Full Backup Guide
Note: Make sure to read the basic backup and regular backup guides first.
The comprehensive Security Blanket backup strategy to protect your critical credentials, devices, and accounts, in case of a disaster.
- Restores access to your
TLAs
, EAs, and/or Devices under the following scenarios:- All Regular Backup Scenarios plus,
- Contact needs to manage EAs on your behalf.
- Blankets are composed of
TLA
,Tool
,Device
, andEA
cards. - Good for backing up access to all EAs that need to be managed if you are unavailable. While possible for a contact to manage EAs with a normal backup and a digital map, this expedites that process and makes it clear which EAs to focus on first.
Steps
We recommend reading the getting started guide first.
-
Create your digital map as described in the getting started guide. Double check that you can access all of your accounts from your
TLAs
, otherwise this will only be a partial backup in the case of a remote restore scenario. -
Carefully review the
TLAs
and ensure each of them have a remote restore method that does not rely on any access to adevice
card. Typically, mostTLAs
have a recovery method that uses “backup codes” for this purpose. -
If any
tools
are needed to access aTLA
, ensure thetool
can be accessed via a remote restore method, or provide a recovery method for theTLA
that does not depend on the Tool. Again, enabling “backup codes” can suffice. -
For every
device
card, make sure the descriptor and location are obvious for a trusted contact to be able to locate and operate. -
Prioritize the list of
EA
s you want to protect. Try to keep it short, as every extra card adds a bit more overhead to the security blanket. -
Count the number of cards you will need per blanket. Your blanket should include all of the
TLAs
andEA
s you want to protect, all relevanttools
needed to accessTLAs
, and all of yourdevices
. -
Now determine the number of backups you want to make. As described in the security best practices:
At a minimum, make a backup blanket for yourself to keep at home. This way you can restore your credentials in case of an emergency. It’s also a good practice to have a personal backup copy somewhere off-site, in case of a disaster at home. Lastly, having a trusted contact with a security blanket, can help restore your access when you are away and unable to access your other backups.
-
Follow the rest of the getting started guide in distributing your blankets to your contacts and you should be good to go!