To ensure the organisation could recover from a cyber breach with full confidence, Triangle delivered a comprehensive 3-phased approach.
Phase 1 - Analysis & design
Our cyber team supported the execution of an initial analysis and design to identify the critical data required to recover a minimum viable company (MVC) post-breach, as well as the service level requirements for speed of recovery. This phase also included the architecture and high-level design of the technology needed for two of the key components of a Cyber Recovery architecture: the isolated data vault and the clean room.
Triangle’s experts worked closely with Dell, as the technology provider to supply the necessary recovery infrastructure, including Dell’s Cyber Vault and Clean Room technologies.
Phase 2 - Implementation & runbook creation
With the design agreed, Triangle and Dell collaborated to build the Cyber Vault, Clean Room, and supporting infrastructure. Logical recovery runbooks were developed for each critical business service identified in Phase 1.
The platform’s security and recovery capabilities were verified through rigorous testing. The design also incorporated a forward view of the platform to ensure any future projects to protect additional data could be handled as an incremental update rather than a significant design change.
Key principles of the delivered design, which were verified and tested by the customer, include:
- Data isolation. Vaulted backup data was made invisible to production and DR networks, ensuring the vault was not an attack surface.
- Multi-factor authentication. Additional security layers for accessing the vault and Clean Room.
- Access restrictions. Separation of duties ensured only authorised personnel could manage the vault and recoveries.
- Runbook testing. Full execution of business service recovery processes.
- Recovery timings & sequencing. Tested and documented recovery timelines and optimal sequencing for the MVC.
- Audit & compliance proof-points. Evidence of recoverability for audit and compliance requirements.
Phase 3 - Transition to managed services
Following successful implementation and testing, the platform was handed over to Triangle’s Managed Service team. Our Service Architects integrated the platform into the customer’s existing ITIL processes, with adjustments for recovery testing, reporting, and management SLAs.
Ongoing managed services include regular recovery testing by our dedicated cyber recovery team, and a full operational platform service with lifecycle management, secure access control, daily data integrity checks and regular health reporting. Regular reviews ensure the platform remains aligned with the client’s production investments and improvements.
The client now enjoys a 24x7 fully managed service for both the recovery testing and platform management services. These ongoing managed services are critical to maintaining recovery technology and keeping the company ready to launch recovery processes if and when a breach is detected.