Episode 43 — Protect backups as high-value targets: access controls, encryption, and isolation strategy

This episode explains why backups are prime targets for attackers and how protecting them requires stronger controls than ordinary storage because backups can recreate the entire environment. You’ll define backup security objectives such as confidentiality, integrity, availability, and recoverability, then connect these to exam scenarios involving ransomware, insider threats, and compromised admin credentials. We’ll cover access controls like separate backup admin roles, MFA, least privilege to modify retention or delete sets, and monitoring for unusual delete or encryption events. You’ll also learn encryption decisions, including key ownership and separation so attackers who compromise production cannot automatically decrypt backup data. Isolation strategy is a core focus, including immutable storage, offline or air-gapped options, and separate accounts or tenants to prevent blast radius. Troubleshooting includes avoiding single points of failure, preventing backup agents from becoming attack paths, ensuring backup metadata is protected, and validating protections with periodic reviews of permissions, change logs, and alerting on destructive operations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 43 — Protect backups as high-value targets: access controls, encryption, and isolation strategy
Broadcast by