Key Takeaways

  • Follow the 3-2-1 rule: 3 copies, 2 media types, 1 offsite.
  • Backups you haven't tested aren't backups.
  • Define RPO and RTO before disaster strikes.
  • Protect backups from ransomware (immutable/air-gapped).
  • Include system configs, not just data.
  • Document recovery procedures.

1. Why Backups Matter

Data loss happens: ransomware attacks, hardware failures, accidental deletion, disasters. Backups are your last line of defense when everything else fails. Many organizations have learned this lesson the hard way—don't be one of them.

The 3-2-1 Rule

3 copies of your data
2 different media types
1 copy offsite (or cloud)
This ensures resilience against various failure modes.

2. Backup Strategy

2.1 Key Metrics

MetricDefinitionExample
RPORecovery Point Objective—max acceptable data loss4 hours = lose at most 4 hours of data
RTORecovery Time Objective—max acceptable downtime1 hour = systems back in 1 hour

2.2 What to Backup

3. Backup Types

TypeDescriptionWhen to Use
FullComplete copy of all dataWeekly baseline
IncrementalChanges since last backupDaily between fulls
DifferentialChanges since last fullAlternative to incremental
SnapshotPoint-in-time copyVMs, databases

4. Cloud Backup

# AWS S3 backup with versioning and MFA delete
aws s3api put-bucket-versioning \
    --bucket my-backup-bucket \
    --versioning-configuration Status=Enabled

# Enable object lock for immutability
aws s3api put-object-lock-configuration \
    --bucket my-backup-bucket \
    --object-lock-configuration ...
Ransomware Targets Backups

Modern ransomware actively seeks and destroys backups. Protect with: air-gapped copies (no network connection), immutable storage, separate credentials, and offline copies that can't be reached by attackers on your network.

5. Ransomware Protection

6. Testing & Verification

# Regular testing schedule:
- Monthly: Restore sample files
- Quarterly: Full system recovery test
- Annually: DR tabletop exercise

# Verify:
- Backups complete without errors
- Data is recoverable and usable
- Recovery meets RTO targets
- Documentation is accurate

7. Recovery Procedures

  1. Identify what data/systems need recovery
  2. Select appropriate backup point (RPO consideration)
  3. Prepare recovery environment
  4. Restore data following documented procedure
  5. Verify data integrity
  6. Test application functionality
  7. Document any issues for procedure improvement
Document Everything

Recovery during an incident is high-stress. Detailed, tested documentation enables anyone to perform recovery—not just the person who set it up. Include step-by-step procedures, credentials location, and contact information.

8. Frequently Asked Questions

How long should I keep backups?
Depends on business and compliance requirements. Common: daily for 7 days, weekly for 4 weeks, monthly for 12 months, yearly for 7 years. Consider ransomware dwell time—keep backups long enough to have clean copies.
Should I encrypt backups?
Yes, especially for offsite and cloud backups. Encryption protects data if backup media is lost or stolen. Securely manage encryption keys—lost keys mean unrecoverable backups. Store keys separately from backups.

Conclusion

Backups are essential—but only if they work when needed. Follow the 3-2-1 rule, protect against ransomware with immutable/air-gapped copies, test regularly, and document procedures. Define your RPO and RTO to align backup strategy with business needs. When disaster strikes, good backups are the difference between inconvenience and catastrophe.

Continue Learning:
Ransomware Defense Incident Response