Topics on this page:
Overview
Preamble
Data on systems can sometimes be lost unexpectedly, due to system failure, user error, or malicious action. Backups are copies of the data, kept in a suitably safe place to ensure that if the data were to be lost, it can be restored from a backup. A backup is resilient to a particular kind of data loss event when it is designed to survive that type of event. For instance, a backup is resilient to ransomware if ransomware cannot access it.
Purpose
This guideline is intended to inform about the need for suitable backups and provide guidance about how to achieve them. Simple, straightforward language is used, and technical terms are avoided as much as possible.
Audience
The entire University of Toronto community, including faculty, staff and students.
Scope and applicability
This guideline addresses any situation where data is held on a computer or information system, where that data could be lost due to unforeseen circumstances, and where the impact of that loss should be mitigated by a backup.
Guideline
Data on systems can sometimes be lost unexpectedly due to system failure, user error or malicious action. This could be disastrous. Copies of the data on the system are needed if this happens, so that the data is not lost. These copies are called “backups” and making them is called “backing up your system”.
What to do
If you have access to a file storage service that is equipped with resilient backups, then use it. Any data you store there will be properly backed up as part of the operation of the service.
If you are responsible for doing backups, here are some options in order of preference:
- Use a resilient backup service endorsed by the University (e.g. UTORrecover)
- Leverage a commercial backup service whose risks have been assessed by the University as being acceptable for the type of data you are backing up.
- Use appropriate (preferably university-assessed and approved) backup software writing to local protected media and/or cloud storage. Media can be protected through secure encryption and/or lock & key. One prudent approach for local media is to have a 3-2-1 strategy, which is to have at least three copies, of which at least two are on separate media and at least one is offsite.
Who to talk to
Start with your local IT help desk because they will know best the services accessible to you in your unit. When seeking to better understand the risks that backups are intended to mitigate, please do not hesitate to reach out to the University’s information security team, who are experts in the sorts of risks that backups are designed to mitigate.
References
The University of Toronto Information Security Standards govern the design and operation of computer systems. Backups are generally a highly necessary component of the “Recovery” aspect of Incident Response. Backups themselves must be protected in accordance with the Standards, particularly Media Protection and Access Control.
The University’s Digital Asset Classification standard governs the classification of digital assets by availability level.