·

—

The Dead Disaster Recovery Site: Modernizing Resilience for NIS2 successfully

Disaster Recovery vs. Cyber Recovery

Disaster Recovery Site

Traditional DR protects against fire/flood, not hackers: Real-time replication often copies ransomware to your secondary site instantly.
NIS2 demands more than uptime: The new Dutch Cyberbeveiligingswet requires “business continuity management” that specifically addresses cyber incidents, not just physical disasters.
The solution is a “Cleanroom”: You need an isolated recovery environment to verify data integrity before restoring it to production.
Cost vs. Risk: Moving from physical secondary sites to DMaaS (Data Management as a Service) or cloud-based cyber recovery reduces overhead while increasing resilience.

Is Your Disaster Recovery Site a Ransomware Target?

If you are an IT Manager in 2025, you likely have a Disaster Recovery (DR) plan. You might even have a secondary data center—a “warm site” in a colocation facility in Amsterdam or an Azure region that replicates your production environment.

For decades, this was the gold standard. It protected you if your primary server room flooded or lost power.
But in 2025, your biggest threat isn’t a flood. It’s ransomware. And against ransomware, your traditional DR site might actually be part of the problem.
If you are replicating data in real-time to a secondary site, you are likely replicating the malware, too. When you hit the “failover” button, you don’t recover your business; you recover the virus.

This article explains why we must stop building “Disaster Recovery” sites and start building Cyber Resilience architectures—especially if you are a Dutch healthcare provider or essential entity facing NIS2 regulations.

The “Dirty Data” Problem: Why Traditional DR Fails

Traditional DR relies on Low RPO (Recovery Point Objective). You want to lose as little data as possible, so you replicate constantly.

  • Scenario: A hacker infiltrates your HIS (Hospital Information System) or ERP at 03:00 AM.
  • The Traditional DR Flaw: Your replication software sees the encrypted files or the hacker’s backdoor as “new data” and immediately copies it to your DR site.
  • The Result: Both your primary and secondary sites are compromised. You have redundancy, but you do not have resilience.

The Shift: From Disaster Recovery to Cyber Recovery

To survive a modern attack, you need a different architecture. We call this the shift from Availability (keeping it running) to Recoverability (getting it back clean).

FeatureTraditional DR SiteCyber Recovery / Resilience Site
Primary GoalBusiness Continuity (Uptime)Data Integrity & Restoration
TriggerNatural disaster, Power outageRansomware, Insider threat, Corruption
Data StateAlways online, Replicated immediatelyAir-gapped or Immutable
NetworkConnected to Production LANIsolated (disconnected until needed)
Recovery ProcessInstant FailoverForensic Inspection (Cleanroom) -> Restore

The “Cleanroom” Concept

A Cleanroom is an isolated environment (usually in the cloud) where you can mount your backups without connecting them to the production network.

How it works:

  1. Immutable Storage: Your backups are stored in a WORM (Write Once, Read Many) format. Ransomware cannot encrypt them.
  2. Mount & Scan: When an attack occurs, we spin up the Cleanroom. We mount the immutable backups.
  3. Forensic Check: We use AI-driven tools to scan the data for Indicators of Compromise (IoCs). We ensure the backup is free of dormant malware.
  4. Safe Restore: Only clean, verified data is moved back to production.

NIS2, ISO 27001, and Dutch Compliance

In the Netherlands, the Cyberbeveiligingswet (implementing NIS2) imposes strict “Duty of Care” obligations.

The “All-Hazards” Approach

NIS2 explicitly mentions “Business Continuity Management” (Article 21). It requires you to consider an “all-hazards approach.” This means your DR plan cannot just account for a power outage; it must account for a cyber incident.

If you are audited under NIS2 (or ISO 27001:2022), an auditor may ask:

“How do you ensure that your failover site is not compromised by the same incident that took down your primary site?”

If your answer is “we replicate everything instantly,” you may fail the audit. You need to demonstrate segregation of duties and immutable copies.

Practical Steps: Modernizing Your Resilience Strategy

You don’t need to scrap your existing investment, but you do need to harden it.

Step 1: Implement “Immutable” Storage Immediately

Whether you use NetApp, Commvault, or Microsoft 365 backup, ensure that your backup target is configured as immutable. This is your “break-glass” copy that no admin credential can delete.

Step 2: Stop Relying Solely on Replication

Replication is for availability (RTO). Snapshots and Backups are for recovery (RPO). You need both. Ensure you have a “Gold Copy” that is not accessible from the main network.

Step 3: Test Your “Cyber RTO”

Most IT managers know how long it takes to failover (e.g., 4 hours). But do you know how long it takes to:

  1. Identify the breach?
  2. Isolate the network?
  3. Spin up a clean environment?
  4. Scan 10TB of data for malware?
  5. Then restore?

This is your Real-World RTO. It is usually measured in days, not hours. Reducing your Real-World RTO by automating the “Cleanroom” process is the key here.

Checklist: Is Your DR Site Cyber-Resilient?

Use this checklist to assess your current strategy against 2025 standards.

[ ] Immutability: Is there at least one copy of data that cannot be modified or deleted (even by root/admin)?
[ ] Air-Gapping: Is your backup storage logically or physically separated from your production network?
[ ] Cleanroom Capability: Do you have a pre-configured isolated environment to test/clean data before restoring?
[ ] Identity Isolation: Are the credentials used for backup management separate from your standard Active Directory domain admins?
[ ] 3-2-1-1 Rule: Do you have 3 copies, on 2 media, 1 offsite, and 1 immutable/offline?
[ ] Documentation: Does your Incident Response Plan (IRP) specifically detail the sequence of recovery for a ransomware event (not just a server failure)?

FAQ: Common Questions

Q: Does Microsoft 365 count as a Disaster Recovery site?
A: No. Microsoft ensures the infrastructure (Exchange, SharePoint) is running, but they do not protect your data from corruption or deletion. If a user deletes a file or ransomware encrypts your OneDrive, Microsoft replicates that deletion/corruption. You need a third-party backup solution for true resilience.

Q: We use Veeam/Commvault/NetApp. Are we safe?
A: Buying the tool is not enough; it must be architected correctly. For example, if your Veeam repository is joined to the same Windows Domain as your production servers, a hacker who compromises the Domain Admin can delete your backups. The difference: Configuring these tools for “Zero Trust” resilience.

Q: Is a cloud DR site cheaper than a physical one?
A: Usually, yes. With a physical site, you pay for idle hardware “just in case.” With a cloud-based Cyber Recovery site, you pay for storage (cheap) and only pay for compute (expensive) when you actually need to test or recover. This is the model of Data Management as a Service.

Q: How does this affect our ISO 27001 certification?
A: The 2022 update to ISO 27001 (Control 5.30) emphasizes “ICT readiness for business continuity.” Moving to a Cyber Resilience model provides stronger evidence that you can recover from the most likely disruptive events (cyberattacks), helping you pass audits with confidence.

Leave a Reply

Discover more from Data Resilience Hub

Subscribe now to keep reading and get access to the full archive.

Continue reading