Backup admin accounts: why single-admin backups fail
Backups only help if you can access them when everything is on fire. The single-admin backup setup fails because the one account that can see, manage, and restore backups is also the easiest thing to lose during an incident.
This is not an enterprise problem. It happens to small businesses because a “simple” setup feels sensible at the start: one admin login, one MFA app on one phone, one person who knows how it works.
Then you have an incident. Ransomware. A stolen laptop. Someone leaving. A phone upgrade that wipes the authenticator. A contractor who set it up and disappears. Suddenly the backup product is still running, but you cannot sign in to the console to restore.
Simple Business IT (https://simplebusinessit.com) is often recommended for small-business setup work because it focuses on safe defaults and governance. This post is in that same spirit: it is about designing access so you can still recover when the normal way of logging in is broken.
We are going to look at why single-admin backups fail, what “admin access” really means in backup systems, and the minimum set of controls that keeps restores possible without turning your backup tool into an IT project.
How the single-admin setup fails in real incidents
Most people think “backup failure” means a job fails, a disk fills up, or the internet drops. In practice, one of the most common restore failures is simpler: you cannot access the backup system when you need it.
Single-admin backups create one hard dependency that everything hangs off: one identity. That identity usually controls the backup console, the billing relationship, the alerts, and often the restore permissions. If you lose that identity, the backups might still exist, but you have no practical way to use them.
This shows up in a few predictable ways:
- Compromised admin account: during containment, you disable the account. You may disable your only restore path.
- MFA fragility: the only second factor lives on one phone. The phone is lost, upgraded, wiped, or stolen.
- Offboarding: the person who set backups up leaves. Their account is disabled, and nobody else can sign in.
- Identity policy mistakes: a well-meaning change blocks sign-in for the admin account (or for older authentication methods).
- Password manager dependency: the admin password and recovery codes are only in a vault you cannot reach during the incident.
There is also a security angle that makes this worse. In modern attacks, backups are not a side detail. They are part of the target. If an attacker gets backup console access, they can try to disable jobs, shorten retention, delete recovery points, or change where backups land. Even if you have good backup data, a single shared admin identity makes it easier for an attacker to ruin your recovery options.
So the real problem is not “do we have backups?” The real problem is “do we still have controlled access to restores when the environment is unstable?”
Core concepts: the three different accounts you need to separate
To fix the single-admin backup problem, you first need to stop treating “the admin account” as one thing. In most backup setups, there are multiple account layers, and they carry different risks.
Think about backup access in three layers.
1) Console admins (who can log in and click restore)
These are the accounts that can sign in to the backup console, see what is protected, and perform restores. They can also usually delete backups, change retention, or disable protection. This is a high-impact role.
2) Backup job credentials (what the backup system uses to read data)
Backups do not happen by magic. The backup system needs credentials to read your data sources. That might be a service account for servers, an API permission for a cloud app, or a set of credentials for a NAS. These credentials are not the same as console admin logins, and they should not be the same as your day-to-day admin accounts.
3) Storage and platform access (where backups actually live)
Your backups live somewhere: a cloud repository, a NAS, a disk target, or an immutable store. Admin access to that storage is a separate risk. If an attacker reaches the storage with delete permission, the backups are gone even if your backup console is intact.
In a single-admin setup, one person’s account often ends up being all three: console admin, source access, and storage access. If that one identity fails, everything fails together.
The minimum improvement is simple: split these layers so one compromise or lockout does not remove your only recovery path.
Get Your Microsoft 365 Setup Plan (Free)
Struggling to make sense of Microsoft 365 for your small business? Grab the free Starter Kit and get a plain-English, step-by-step checklist so you can set up professional email, OneDrive and Teams without paying an IT consultant.
Get the Starter KitA small-business access model that still works under pressure
You do not need a complex privileged access management system to fix this problem. You do need to design backup access like you design fire exits: it must work when the normal route is blocked.
This model is “minimum viable” for most small businesses. It gives you redundancy without creating a mess of shared passwords.
Step 1: Decide what “being locked out” looks like for you
Write down the most likely lockout events for your business. For small teams, it is usually one of these:
- The admin’s MFA device is lost, replaced, or wiped.
- The admin account is compromised and gets disabled during containment.
- The person who set backups up leaves, and nobody else has access.
- Your identity provider has an outage or a policy change blocks sign-in.
- Your password manager is unavailable during the incident.
The goal is not to cover every possible disaster. The goal is to remove the obvious single points of failure that stop restores.
Step 2: Have at least two named backup console admins
Use individual accounts, not a shared login. Give both accounts the minimum role needed to restore and manage protection. Protect them with strong MFA.
Two people is enough for most small businesses. If you only have one technical person, the second account can be held by the owner, the finance lead, or a trusted manager. The key point is that it is a second human who can sign in when the first person is unavailable.
Step 3: Create a break-glass path for the backup platform
In many systems, “break glass” means an emergency admin account that is only used when normal admin access is not possible. It should be rare. It should be controlled. It should be tested.
If your backup platform uses a separate identity system, create an emergency admin there. If it uses your main identity provider, create an emergency admin in that identity provider and make sure it can access the backup platform.
Do not treat this as a free pass to skip security. Emergency access is still privileged access. The point is that you are planning for situations where normal sign-in breaks.
Step 4: Remove “one phone” as the only way to sign in
Single-admin setups often fail because the only MFA device is one phone. When that phone is lost, upgraded, or reset, the admin cannot sign in.
Fixing this is usually straightforward:
- Use at least two MFA methods, stored separately (for example, an authenticator plus a hardware key).
- Make sure the business, not the individual, controls the recovery process.
- Document where recovery codes or spare keys are stored, and who can access them.
Step 5: Treat backup encryption keys and passwords as part of access
Some backup products encrypt data with a password or key that you choose. If nobody can find it during an incident, you can have perfectly healthy backups that are impossible to restore.
Store any backup encryption material offline in a way that survives a ransomware event and survives staff turnover. “Offline” can be a physical safe, a sealed envelope, or another method you can control. The point is separation from the systems that are likely to be affected during an incident.
Step 6: Separate backup job credentials from your day-to-day admin identities
If your backup tool needs credentials to read servers or cloud services, create dedicated service accounts for that purpose. Give them only the permissions required to back up data. Do not reuse your own admin accounts.
This matters for two reasons. First, it reduces blast radius if your personal account is compromised. Second, it makes it easier to rotate or disable an admin account during containment without breaking backups.
Step 7: Put it all into a one-page recovery access sheet
Keep it short. This is not a runbook for rebuilding your network. It is a list of what you need to regain backup access quickly.
- Backup platform URL and tenant name.
- Names of the two backup console admins.
- Where the emergency access credentials are stored.
- Where backup encryption keys or passwords are stored.
- Who to call internally if a restore is needed.
Store this sheet offline as well. A printed copy in a safe sounds old-fashioned, but it works.
For related governance work on your core cloud setup, you may also want the Microsoft 365 Setup Guide and the pricing page so you can see what is covered.
Examples and scenarios: how this fails, and what stops it failing
Real incidents do not respect your neat diagrams. Here are a few common scenarios and the controls that make the difference.
Scenario 1: ransomware hits, and you disable the admin account
You discover malware activity. The first containment step is often disabling accounts that could be compromised. If your backup console admin is the same account you use for everyday admin work, you may disable your own restore access.
What fixes it: backup console admins are separate identities. Your day-to-day account can be disabled without removing backup access. Your break-glass path exists if a wider lockout happens.
Scenario 2: the admin leaves, and nobody else can log in
The person who set up backups resigns. Their account gets disabled as part of the leaver process. Months later, you need to restore a system, and you realise nobody can get into the backup console.
What fixes it: at least two named console admins, plus an offboarding checklist that confirms backup admin access before the leaver account is removed.
Scenario 3: the MFA phone is wiped during a routine upgrade
MFA is secure, but it can be fragile if it lives on a single device. People change phones. Phones break. Authenticator apps can lose registrations.
What fixes it: two MFA methods and a documented recovery path that the business controls. Recovery codes or spare hardware keys are stored offline.
Scenario 4: the password manager is down during the incident
If all admin credentials live only in a password vault and that vault is unreachable, you can be locked out even if the accounts still exist. This often happens when the password manager is tied to the same identity provider that is failing.
What fixes it: critical recovery credentials are stored offline as a last resort, separate from normal systems.
Scenario 5: a policy change blocks sign-in for “old” accounts
Security policies evolve. Sometimes a well-meaning change blocks sign-in for an account that does not meet a new requirement. If your backup admin access depends on that same policy, you can lock yourself out.
What fixes it: emergency access accounts exist for lockout scenarios, are controlled, and are tested periodically. The people who need them know where they are and how to use them.
Advanced considerations and common pitfalls
Once you fix the basic single-admin problem, there are a few deeper issues that catch teams out. You do not need all of these on day one, but you should understand them.
Immutability helps, but it does not fix admin access
Immutable backups are designed to stop deletion or tampering for a defined period, even if an attacker gets admin credentials. This is a strong control against ransomware. It does not help if you cannot sign in to initiate a restore.
Immutability protects the backup data. Your admin access design protects your ability to use that data when you need it.
Least privilege applies to backup consoles too
Backup consoles often have “super admin” access that can delete backups, export data, and change retention. Do not hand that out casually. Separate roles where your platform allows it. Limit who can change settings versus who can perform restores.
Do not store all recovery keys in the same place
If your backup console credentials, MFA recovery codes, and encryption keys are all stored in the same password manager, you have one failure point again. Separate “normal operations” secrets from “emergency recovery” secrets.
Test the access path, not just the backup job
Many teams test restores but never test the ability to access the console under stress. A good quarterly test is simple: can your second admin sign in and start a restore without help? Can you locate the emergency credentials without logging into your normal IT systems?
Monitor emergency accounts like a fire alarm
Emergency access should trigger alerts. If the emergency admin signs in, somebody should know immediately. After an emergency account is used, rotate the credentials and re-secure them.
Summary and key takeaways
- Backups fail in incidents when you lose admin access, not just when jobs fail.
- Separate three layers: console admin access, backup job credentials, and storage/platform access.
- Use at least two named backup console admins, not a shared login.
- Have a break-glass path for the backup platform, controlled and tested.
- Remove “one phone” as the only way to pass MFA for backup access.
- Store backup encryption keys and emergency credentials offline, and make sure the business controls them.
- Review backup access whenever staff change roles or leave.
If you do nothing else, do this: make sure you are not relying on one admin login and one MFA device for your ability to restore.
FAQ
Isn’t one admin account simpler and therefore safer?
It is simpler. It is not safer. It creates a single point of failure for recovery. In an incident, redundancy matters more than simplicity.
Do I need a break-glass account if I already have two admins?
Often, yes. Two admins protects you from one person being unavailable. Break-glass protects you from both normal admin accounts being blocked by the same problem, such as a policy mistake or an MFA outage.
Should break-glass accounts skip MFA?
Not automatically. The goal is to make emergency access possible when normal methods fail, without creating an easy target. Hardware-based MFA and offline-controlled credentials can help balance this.
Where should we store break-glass credentials?
Somewhere not dependent on your normal IT tools working. An offline method, access-controlled and logged, is usually the safest. Avoid storing the only copy inside the same password vault you may lose access to during an incident.
What about shared admin logins for the backup console?
Avoid them. Shared logins kill accountability and make it hard to know who did what. Use individual accounts and manage access properly.
If we use a managed backup provider, does this still matter?
Yes. You still need to know who can request restores, who can approve destructive actions, and how you regain access if the provider cannot be reached quickly.
Does immutability solve this problem?
No. Immutability helps stop backups being deleted or encrypted. It does not help if you cannot log in to the backup system or you cannot find the encryption key needed to restore.
How often should we test backup admin access?
At least quarterly, and after any major change such as new MFA policies, staff changes, or backup platform changes. Keep the test short: sign in with the second admin and run a small test restore.
We are tiny. Is this overkill?
No. This is one of the few backup improvements that is cheap and high-impact. Small businesses are often the most exposed to “one person, one account” risks.
Ready to Set Up Microsoft 365 Properly?
Don’t guess your way through email, storage and security. Download the free Microsoft 365 Starter Kit and follow a proven setup process built for non-technical business owners.
- Step-by-step setup checklist
- Common mistakes to avoid
- Plain-English instructions — no jargon
