Offsite Backup
Encrypted offsite backups.
Zero-knowledge.
HostAtlas Offsite Backup encrypts your data on the agent using AES-256-GCM before it ever leaves your server. The encryption key never touches HostAtlas infrastructure. We cannot read your backups — by design. Combined with an entropy gate that refuses ransomware-encrypted files, your offsite copies are guaranteed to be both encrypted and clean.
AES-256
Encryption
Zero
Knowledge
S3
Direct upload
SHA-256
Integrity check
Client-Side Encryption
AES-256-GCM. On your server. Before upload.
The HostAtlas agent encrypts backup files locally using AES-256-GCM authenticated encryption. The key is generated on first setup and stored only on the agent. It never leaves your infrastructure. HostAtlas servers receive only encrypted ciphertext — we cannot decrypt your data under any circumstances.
Step 1
Backup Created
Backup job produces a file (SQL dump, tar archive, etc.) on the local filesystem.
Step 2
Entropy Check
Agent analyzes file entropy and format. Ransomware-encrypted files are rejected before encryption.
Step 3
AES-256-GCM Encrypt
File is encrypted with AES-256-GCM using the local key. Output is wrapped in HABK format with metadata.
Step 4
S3 Upload
Agent uploads encrypted .habk file directly to S3 via presigned URLs. Multipart upload for large files.
Step 5
Verify
SHA-256 checksum is verified after upload. Backup is registered in the HostAtlas catalog.
Entropy Gate
Ransomware stops here.
Before encrypting and uploading any backup, the agent runs Shannon entropy analysis and magic byte format detection on the source file. If the file shows signs of ransomware encryption — high entropy with no recognized format — the upload is refused. This means ransomware-encrypted backups never make it to offsite storage. Your offsite copies are guaranteed clean.
Pre-Upload Validation
Every file passes through entropy analysis before encryption. Files flagged as suspicious are blocked and an incident is created automatically.
Clean Offsite Guarantee
Since suspicious files are rejected before upload, your offsite storage only contains verified clean backups. Even if your server is fully compromised, offsite copies remain trustworthy.
Configurable Sensitivity
The entropy threshold for blocking uploads is configurable. Default is 7.95 for unknown formats. Paths marked as "Encrypted" (GPG, age) bypass the gate.
daily_backup.sql.gz Entropy: 5.23 | Format: gzip
files_backup.tar.xz Entropy: 7.81 | Format: xz
daily_backup.sql.gz Entropy: 7.98 | Format: UNKNOWN
secrets.gpg Entropy: 7.99 | Path marked as encrypted
Direct S3 Upload
Agent uploads directly. No middleman.
The HostAtlas agent uploads encrypted backups directly to S3 storage using presigned URLs. The data never passes through HostAtlas application servers — it goes straight from your server to object storage. Multipart upload handles large files efficiently, with automatic retry for failed parts.
Presigned URLs
The agent requests a presigned URL from the HostAtlas API. The URL grants temporary, scoped write access to a specific S3 path. The agent uploads directly to S3 without HostAtlas servers touching the data.
Multipart Upload
Files over 50 MB are split into parts and uploaded in parallel. Each part is checksummed independently. Failed parts are retried without re-uploading the entire file.
Post-Upload Verification
After upload completes, the SHA-256 hash of the uploaded object is compared against the local hash. Any mismatch triggers a re-upload. The backup is only registered in the catalog after verification passes.
Restore
Download. Verify. Decrypt. Restore.
Restoring from offsite backup is a four-step process handled entirely by the agent. The encrypted file is downloaded from S3, the SHA-256 hash is verified to confirm integrity, the file is decrypted using the local key, and the original file is restored. No manual key handling, no complex tooling.
Step 1
Download
Agent downloads the .habk file from S3 via presigned URL. Multipart download for large files.
Step 2
Verify SHA-256
Verify the downloaded file's SHA-256 matches the catalog record. Detects corruption during transfer.
Step 3
Decrypt
Agent reads key ID from HABK header, finds the local key, decrypts with AES-256-GCM, and verifies the GCM auth tag.
Step 4
Verify & Restore
Original file SHA-256 from HABK header is verified against the decrypted output. File is restored to the target path.
Key Management
Auto-generated. Exportable. Your responsibility.
The encryption key is automatically generated when you enable offsite backup for a server. You can export it for safekeeping or import an existing key when migrating between servers. Because HostAtlas never stores your key, losing it means losing access to your encrypted backups permanently.
Auto-Generated
A 256-bit key is generated using a cryptographically secure random number generator on first setup. The key is stored in the agent's config directory with restricted file permissions (0600).
Export / Import
Export your key via the agent CLI for safekeeping. Import it on another server to access the same encrypted backups. Useful for disaster recovery scenarios where the original server is lost.
Key Loss = Data Loss
HostAtlas cannot recover lost keys. We recommend exporting the key immediately after setup and storing it in a secure location (password manager, hardware security module, or printed and locked away).
Storage Tiers
Simple pricing. No surprises.
Choose the storage tier that fits your backup volume. All tiers include AES-256-GCM encryption, entropy gate protection, SHA-256 verification, and the full backup management dashboard. Pricing is per server, billed monthly.
Starter
50 GB storage per server
Professional
250 GB storage per server
Enterprise
1 TB storage per server
Get started
Your backups, your keys, your control.
Enable offsite backup from the server settings page. The agent generates an encryption key, starts analyzing your backups with the entropy gate, and uploads encrypted copies to secure S3 storage. Zero-knowledge by design — we never see your data unencrypted.
Quick install
$ curl -sSL https://install.hostatlas.app/install.sh | sudo bash -s -- --key=SERVER_KEY_