Hacker News new | past | comments | ask | show | jobs | submit login

> but not implementing anti-tampering on local and remote backups i.e. protection from root.

How do you accomplish this? I have some ideas/assumptions, but I'd like to hear more about the best practices here.




1st level of protection is by keeping your live production data & backup data in separate accounts.

(If 1 account gets compromised the other is still available)

Perhaps 2nd level is by using cloud specific features - such as AWS S3 Object locks (even owner can't delete the object till the retention period).

my 2cents


Backups sent to a remote system should be append only so that if a machine is compromised, a malicious actor cannot delete or corrupt previous backups.


An easy way is to stream the backups to tape, and have someone swap the tapes. Typically people who do this take the recorded tapes offsite, but to prevent against an electronic attack it’s adequate to have the removed tapes even in the same room, just not in the tape drive.


Separate storage of file hashes would make tampering detectable. Actually preventing root modifying a file probably has to be done at the hardware level.


Heard of a case where an admin was bribed by competition to delete everything.


Maybe something like the write protect switch on LTO tape cartridges, so that if compromised you never overwrite the tape when trying to restore.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: