Summary
We must plan what to do if a threat actor corrupts or disables our Mathaholics Moodle platform. At the beginning of this chapter, we investigated several industry-standard methods that can be used to back up our Moodle database, including exporting and replicating data. We also saw how we can restore MySQL data at a specific point in time by rerunning statements recorded in binary log files.
Then, we considered how to back up our moodledata
directory using Rsync or BorgBackup. Both utilities offer secure methods of backup and retention, so long as we are careful with our configuration.
Finally, we looked briefly at the importance of having a disaster recovery plan – and the importance of practicing it.
Having explored the security of our underlying infrastructure, it is time to dive into how Moodle can be used to manage data privacy requirements. This is the subject of the next chapter.