Backups – The Silent Fortress

ops-tactics.jpg

Backups feel safe - silence is the real threat.
If a restore fails - the fortress collapses before it can be used.

Integrity Is the First Line of Defense

A corrupted archive is a dead weight in your plan.
Verify integrity weekly - trust no checksum; trust only proof.

  • borg check – scans every chunk for cryptographic consistency.
  • sample restore – pulls one file to confirm paths and permissions.
  • hash compare – source vs archive must match exactly.

Automation Is the Silent Guard

Nightly Borg runs triggered by systemd timers.
No manual intervention. No human error.

The backup survives only if it can be resurrected.

Alerting Must Be Whispered

Send encrypted notifications through an SSH tunnel to a monitoring node.
Avoid loud channels - silence keeps observers blind.

SOP – The Only Document That Matters

Encrypt the SOP with GPG - the mind forgets, the document remembers.
Keep it short: Backup → Check → Restore Sample → Verify → Record.

When verification fails, the backup dies in your mind before it can be used.

Decision Makers – Enforce Resilience Quietly

Your mandate is to enforce silent resilience without noise.
Make verification a mandatory compliance item - trust only what has proven itself.

Backups are power only when they can breathe again.
Treat them as living, not paper.

= [ The Signal fades. DeadSwitch is out. ] =