in‑depth approach to backup protection, and in light of the threat landscape observed, the assumption of an illegitimate takeover of components within the storage and backup infrastructure must be considered. </span></p>
<p style="text-align: justify;"><span style="color: #000000;">More generally, in order to effectively reduce the risk of data loss, best practice dictates ensuring that backups are not exposed to the same risks (cyber or otherwise) as the stored data. This approach is notably based on diversifying backup media, implementing physical or logical segregation, and maintaining at least one isolated copy that is both offline and off‑site. </span></p>
<p style="text-align: justify;"><span style="color: #000000;">The use of mechanisms designed to prevent the alteration or deletion of backed‑up data,even in the event of a successful attack on the storage and backup infrastructure, should therefore be considered. </span></p>
<p style="text-align: justify;"><span style="color: #000000;"><i>Immutability</i> and <i>air gapping</i> represent the two main approaches in this area. While these concepts are widely promoted by vendors, the solutions available and the residual risks associated with their implementation vary. It is therefore essential to fully understand the underlying mechanisms of these solutions in order to select the one that best addresses the required risk coverage. </span></p>
<p style="text-align: justify;"><span style="color: #000000;"><i>According to the Cyber Benchmark conducted by Wavestone, nearly 65% of organizations implement immutability or air</i>‑<i>gapping mechanisms, at least for critical functions, and 21% apply them across all of their backups.</i> </span></p>
<p style="text-align: justify;"><span style="color: #000000;" data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:259}"> </span></p>
<h2 style="text-align: justify;"><span style="color: #000000;"><b>Backup Immutability, an Increasingly Adopted Technique</b> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #000000;">&#8220;Data immutability means that data can be written but cannot be modified or deleted” (NIST). </span></p>
<p style="text-align: justify;"><span style="color: #000000;">Far from being uniform, its implementation relies on a variety of technical approaches whose robustness varies depending on whether they are based on hardware or software mechanisms. </span></p>
<p style="text-align: justify;"><span style="color: #000000;"><strong>a. Purely Hardware-Based Mechanisms </strong></span></p>
<ul style="text-align: justify;">
<li><span style="color: #000000;"><b>LTO WORM cartridges (with compatible hardware/firmware)</b> </span><br /><span style="color: #000000;">These magnetic tape cartridges allow data to be written once, preventing any subsequent modification or deletion, provided that the hardware and firmware support WORM (Write Once, Read Many) mode. </span></li>
</ul>
<p style="text-align: justify;"><span style="color: #000000;">     For more specific use cases : </span></p>
<ul style="text-align: justify;">
<li><span style="color: #000000;"><b>Blu</b>‑<b>ray jukeboxes</b> </span><br /><span style="color: #000000;">This robotic system uses WORM Blu‑ray discs to permanently store data, rendering it physically unalterable once written. </span></li>
<li><span style="color: #000000;"><b>Flash storage with WORM controller (firmware / e</b>‑<b>Fuse bit)</b> </span><br /><span style="color: #000000;">Some flash storage devices incorporate a controller with dedicated firmware or hardware mechanisms such as e‑Fuse bits, enabling data to be permanently locked after being written. </span></li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #000000;"><strong>b. Software-Based Mechanisms, Embedded or Appliance-Based </strong></span></p>
<ul style="text-align: justify;">
<li><span style="color: #000000;"><b>Hardware appliance with local management</b> </span><br /><span style="color: #000000;">This is a backup‑dedicated appliance, locally configured to enforce immutability policies, often through software locks or non‑modifiable retention periods. </span></li>
<li><span style="color: #000000;"><b>Hardware appliance with online management</b> </span><br /><span style="color: #000000;">This type of appliance enables remote management, sometimes via an out‑of‑band channel, ensuring that immutability policies cannot be altered even if the primary network is compromised. </span></li>
<li><span style="color: #000000;"><b>Software installed on the organization’s operating systems</b> </span><br /><span style="color: #000000;">Some software solutions allow immutability rules to be defined directly at the operating system level. However, this approach may be less robust, as it can be vulnerable if the host system is compromised. </span></li>
<li><span style="color: #000000;"><b>Cloud capabilities (e.g., Amazon S3 Glacier / Azure Blob Storage)</b> </span><br /><span style="color: #000000;">Cloud storage services offer immutability features through retention policies or WORM locks, ensuring that stored objects cannot be modified or deleted for a defined period. </span></li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #000000;">It should be noted that the level of immutability can be adjusted based on the nature of the data concerned, in order to optimize the balance between security requirements and operational constraints. </span></p>
<p style="text-align: justify;"><span style="color: #000000;">Immutability is increasingly observed as a mechanism deployed within backup protection strategies and remains more commonly implemented than air gapping. </span></p>
<p style="text-align: justify;"><span style="color: #000000;" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2 style="text-align: justify;"><span style="color: #000000;"><b>Backup Air Gapping : A Technique Observed but Less Optimized</b> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #000000;">An air gap<i>4</i> is defined as “an interface between two systems in which (a) the systems are not physically connected and (b) any logical connection is not automated (i.e., data is transferred across the interface only manually, under human control).” </span></p>
<p style="text-align: justify;"><span style="color: #000000;">Like immutability, air gapping can be implemented in various ways, including: </span></p>
<p style="text-align: justify;"><span style="color: #000000;"><strong>Physical implementations  :</strong></span></p>
<ol style="text-align: justify;">
<li><span style="color: #000000;"><b>Offline, protected tape storage (primarily at a remote site)</b> </span><br /><span style="color: #000000;">Magnetic tapes are removed from the active backup system and stored in a physically separate location, preventing any network or automated access. </span></li>
<li><span style="color: #000000;"><b>Tapes stored in a backup robot</b> </span><br /><span style="color: #000000;">Although physically connected, certain backup robot configurations allow tapes to be logically disconnected when not in use, thereby limiting the risk of unauthorized access. </span></li>
<li><span style="color: #000000;"><b>Other removable storage media such as disks (stored offline)</b> </span><br /><span style="color: #000000;">Hard drives or SSDs can be used to transfer data, then physically disconnected and stored in a secure environment, ensuring full isolation. </span></li>
<li><span style="color: #000000;"><b>Optical data diode transfer gateways</b> </span><br /><span style="color: #000000;">These devices enable one‑way data transfer, physically preventing any return flow of information or commands to the source system and providing a certain level of separation. When native support is not provided by backup software vendors, third‑party software agents enabling unidirectional transfer must be used in addition. </span></li>
</ol>
<p style="text-align: justify;"><span style="color: #000000;" data-ccp-props="{&quot;335559685&quot;:1080}"> </span></p>
<p style="text-align: justify;"><span style="color: #000000;"><strong>Logical Air‑Gap Implementations (Departing from Physical Isolation) :</strong></span></p>
<ol style="text-align: justify;">
<li><span style="color: #000000;"><b>“Saloon door” network ports opened only during synchronization</b> </span><br /><span style="color: #000000;">Network connections are temporarily enabled to allow data synchronization and then automatically disabled, thereby limiting the exposure window and requiring strict controls to ensure that only legitimate replication traffic is authorized. </span></li>
<li><span style="color: #000000;"><b>Isolation through access control and encryption capabilities</b> </span><br /><span style="color: #000000;">Strict access control mechanisms combined with encryption make it possible to restrict access to backups to precisely defined users and time windows. </span></li>
<li><span style="color: #000000;"><b>Backup as a Service (isolated private cloud / third</b>‑<b>party cloud)</b> </span><br /><span style="color: #000000;">Some externalized backup offerings provide full logical isolation by segregating customer environments and limiting network interactions to strictly controlled channels. However, the risk of compromise is not null, as illustrated by a successful attack in 2025 against an online backup service targeting firewall configurations. </span></li>
</ol>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #000000;">Subject to a risk analysis, particularly when relying on logical solutions, implementing data immutability should generally be prioritized over air gapping. </span></p>
<p style="text-align: justify;"><span style="color: #000000;">While immutability and air gapping constitute effective safeguards to preserve the integrity, and even the confidentiality, of traditional backups against risks of modification or exfiltration, other approaches that are more focused on operational optimization also warrant consideration. </span></p>
<p style="text-align: justify;"><span style="color: #000000;">In this context, the objective is no longer to secure full data copies, but rather to rely on alternative mechanisms enabling rapid and large‑scale restoration, often at the cost of certain trade‑offs. This is notably the case with snapshots, which have emerged as a preferred technical solution in environments where recovery performance takes precedence over backup completeness or robustness. </span></p>
<p style="text-align: justify;"><span style="color: #000000;" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2 style="text-align: justify;"><span style="color: #000000;"><strong>Snapshots: A Fast Recovery Solution, but Not a Full-Fledged Backup </strong></span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #000000;">To better understand what the concept of a snapshot technically entails, it is useful to refer to the definition provided by NIST: “A record of the state of a running image, typically captured as the differences between a reference image and the current state.” </span></p>
<p style="text-align: justify;"><span style="color: #000000;">In other words, a snapshot represents an instantaneous capture of the state of a file system or data volume at a given point in time. Unlike a full backup, it records only the blocks or files that have changed since the reference state. This mechanism, which is fast and resource‑efficient, is particularly well suited to environments where rapid recovery is a priority. It is therefore widely used in virtualized and cloud infrastructures. </span></p>
<p style="text-align: justify;"><span style="color: #000000;">However, this operational efficiency comes with notable trade‑offs in terms of backup quality. Snapshots do not constitute independent copies of data; they depend on the integrity of the host system. In the event of corruption of the primary volume, snapshots may become unusable. In addition, their lifecycle management (rotation, retention, application consistency) requires particular rigor to avoid operational drift. </span></p>
<p style="text-align: justify;"><span style="color: #000000;">While effective in accelerating business recovery, snapshots cannot replace a true backup strategy. They should be considered as a complement to more robust mechanisms that ensure long‑term data durability and integrity. </span></p>
<p style="text-align: justify;"><span style="color: #000000;">Whether dealing with snapshots or traditional backups, their integration into a protection architecture requires a thorough risk analysis, including the identification of residual vulnerabilities. </span></p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><span style="color: #000000;">4. <b style="font-size: revert;">Risk-Based approach and identification of residual risks</b><span style="font-size: revert; font-weight: revert;" data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:259,&quot;335559991&quot;:360}"> </span></span></h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #000000;">Given the stakes associated with irreversible data loss and/or prolonged disruption of critical business activities, risk analysis applied to backup mechanisms is not an optional step but rather a fundamental pillar of a consistent and well‑controlled backup strategy. </span></p>
<p style="text-align: justify;"><span style="color: #000000;" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2 style="text-align: justify;"><span style="color: #000000;"><b>Embedding Risk Analysis at the Core of Backup Management</b> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #000000;">Whether or not it is part of a formal certification or authorization process, conducting a risk analysis of backup mechanisms aims to ensure that the controls in place are aligned with identified threats and business continuity requirements. </span></p>
<p style="text-align: justify;"><span style="color: #000000;">In this context, a risk analysis applied to backups, based, for example, on the EBIOS Risk Manager (EBIOS‑RM) methodology proposed by ANSSI, makes it possible to assess existing controls, identify plausible attack scenarios such as compromise of the backup server or data tampering, and evaluate their likelihood. This approach helps prioritize security measures according to their potential impact on business activities, while ensuring that residual risks remain acceptable with regard to business objectives. </span></p>
<p style="text-align: justify;"><span style="color: #000000;">Monitoring residual risks, those that persist despite the implementation of protection measures, is a natural extension of the risk analysis process. It is therefore essential to identify, document, and integrate them into an ongoing security risk management strategy. By way of illustration, such residual risks may include: </span></p>
<ul style="text-align: justify;">
<li><span style="color: #000000;"><b>Insider threat :</b> A malicious administrator or an employee with privileged access may intentionally alter or delete backups. </span></li>
<li><span style="color: #000000;"><b>Compromise of the cloud backup service provider :</b> A compromise of the cloud provider, for example through the exploitation of non‑public vulnerabilities, could allow an attacker to access or manipulate backups while bypassing customer‑side security mechanisms. </span></li>
<li><span style="color: #000000;"><b>Compromise of customer (tenant) accounts :</b> Unauthorized access to customer accounts may result in loss of control over backups, including their deletion or alteration. </span></li>
<li><span style="color: #000000;"><b>Destruction of backup solution assets :</b> If the backup infrastructure is destroyed (physically or logically), restoring backups may become difficult or even impossible in the event of the loss of critical resources such as: </span>
<ul>
<li><span style="color: #000000;">Backup catalogs / backup tool databases </span></li>
<li><span style="color: #000000;">Secrets such as decryption keys </span></li>
</ul>
</li>
<li><span style="color: #000000;"><b>Technical compromise of the backup tool :</b> An attacker may render backups unusable by exploiting technical vulnerabilities in the backup software or the host system, including via low‑level out‑of‑band access mechanisms such as iLO or iDRAC. </span></li>
<li><span style="color: #000000;"><b>Compromise of administrative accounts :</b> Even with immutability mechanisms in place, functional compromise of administrative accounts may allow an attacker to disable or bypass protections before, and in some cases after, data is written (retention periods, time‑management mechanisms, etc.). </span></li>
<li><span style="color: #000000;"><b>Compromise of the backup tool’s cybersecurity controls :</b> If an attacker tampers with backup protection settings, such as encryption parameters (e.g., <i>encryption_secret</i>), backups may remain unusable.  </span></li>
</ul>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><span style="color: #000000;"><b>Once a secure backup solution is implemented, complement the analysis with periodic audits, Including Red Team Exercises</b> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #000000;">In addition to theoretical risk analysis and residual risk monitoring, periodic audits help identify vulnerabilities related to the implementation of the backup solution. Among the possible audit types, Red Team exercises aim to reproduce the behavior of an attacker seeking to destroy backups. These exercises also serve to test the effectiveness of the technical and human measures in place for protection, detection, and response to an attack. </span></p>
<p style="text-align: justify;"><span style="color: #000000;" data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:2,&quot;335559740&quot;:300}"> </span></p>
<h1 style="text-align: justify;"><span style="color: #000000;"><b>Conclusion</b> </span></h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #000000;">Protecting backups against ransomware relies on a holistic approach rather than a purely “product‑based” one : </span></p>
<ul style="text-align: justify;">
<li><span style="color: #000000;">Continuously verifying the reliability of backups to ensure effective reconstruction of the information system; </span></li>
<li><span style="color: #000000;">Securing the backup infrastructure by reducing its attack surface; </span></li>
<li><span style="color: #000000;">Protecting backed‑up data, with immutability as a priority; </span></li>
<li><span style="color: #000000;">Adopting a cross‑functional, risk‑driven approach to security management. </span></li>
</ul>
<p style="text-align: justify;"><span style="color: #000000;">The level of rigor required for backup security will continue to increase as attackers refine their techniques and strengthen their capabilities.  </span></p>
<p style="text-align: justify;"><span style="color: #000000;">Continuous vigilance and adaptation to the evolving threat landscape therefore remain the strongest allies of a resilient backup strategy. </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/05/backups-the-last-line-of-defense-against-ransomware-part-2/">Backups: The Last Line of Defense Against Ransomware Part 2 </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2026/05/backups-the-last-line-of-defense-against-ransomware-part-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
