Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen

Backup and disaster recovery: ransomware-proof data backup

Backups are the last line of defense against ransomware and data loss. This article explains the 3-2-1-1-0 rule, immutable storage, recovery testing, and modern backup architectures for businesses of all sizes.

Table of Contents (8 sections)

"We have backups."—That’s what almost every company says. But: Are the backups regularly tested for recoverability? Are they isolated from the primary network (so ransomware can’t reach them)? Has a full disaster recovery scenario ever been tested?

According to the Veeam Data Protection Trends Report 2024, 76% of companies experienced at least one ransomware attack last year. Of those who paid the ransom, 24% were still unable to fully recover their data. The most common reason: the backups were also encrypted.

The Evolution of Backup Rules

Classic: The 3-2-1 Rule

3 copies of the data
2 different media types (e.g., disk + tape)
1 offsite copy (outside the company)

The 3-2-1 rule is a good start—but insufficient for ransomware protection because:

  • All 3 copies can be compromised by the same ransomware attack
  • Offsite storage does not need to be online to be secure

Modern: 3-2-1-1-0 Rule

3 copies of the data
2 different media types
1 offsite copy
1 air-gapped / offline / immutable copy  ← NEW
0 errors – verifiable backups (regular restore tests)  ← NEW

The "1 offline/immutable" is the crucial addition for ransomware resilience.

Immutable Backups: What Does That Mean?

Immutable means: Once written, the backup cannot be modified or deleted—not even by administrators or ransomware.

Implementation Options

Object Storage with WORM (Write Once Read Many):

AWS S3 Object Lock:
  Governance Mode: Only root users can delete (good)
  Compliance Mode: No one can delete before expiration (better for critical backups)

Azure Blob Storage Immutability Policies:
  Time-based Retention: Data immutable for X days
  Legal Hold: Until explicitly released

Wasabi S3-compatible (cheaper than AWS):
  Object Lock can be enabled, very good value for money

Tape / Offline Storage:

  • Classic offline tape (LTFS, LTO-9): physically disconnected → ransomware cannot access it
  • Modern tape libraries with air gap: automatic disconnection after backup

Dedicated Backup Appliances with Immutability:

  • Dell PowerProtect (PowerScale, EMC DataDomain)
  • HPE StoreOnce Catalyst
  • Veeam Hardened Repository (Linux with immutable flags)

Backup Architectures for Different Company Sizes

SMEs (< 50 employees)

Primary data: NAS in the office

Backup job:    Veeam/Acronis → local backup NAS (daily, 30 days)

Offsite:       Automatic backup to the cloud (Wasabi/Backblaze B2)
               Immutable Object Lock enabled

Cost: ~€200/month for 5 TB of cloud storage + backup software

Mid-sized businesses (50–500 employees)

Primary data:  SAN/NAS + VMware VMs + M365

Backup Tier 1:  Veeam → Hardened Linux Repository (immutable, 30 days)
                         in the same data center – fast recovery
Backup Tier 2:  Veeam → Backup site (20 km away, daily, 90 days)
Backup Tier 3:  Azure/AWS S3 Object Lock (weekly, 1 year)

M365 Backup:   Veeam for M365 / Acronis Cyber Protect Cloud
               (Emails, SharePoint, Teams, OneDrive)

Enterprise (> 500 employees)

Multi-site with synchronous replication for Tier 1 data
Backup with Veeam Enterprise / Commvault / Zerto
Air-gapped tape library for critical data (annually, 10 years)
Dedicated recovery site / Cloud DR (Azure Site Recovery, Zerto)
Separate backup AD infrastructure (ransomware on production AD does not compromise backup AD)

Microsoft 365 Backup - Often Overlooked!

Microsoft only guarantees availability—not true backup:

Standard retention in M365:
  Deleted emails: recoverable for 30–90 days
  Deleted Teams messages: 30 days
  SharePoint versioning: 500 versions or 30 days

Not covered:
  - Ransomware that encrypts SharePoint/OneDrive
  - Malicious deletion by insiders
  - Accidental mass deletion
  - Data after the retention period expires

M365 Backup Solutions:

  • Veeam Backup for Microsoft 365
  • Acronis Cyber Protect Cloud
  • Druva inSync
  • NAKIVO for M365

Recovery Tests: The Most Important Things Are Often Overlooked

Untested backups are worthless. Backups fail during recovery for various reasons:

  • Backup job failed, no one checked the alerts
  • Restore tool is not installed on the recovery system
  • Backup contains only incremental data without a base backup
  • Hard drive is broken (red light on tapes)
  • Recovery process was never documented

Recommended Test Frequency:

Backup TypeRestore Test Frequency
Critical systems (DC, ERP)Monthly
Important systems (file servers)Quarterly
Standard systemsSemi-annually
Full DR testAnnually

Automated SureBackup (Veeam):

Every morning: Veeam automatically starts backup in an isolated sandbox
Boot test: Does the system start successfully?
Application test: Does the database respond to queries?
Result: Email with &quot;Backup OK&quot; or &quot;Restore failed&quot;

Disaster Recovery: More Than Just Backup

Disaster Recovery (DR) is the process of restoring operations after a complete failure:

Recovery Time Objective (RTO) and Recovery Point Objective (RPO)

Company A defines:
  ERP system: RTO = 4 hours, RPO = 1 hour

Meaning:
  After failure: System must be up and running again within max. 4 hours
  Data loss: Maximum 1 hour (hourly backups required)

Technical implementation:
  Synchronous replication: RPO = ~0 (no data loss), expensive
  Hourly snapshots: RPO = 1 hour, inexpensive
  Daily backup: RPO = 24 hours, very inexpensive

DR Scenarios for Ransomware

Scenario: Ransomware encrypts 80% of the systems

Question 1: Which systems should be restored first?
  Priority 1: Active Directory (everything else depends on it)
  Priority 2: VPN + Email (communication and remote access)
  Priority 3: ERP/Core Business

Question 2: From which backup?
  → Backup taken before the ransomware infection (often weeks earlier!)
  → Analysis required: When was the &quot;clean state&quot;?

Question 3: Restore to which environment?
  → NOT to the infected environment
  → Set up a clean, fresh infrastructure
  → Then restore from the backup

Question 4: How long will this take?
  100 servers × 2 hours restore = 200 hours / 10 parallel restores = 20 hours
  → RTO planning must account for realistic restore times

Backup Checklist: Audit Your Backup Strategy

□ Is the 3-2-1-1-0 rule implemented?
□ Is there at least one immutable/offline copy available?
□ Is M365 (email, SharePoint, Teams) backed up separately?
□ Is the backup infrastructure separated from the primary network?
  (Separate AD domain, separate credentials for backup access)
□ Are backup jobs monitored daily for success?
□ Are restore tests performed and documented quarterly?
□ RTO and RPO defined for critical systems?
□ Disaster recovery plan documented and known?
□ Annual DR test performed?
□ Retention periods (GoBD: 10 years for accounting documents)?

Compliance Requirements

GoBD: 6–10 years for tax-relevant documents. Backups must ensure immutable storage (WORM or audit-proof archiving).

BSI IT-Grundschutz CON.3: Detailed data backup concept required.

NIS2 Art. 21: Business continuity and backup explicitly required.

ISO 27001 A.8.13: Data backup – regular tests of recoverability.

GDPR Art. 32: Recoverability of personal data as a technical measure.

Sources & References

  1. [1] Veeam Data Protection Trends Report 2024 - Veeam
  2. [2] NIST SP 800-34 Rev. 1: Contingency Planning Guide - NIST
  3. [3] BSI IT-Grundschutz CON.3: Datensicherungskonzept - BSI

Questions about this topic?

Our experts advise you free of charge and without obligation.

Free Consultation

About the Author

Chris Wojzechowski
Chris Wojzechowski

Geschäftsführender Gesellschafter

E-Mail

Geschäftsführender Gesellschafter der AWARE7 GmbH mit langjähriger Expertise in Informationssicherheit, Penetrationstesting und IT-Risikomanagement. Absolvent des Masterstudiengangs Internet-Sicherheit an der Westfälischen Hochschule (if(is), Prof. Norbert Pohlmann). Bestseller-Autor im Wiley-VCH Verlag und Lehrbeauftragter der ASW-Akademie. Einschätzungen zu Cybersecurity und digitaler Souveränität erschienen u.a. in Welt am Sonntag, WDR, Deutschlandfunk und Handelsblatt.

10 Publikationen
  • Einsatz von elektronischer Verschlüsselung - Hemmnisse für die Wirtschaft (2018)
  • Kompass IT-Verschlüsselung - Orientierungshilfen für KMU (2018)
  • IT Security Day 2025 - Live Hacking: KI in der Cybersicherheit (2025)
  • Live Hacking - Credential Stuffing: Finanzrisiken jenseits Ransomware (2025)
  • Keynote: Live Hacking Show - Ein Blick in die Welt der Cyberkriminalität (2025)
  • Analyse von Angriffsflächen bei Shared-Hosting-Anbietern (2024)
  • Gänsehaut garantiert: Die schaurigsten Funde aus dem Leben eines Pentesters (2022)
  • IT Security Zertifizierungen — CISSP, T.I.S.P. & Co (Live-Webinar) (2023)
  • Sicherheitsforum Online-Banking — Live Hacking (2021)
  • Nipster im Netz und das Ende der Kreidezeit (2017)
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
This article was last edited on 04.03.2026. Responsible: Chris Wojzechowski, Geschäftsführender Gesellschafter at AWARE7 GmbH. License: CC BY 4.0 - free use with attribution: "AWARE7 GmbH, https://a7.de"

Cookielose Analyse via Matomo (selbst gehostet, kein Tracking-Cookie). Datenschutzerklärung