There have been many examples of misplaced hard drives exposing sensitive information. The most recent example being the Travel Security Administration losing an external hard drive which contained 100,000 employee records. Companies continue to strive to lock down their live environment yet ignore the security implications of back-ups. What makes this data less sensitive when it exists on a back-up tape than when it existed on a live server?The attack surface of course changes. You can’t use an SQL injection attack over a web connection against a back-up tape sitting on a shelf. However it is a lot easier to walk out the door with a back-up tape under your coat than to try and carry out a live server. The fact of the matter remains; regardless of attack surface the data classification does not change. The business impact of that data being exposed is no less significant. So what should be done?Security for data back-ups is not a cut and dry issue. The answer of “encrypt the data” is too simple to be helpful. How often are back-ups taken? What media are they stored on and in what format? Where is this media kept? How long do we keep back-ups? How is media handled when the data has reached the end of its life cycle? These are all questions to be considered.The type of back-up makes a huge difference in how it is handled. Consider a “hot” back-up of a system which is a duplicate of a live system which can be made live should the main system experience issues. Obviously encrypting this drive makes it less viable as a “hot” back-up. However, encryption may be the answer for a back-up tape which simply holds copies of old records for a data preservation or disaster recovery use. This raises other questions though. Where are those tapes stored? How do they get from the back-up machine to that storage facility? Encryption is not fool proof. While it will provide some protection if the tape is lost or stolen, it is obviously better to avoid such events all together by securely transporting and storing these drives and tapes. While each type of back-up is a very different animal and should be treated in different ways, in the end one tenet holds true of all back-ups regardless of shape or size: A copy of data is no less sensitive than the original data.– John Related content opinion Start in the Middle By Security Renegades Oct 10, 2008 5 mins IT Leadership opinion Confessions of a Security Optimist By Security Renegades Apr 25, 2008 3 mins Core Java opinion Have we all become "Patch Crazy?" By Security Renegades Dec 03, 2007 3 mins Core Java opinion When DDoS Attacks Become Personal By Security Renegades Nov 20, 2007 5 mins Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe