Skip to main content

Blog: Immutable Backups Are Not Enough: What Else You Need with Veeam

  • April 6, 2026
  • 7 comments
  • 61 views

kciolek
Forum|alt.badge.img+4

Immutable backups are one of the best things to happen to data protection.

They’ve become the go-to answer for ransomware resilience—and for good reason:

  • Backups can’t be deleted
  • They can’t be modified
  • Attackers can’t encrypt them

That’s a huge win.

But here’s the part that doesn’t get said enough:

    Immutability is a layer of protection—not a complete strategy.

I’ve seen environments check the “immutable” box and assume they’re covered.

They’re not.

Because when something actually goes wrong, immutability alone doesn’t guarantee you can recover cleanly, quickly, or safely.

Let’s talk about what else you actually need.

 

1. Recovery Testing (Because “Protected” Doesn’t Mean “Recoverable”)

You can have perfectly immutable backups that are:

  • Corrupted
  • Incomplete
  • Misconfigured
  • Or just… not usable the way you expect

If you haven’t tested restores, you’re still guessing.

What you should be testing:

  • Full VM restores
  • File-level recovery
  • Application item restores (SQL, AD, email)
  • Instant Recovery performance

Immutability protects your data.

Testing proves you can use it.

 

2. Clean Restore Points (Ransomware Changes the Game)

Here’s the uncomfortable reality:

If ransomware sits in your environment long enough, your backups can be cleanly preserved… and still infected.

Immutable ≠ clean.

What you need:

  • Malware scanning of backups
  • Suspicious activity monitoring
  • The ability to identify a known good restore point

Why it matters:

During recovery, the question isn’t:

“Do we have backups?”

It’s:

“Which backup can we trust?”

 

3. Access Control & Identity Security

Attackers don’t just go after backups—they go after backup administrators.

If they gain access to your backup platform, they can:

  • Attempt to delete backups (even if blocked by immutability, they’ll try other angles)
  • Tamper with configurations
  • Disrupt recovery processes

What you need:

  • MFA on backup infrastructure
  • Least privilege access
  • Separate admin accounts (no shared credentials)
  • Audit logging and monitoring

If identity is compromised, your backup strategy is at risk—immutable or not.

 

4. Network Segmentation (Don’t Let Everything Be Reachable)

If your backup infrastructure lives on the same flat network as production, it’s exposed.

Immutability protects the data—but not necessarily:

  • Access paths
  • Management interfaces
  • Supporting infrastructure

What you need:

  • Segmented backup networks
  • Restricted access to repositories
  • Limited communication paths between systems

The harder it is to reach your backups, the better.

 

5. Recovery Speed (RTO Still Matters)

Immutable backups don’t automatically mean fast recovery.

You could have perfectly protected data… that takes hours (or days) to restore.

That’s not going to help much during an outage.

What you need:

  • Tested recovery times (RTO)
  • Technologies like Instant Recovery
  • Properly sized repositories and infrastructure
  • Clear prioritization of critical systems

Protection without speed is still downtime.

 

6. Offsite & Air-Gapped Copies

Immutability is strong—but it’s still part of a system.

And systems can fail.

What you need:

  • Backup copies in a separate location
  • Object storage with immutability
  • Offline or air-gapped copies where possible

Why it matters:

If your primary backup environment is compromised or unavailable, you need another option.

Resilience comes from layers—not a single control.

 

7. Operational Discipline (The Part Nobody Talks About)

You can have all the right technology and still fail operationally.

I’ve seen it happen:

  • Jobs in warning state for weeks
  • Capacity ignored until it’s critical
  • Restore processes undocumented
  • Nobody sure who owns recovery

What you need:

  • Daily health checks
  • Clean alerting (no noise)
  • Documented runbooks
  • Regular reviews of backup performance and capacity

Technology doesn’t replace process—it depends on it.

 

8. A Real Recovery Plan

This is the big one.

Not a document that sits in a folder.

Not a checklist nobody’s tested.

A real, practiced recovery plan.

It should answer:

  • What do we restore first?
  • Where do we restore it?
  • Who is responsible?
  • How long will it take?

If you don’t know these answers ahead of time, you’ll be figuring them out during an incident.

That’s not where you want to be.

 

Bringing It All Together

Immutable backups are critical—but they’re just one piece of the puzzle.

A resilient data protection strategy includes:

  • Immutability
  • Recovery testing
  • Clean restore validation
  • Strong access control
  • Network isolation
  • Fast recovery capabilities
  • Offsite copies
  • Operational discipline

 

Final Thought

It’s easy to feel confident once immutability is in place.

But confidence shouldn’t come from a feature—it should come from proven recovery.

Because in a real incident, it’s not about whether your backups were protected.

It’s about whether they can bring you back.

And that takes more than immutability.

7 comments

eblack
Forum|alt.badge.img+2
  • Influencer
  • April 6, 2026

All good points.


coolsport00
Forum|alt.badge.img+22
  • Veeam Legend
  • April 6, 2026

“Defense in layers” is the key. Good post Ken. 👍🏻


Chris.Childerhose
Forum|alt.badge.img+21

Excellent points and following the 3-2-1-1-0 rule as well. 👍🏼

 
 
 

kciolek
Forum|alt.badge.img+4
  • Author
  • Influencer
  • April 6, 2026

“Defense in layers” is the key. Good post Ken. 👍🏻

thank you ​@coolsport00! something i explain to my customers over and over 


kciolek
Forum|alt.badge.img+4
  • Author
  • Influencer
  • April 6, 2026

Excellent points and following the 3-2-1-1-0 rule as well. 👍🏼

 
 
 

yes ​@Chris.Childerhose  - that 3-2-1-1-0 is very important!


Jason Orchard-ingram micro
Forum|alt.badge.img+2

Immutable backups are a valuable control, but they’re only part of the equation. It’s equally important to ask where those backups are stored, how immutability is enforced at the storage layer, and whether the underlying platform provides encryption at rest to protect against data exfiltration and unauthorized access.

+---------------------------+
| Access Control (IAM) |
+---------------------------+
| Immutability Enforcement | ← "Cannot be modified or deleted"
+---------------------------+
| Backup Encryption at Rest | ← "Unreadable without keys"
+---------------------------+
| Storage Medium |
+---------------------------+


kciolek
Forum|alt.badge.img+4
  • Author
  • Influencer
  • April 6, 2026

Immutable backups are a valuable control, but they’re only part of the equation. It’s equally important to ask where those backups are stored, how immutability is enforced at the storage layer, and whether the underlying platform provides encryption at rest to protect against data exfiltration and unauthorized access.

+---------------------------+
| Access Control (IAM) |
+---------------------------+
| Immutability Enforcement | ← "Cannot be modified or deleted"
+---------------------------+
| Backup Encryption at Rest | ← "Unreadable without keys"
+---------------------------+
| Storage Medium |
+---------------------------+

@Jason Orchard-ingram micro I agree!