Ransomware has transformed backup from an IT operational concern into a critical security control. This guide covers modern backup strategies designed to survive destructive attacks and enable rapid recovery.

The ransomware backup challenge

Why traditional backups fail

Attack techniqueImpact on backups
Backup deletionAttackers target backup systems first
Encryption of backupsBackups unusable without key
Credential theftAdmin access to backup infrastructure
Extended dwell timeBackups contain only infected data
Cloud sync exploitationRansomware syncs to cloud backups

Modern backup requirements

RequirementPurpose
ImmutabilityCannot be modified or deleted
Air gapNetwork isolation from production
Rapid recoveryMinimize downtime
Integrity verificationEnsure backups are clean
Retention depthRecover from extended compromises

The 3-2-1-1-0 backup rule

Evolution from 3-2-1

RuleMeaning
3Three copies of data
2Two different media types
1One copy offsite
1One copy immutable/air-gapped
0Zero errors after verification

Implementation example

CopyLocationType
ProductionPrimary storageLive data
Local backupOn-premises backup systemNear-line
Cloud backupCloud providerOffsite
Immutable copyAir-gapped or immutable cloudProtected

Immutable backup strategies

Immutability options

MethodImplementation
WORM storageWrite-once, read-many media
Object lockCloud provider immutability
Air gapPhysical or logical isolation
Backup applianceVendor-enforced immutability
TapePhysical offline storage

Cloud immutability

ProviderFeature
AWS S3Object Lock (Governance/Compliance)
Azure BlobImmutable storage
Google CloudBucket Lock
Backblaze B2Object Lock

Object Lock modes

ModeCharacteristics
GovernanceCan be overridden with special permissions
ComplianceCannot be overridden by anyone, including root

Recommendation: Use Compliance mode for ransomware protection—Governance mode can be bypassed by compromised admin accounts.

Air-gapped backup architecture

Physical air gap

ComponentImplementation
Tape libraryOffline tape storage
Removable mediaRotated offsite
Isolated networkNo connectivity to production
Manual transferSneakernet for critical data

Logical air gap

ComponentImplementation
Separate credentialsUnique accounts for backup
Network segmentationFirewall isolation
Unidirectional gatewayData diode
Pull-based replicationBackup system initiates

Hybrid approach

TierMethodRecovery time
Tier 1Online immutableHours
Tier 2Isolated networkHours-days
Tier 3Offline/tapeDays

Backup infrastructure security

Credential protection

ControlImplementation
Separate accountsBackup-only credentials
MFA requiredHardware tokens preferred
No domain joinStandalone or separate domain
Privileged accessPAM for backup admin
Service accountsManaged, rotated

Network security

ControlImplementation
Dedicated VLANIsolated backup network
Firewall rulesMinimum required ports
No internet accessAir-gapped from internet
Encrypted transitTLS for all backup traffic
MicrosegmentationLimit lateral movement

Access control

PrincipleImplementation
Least privilegeRole-based access
Separation of dutiesMultiple approvers for delete
Just-in-time accessTemporary elevation
Audit loggingAll access logged
AlertingUnusual activity notifications

Recovery time objectives

RTO/RPO definitions

TermDefinition
RTORecovery Time Objective - acceptable downtime
RPORecovery Point Objective - acceptable data loss

Tiered recovery

TierSystemsRTORPO
1Critical business<4 hours<1 hour
2Important<24 hours<4 hours
3Standard<72 hours<24 hours
4Archive>72 hours<7 days

Recovery capability testing

Test typeFrequency
Backup verificationDaily (automated)
File restoreWeekly
System restoreMonthly
Full DR exerciseAnnually
Tabletop exerciseQuarterly

Ransomware recovery planning

Pre-incident preparation

TaskPurpose
Document recovery proceduresStep-by-step guides
Identify critical systemsPrioritize recovery order
Test restore proceduresValidate capability
Store procedures offlineAccessible during incident
Establish clean roomIsolated recovery environment

Recovery decision tree

ScenarioAction
Immutable backup availableRestore from clean backup
Unknown infection dateRestore oldest clean backup
All backups encryptedEngage recovery specialist
Cloud sync infectedRestore from versioning

Clean room recovery

RequirementPurpose
Isolated networkPrevent reinfection
Clean mediaKnown-good OS images
Verified toolsIntegrity-checked utilities
Fresh credentialsNew accounts, no reuse
Staged restorationVerify before reconnecting

Cloud backup considerations

SaaS backup (M365, Google Workspace)

ChallengeSolution
Limited native retentionThird-party backup
Ransomware syncPoint-in-time recovery
Accidental deletionExtended retention
Compliance requirementsImmutable archive

SaaS backup vendors

VendorKey features
VeeamBroad coverage
DruvaCloud-native
CommvaultEnterprise
SpanningGoogle focus
BackupifyM365/Google

IaaS/PaaS backup

PlatformNative options
AWSEBS Snapshots, AWS Backup
AzureAzure Backup, Site Recovery
GCPPersistent Disk Snapshots

Backup testing and validation

Automated verification

TestFrequency
Backup completionEvery job
Checksum validationEvery job
Restore test (sample)Daily
Malware scan of backupsDaily
Integrity verificationWeekly

Manual testing

TestFrequency
Single file restoreWeekly
Application restoreMonthly
Full system restoreQuarterly
DR failoverAnnually

Testing documentation

DocumentContent
Test planScope, objectives, schedule
Test resultsPass/fail, timing, issues
Lessons learnedImprovements needed
Updated proceduresRevised based on testing

Metrics and reporting

Backup health metrics

MetricTarget
Backup success rate>99%
RPO compliance100%
Backup windowWithin schedule
Storage utilization<80%
Restore success rate>99%

Recovery metrics

MetricMeasurement
Actual RTOTime to recover
Actual RPOData loss in recovery
Recovery reliabilitySuccessful restores
Mean time to recoverAverage recovery time

Vendor selection criteria

Key capabilities

CapabilityImportance
Immutability supportCritical
Air gap optionsCritical
Ransomware detectionHigh
Rapid recoveryHigh
Cloud integrationHigh
Compliance featuresMedium

Leading vendors

VendorStrength
VeeamVersatility, immutability
RubrikZero trust, simplicity
CohesityData management
CommvaultEnterprise, compliance
DruvaCloud-native
VeritasLegacy integration
Dell/EMCHardware integration

Implementation roadmap

Phase 1: Assessment (Month 1)

TaskDeliverable
Data classificationCriticality tiers
Current state analysisGap identification
RTO/RPO requirementsBusiness alignment
Vendor evaluationShortlist

Phase 2: Design (Month 2)

TaskDeliverable
Architecture design3-2-1-1-0 implementation
Security controlsAccess, network, encryption
Recovery proceduresDocumented runbooks
Testing planValidation schedule

Phase 3: Implementation (Month 3-4)

TaskDeliverable
Deploy backup infrastructureProduction ready
Configure immutabilityVerified protection
Implement monitoringAlerting active
Train staffOperational capability

Phase 4: Validation (Month 5-6)

TaskDeliverable
Recovery testingVerified RTO/RPO
DR exerciseFull failover test
DocumentationComplete runbooks
Continuous improvementOngoing optimization

Key takeaways

  1. Immutability is mandatory - Backups attackers can delete are worthless
  2. Air gap critical data - Network isolation prevents ransomware reach
  3. Test recovery regularly - Untested backups are hopes, not plans
  4. Separate credentials - Backup systems need unique admin accounts
  5. Extend retention - Long dwell times require deep recovery points
  6. Verify integrity - Scan backups for malware before restore
  7. Document everything - Procedures must be accessible during crisis

Backup is your last line of defense against ransomware. Design it assuming attackers will target it specifically—because they will.