YUDU Sentinel Blog

What 'Break Glass' Really Means - and Why Out-of-Band Comms Go Further

Written by Richard Stephenson | 02 Apr 2026

When your primary systems fail under attack, improvised emergency access is better than nothing. But it isn't a strategy. Here's what separates a break-glass capability from a purpose-built out-of-band resilience platform.

The Moment Everything Goes Dark

Imagine it's 3am. Your IT team has just confirmed a ransomware attack is spreading across your network. Email is compromised. Microsoft Teams has been taken offline as a precaution. Your CISO can't reach the board. The CEO has no way to tell the incident response team what decisions have been made. Your comms infrastructure - the very thing you need to manage the crisis - is itself part of the incident.

This is the scenario that separates organisations that have thought seriously about resilience from those that haven't. And it's where the distinction between a break glass capability and a proper out-of-band (OOB) communications platform becomes critical.

What Does "Break Glass" Actually mean

The term comes from the old emergency fire alarm boxes - the ones behind a pane of glass with the instruction "In case of emergency break glass".

In technology and security, a break-glass capability refers to an emergency mechanism that exists outside normal operating procedures, held in reserve for when everything else has failed.

(The term may appear as break glass, break-glass or breakglass - they are interchangeable)

In practice, break glass approaches in the communications context typically include things like:

  • A list of personal mobile numbers stored offline or in a secure vault
  • A pre-shared group on a personal messaging app (WhatsApp, Signal) set up "just in case"
  • Emergency admin accounts with elevated privileges to bypass normal authentication
  • A physical folder of key contacts and escalation protocols kept off-network
  • A dedicated out-of-network SIM or satellite phone for senior leadership

What these have in common is that they are survivable by design - they exist separately from your primary infrastructure. If your main environment is compromised, the break glass option should still function.

"A break glass capability is a lifeline. But a lifeline is not the same as a lifeboat."

The analogy is apt. A lifeline - a rope thrown from the shore - might save one person in an emergency. A lifeboat is a structured, equipped vessel capable of keeping an entire crew safe and coordinated over an extended period. When a major cyber incident strikes an organisation of any significant size or complexity, what you need is the lifeboat.

The Limitations of Break-Glass Alone

Breakglass solutions solve one problem elegantly: survivability. But they introduce new ones - or fail to address the full scope of what crisis communications actually requires.

WHAT BREAKGLASS DOES WELL

WHERE BREAKGLASS FALLS SHORT

  • Survives network compromise
  • Low cost and simple to set up
  • No vendor dependency during incident
  • Immediate availability if pre-positioned
  • Works without internet in some forms
  • No structured command and control
  • No Audit trail or message logging
  • Consumer apps lack enterprise governance
  • No secure document or file sharing
  • Impossible to scale beyond small groups
  • Contacts lists go stale; maintenance is poor
  • No integration with incident workflows
  • Personal devices introduce GDPR / data risk

 

Consider what actually happens in a major incident.

  • The first few minutes might indeed be served by a breakglass contact list - the CISO calls the CTO on a mobile number.

  • But within the hour, you need structured situation reports going to the right people.

  • You need to document decisions made under legal privilege.

  • You need your incident response team coordinating across time zones, your PR team aligned with your legal counsel, and your board receiving a coherent briefing — all without any of that communication touching the compromised environment.

A WhatsApp group, however well-intentioned, cannot do that work.

Where YUDU Sentinel Fits - And Why it's Different

YUDU Sentinel is purpose-built as an out-of-band resilience platform. That means it operates on entirely separate infrastructure from your primary IT environment - separate networks, separate cloud hosting, separate authentication.

If your Microsoft 365 tenant is encrypted, Sentinel is unaffected. If your on-premises servers are offline, Sentinel is still running.

In that narrow sense - survivability - Sentinel shares the same foundational purpose as a break-glass capability. Both are designed to still work when your primary environment doesn't. But Sentinel goes considerably further.

A Comparison of Break Glass and Out-of-Band  Capabilities

CAPABILITY

BREAK GLASS 

YUDU SENTINEL
OOB

Survives network compromise

Yes

Yes

Secure messaging between groups

Partial

Yes

Structured incident command workflow

No

Yes

Auditable communication log

No

Yes

Secure file and document sharing

No

Yes

Broadcast alerting to staff

Limited

Yes

Role-based access and permissions

No

Yes

Legal privilege-compatible comms

No

Yes

Scales across large organisations

No

Yes

Regular testing and exercising

Rarely

Built-in

Single-tenant data isolation

No

Yes

Zero cost to set up

Yes

No

 

The Audit Trail Problem

One dimension that is almost universally overlooked in break-glass planning is the legal and regulatory importance of a contemporaneous record. After a significant cyber incident, your organisation will face scrutiny - from the ICO, from regulators, from insurers, possibly from litigation.

  • What decisions were made?
  • When?
  • By whom?
  • On what basis?

A WhatsApp thread that was hurriedly deleted the morning after the incident, or that exists on someone's personal device, is not an adequate answer.

YUDU Sentinel maintains a verifiable, time-stamped record of communications that occurred during the incident - one that can support post-incident review, demonstrate regulatory compliance, and if necessary be produced as evidence of responsible crisis management.

That capability simply does not exist in any informal break glass approach.

The Testing Paradox

There is a quiet irony in how most organisations approach break-glass capabilities: they are set up, documented in a procedure somewhere, and then never tested.

The mobile number list is three years out of date. The Signal group still contains someone who left the business eighteen months ago. The laptop with the emergency credentials is in a storage room and nobody knows the password.

"An untested break glass capability is indistinguishable from no capability at all — until the moment you need it."

YUDU Sentinel is designed to be exercised regularly. Crisis simulations, tabletop exercises, and live drills can all be run through the platform — which means that when a real incident occurs, your team is already familiar with how to navigate it. Muscle memory matters. The 3am moment is not the time to read the instructions.

Are They Complementary or Competing

The honest answer is: complementary, if the break-glass capability is genuinely necessary for your organisation's context - and Sentinel is your structured resilience layer.

For very small teams or specific edge cases (a single executive travelling internationally without network access, for example), a personal device-based backup contact method makes sense as a last resort. But it should be exactly that: a last resort, not a strategy. Sentinel handles the operational reality of incident communications - the sustained, structured, governed coordination that a real response requires.

Think of it this way. A break glass capability answers the question: can we reach each other at all? YUDU Sentinel answers the question: can we manage this crisis effectively, compliantly, and with a complete record of what happened?

Both questions matter. Only one of them is sufficient.

What Good Looks Like

Organisations with mature crisis communication resilience tend to have three things in place.

  • First, a verified contact method that sits entirely outside their corporate environment - this is the legitimate core of a break glass capability, properly maintained and tested.

  • Second, a purpose-built OOB platform like YUDU Sentinel as the primary coordination environment for any incident of material significance.

  • Third, a programme of regular exercising that covers both — so that when an incident occurs, nobody is working out how to use the tool for the first time under pressure.

The Colt Technology cyberattack, the NHS ransomware incidents (WannaCry and Synnovis), the attacks on critical national infrastructure providers across Europe - all of them have reinforced the same lesson. The organisations that managed these events well had invested in their resilience infrastructure before the incident, not during it.

The glass was already in its frame. They just never needed to break it.