Offline Secure Storage for OT Golden Images, Configs and Recovery Evidence
Plant managers, OT engineers, control-system owners and the CISO all rely on the same small set of files when something stops the line. Offline Secure Storage takes those files off the corporate and OT networks so they cannot be reached, encrypted or weaponised between sessions.
We Think This Is Hard to Ignore
Ransomware attacks against industrial organisations are at record highs, and a single OT incident can cost more than the cyber-insurance market is willing to underwrite. Under NIS2 and the Cyber Assessment Framework, operators are now expected to demonstrate resilient networks and systems with evidence, not assertion. At Firevault, golden images and control-system configurations live on hardware that physically disconnects between sessions, because the only data an attacker cannot weaponise is data they cannot reach.
$5.56M
Average breach cost in industrial sectors, the highest year-on-year rise of any vertical
IBM Cost of a Data Breach 2024
+87%
Year-on-year increase in ransomware attacks against industrial organisations
Dragos ICS/OT Cybersecurity Year in Review 2024
£1.9B
Cost to the UK economy of the JLR ransomware attack, the most expensive cyber attack in UK history
The Guardian, October 2025
5+ days
Average time to restore production after a destructive OT incident
Dragos ICS/OT Cybersecurity Year in Review 2024
Why OT data is uniquely exposed.
Legacy and Mixed Fleets
OT estates run a long tail of operating systems, embedded devices and one-off integrations that no modern endpoint tool can fully cover.
No Clean Restore Path
When a line stops, recovery depends on whether the last known-good golden image and PLC configuration are still trustworthy and reachable.
Cost of Every Lost Minute
Manufacturing, utilities and critical-infrastructure operators measure incidents in hours of stopped production and millions in lost output.
This is already happening to OT estates.
Jaguar Land Rover: £1.9bn Cost to UK Economy
A ransomware attack halted production at all JLR factories and affected over 5,000 supply-chain businesses, the most expensive cyber attack in UK history.
The Guardian, October 2025
Clorox: ~$356M Hit From Production Outage
A 2023 cyber attack disrupted manufacturing and order processing across Clorox plants, with the company reporting around $356 million in damages and lost sales.
Reuters, 2023
Norsk Hydro: LockerGoga Forced Manual Operations
The aluminium producer reverted to manual operations across smelters and extrusion plants after LockerGoga ransomware encrypted IT and OT systems, with losses of about NOK 800 million.
Norsk Hydro, 2019
Colonial Pipeline: Fuel Supply Across the US East Coast Halted
A ransomware attack on the operator of the largest US fuel pipeline forced a six-day shutdown and triggered an emergency declaration across 18 states.
US CISA, 2021
The Scenario
A line stops. The clock starts.
An attack reaches the OT network and HMIs go dark. The control engineer pulls the last validated golden image and the matching PLC configuration from the Firevault Vault. Hashes are checked against the recovery runbook. The site is back inside the recovery time objective, the safety case is intact, and the regulator receives a complete, time-stamped audit trail. The master copies were never reachable to the attacker, so they could never be tampered with.
"When the line stops, the only copy that matters is the one no attacker can reach."
Disconnect to protect every plant, line and engineering record.
Golden images, PLC and HMI configurations, SCADA project files, engineering drawings and recovery evidence are written to dedicated drives inside a Firevault Bunker. Those drives have no internet connection, no IP address and no API. The Primary End User wakes the Vault using non-IP technology, then authenticates with multi-factor and timed-access protocols. A nominated Vault Buddy preserves continuity if a key engineer leaves the site. Customers choose how data is written into OSS today, and an offline secure backup and recovery option from Firevault is on the roadmap for operators who want a single supplier for both layers. Every attempt and every action is logged, giving the board, the regulator and the cyber-insurer a defensible audit trail.
- Golden images and configurations placed on hardware with no network connection. They cannot be scanned, ransomed or exfiltrated remotely from the IT or OT network
- Multi-factor authentication and timed-access SOPs governed by the Primary End User, with controlled sharing for OEMs, integrators and incident responders
- Vault Buddy continuity ensures the data remains operational through shift changes, departures and succession events on site
- Full audit logging of every access attempt, supporting NIS2, the Cyber Assessment Framework, IEC 62443 and stronger cyber-insurance positioning
Master Copies of Every OT Endpoint
Step 1 of 4Operator workstations, HMIs, engineering laptops and embedded panels are imaged and written to OSS. Each generation is hashed, validated and indexed against the asset register. When a device fails or is compromised, the last known-good master is restored without touching the live network.
Choose Your Protection
Which OSS Fits?
300GB
Low Use Vault, Deep Cold Storage
From £74.99/mo
inc. VAT · £0 due today
Deep cold storage for decommissioned assets, superseded golden images and historical engineering records.
What 300GB holds
Use Cases for Securing the OT Estate
- Decommissioned plant and line records
- Superseded golden images and firmware
- Historical safety case and HAZOP records
- Long-term retention of regulatory submissions
- Closed change-control and MOC archives
Specifications
Capacity
300GB
Access
2 windows/week
Authentication
Identity-locked
Commitment
36 months
Security & Compliance
How to Get Started
Step 1
Discovery Call
Understand what you need to protect and how you operate.
Step 2
Vault Configuration
Select your tier, capacity, and access model.
Step 3
Identity Verification
Complete KYC/AML and set up multi-factor authentication.
Step 4
Go Live
Data ingestion, access policy activation, and ongoing support.
One Vault, every party, every stage of the plant.
Offline Secure Storage sits at the centre of the OT estate, owned by the people personally accountable for safety, uptime and recovery. Site onboarding and asset records feed the golden image and configuration vault on one set of wings; the vendor and integrator network and the live recovery workload the team runs in drills and incidents form the other. Nothing is reachable between sessions, and every touch is logged for NIS2, the Cyber Assessment Framework and the safety case.
Site Onboarding
- Asset register and OT inventory captured before commissioning
- Network map, zones and conduits documented to IEC 62443
- Safety case, HAZOP and SIL ratings lodged with the site record
- Operator and engineer access lists tied to the plant
- Vendor remote-access agreements and break-glass evidence on file
- Change-control, MOC and patch baselines recorded at handover
Golden Image and Config Vault
- Golden images of HMI and engineering workstations
- PLC, RTU and DCS programs and ladder logic
- SCADA project files and screen sets
- Safety-system configurations and proof-test records
- Historian and batch-server baselines
- P&IDs, electrical drawings and loop sheets
- Firmware images and signed binaries
- Recovery runbooks and validated restore evidence
Vendor and Integrator Network
- OEMs and control-system vendors
- System integrators and commissioning engineers
- Maintenance, service and break-fix providers
- OT-MSSP, IR retainer and forensic specialists
- Regulators, NCSC, CAs and insurers
Live Recovery Workload
- Line RestartLNR
- Site FailoverSFO
- Tabletop ExerciseTTX
- Audit Evidence PullAUD
- Cyber IncidentINC
You choose how data is written. We hold it offline.
Firevault is the offline storage layer for the OT estate. Your imaging, snapshot and recovery tooling runs on top, writing golden images, control-system configurations and engineering records onto dedicated, disconnected drives inside a Firevault Bunker.
We work alongside the leading OT-grade backup and recovery vendors so operators keep the engine they trust on the line, while the master copy of every plant lives somewhere with no internet connection, no IP address and no API. An offline secure backup and recovery option from Firevault is on the roadmap for customers who want both layers from a single supplier.
Explore More
Hold Gold Copies Away from Ransomware
Immutable masters of crown-jewel data, beyond network reach.
Learn moreGold Copy Backups
Use-case detail for offline gold copies.
Learn moreNIS / NIS2 Compliance
How OSS supports operators of essential services.
Learn moreOT and Cyber Security (Control)
Path-level governance for OT networks.
Learn moreQuestions
Frequently Asked
Ready to take the next step?
See how Firevault can protect your most sensitive data with physically disconnected storage.