Skip to main content

From Backup to Cyber Resilience

  • April 12, 2026
  • 4 comments
  • 38 views

Nico Losschaert
Forum|alt.badge.img+11

 

Introduction: A Journey That Started with 3-2-1-1-0

Five years ago, I published my first Veeam community post about the 3-2-1-1-0 golden backup rule. That post marked the beginning of my journey as a Veeam Legend.

Back then, the rule was already considered best practice. Today, it is still relevant — but no longer sufficient on its own.

The threat landscape has evolved. So our backup strategies need to follow.

The Foundation Still Matters

The 3-2-1-1-0 rule remains the baseline:

  • 3 copies of your data
  • 2 different media types
  • 1 offsite copy
  • 1 immutable or air-gapped copy
  • 0 errors (verified recoverability)

✔️ This model protects against hardware failure
✔️ It addresses human error
✔️ It covers traditional disaster scenarios

But here’s the reality:

⚠️ Attackers now design their operations specifically to break this model.

What Changed? (And Why It Matters)

1. Backups Are the First Target

Modern ransomware attacks:

  • Target backup servers first
  • Delete or corrupt backup chains
  • Exploit APIs and credentials

Backups are no longer a safety net
➡️ They are now a primary attack surface

2. One Immutable Copy Is a Single Point of Failure

Even immutable storage can fail if:

  • Credentials are compromised
  • Retention expires at the wrong time
  • Misconfigurations exist
Immutability without independence is not resilience.

3. Recovery Expectations Have Changed

Organizations now demand:

  • Near-instant RTOs
  • Guaranteed clean restore points
  • Proven recovery — not assumed

The Evolution: From 3-2-1-1-0 to 3-2-1-2-0

Let’s be clear:

This is not replacing the rule — it is strengthening it.

New Principle

  • At least two independent immutable or air-gapped backups

Architecture Layer 1: Primary Backup (Speed + Security)

Hardened Repository

A properly designed hardened repository provides:

  • OS-level immutability
  • No domain membership
  • Minimal attack surface
  • High-performance restores on already proven block-storage

Key Characteristics:

  • Linux-based
  • Single-purpose design
  • Restricted access model

✔️ Fast restores
✔️ Strong ransomware protection
✔️ Operational efficiency

Preferred: VEEAM Infrastructure Appliance

Purpose-built solutions reduce risk:

  • Pre-hardened configurations
  • Reduced misconfiguration
  • Faster deployment
Less flexibility, more security — and that’s a good trade-off.

Architecture Layer 2: Secondary Backup (Survivability First)

This layer is your last line of defense.

If everything else fails — this must survive.

Options for True Resilience

1. Tape (Physical Air Gap)

  • Completely offline
  • Immune to cyber attacks
  • Ideal for long-term retention

2. VEEAM Cloud Connect (Logical Isolation)

  • Offsite by design
  • Separation of control planes
  • Protection from insider threats
  • Protection against disasters

3. Object Storage (S3-Compatible)

  • Object lock immutability
  • Scalability
  • Cost efficiency

⚠️ Requires strict credential isolation

4. Purpose-Built Object Storage Appliances (ObjectFirst OOTBI)

  • Simplified immutability
  • Reduced operational complexity
  • Secure by default - true/absolute immutability - 8-eyes principle

Core Design Principles

1. Independence

  • Separate credentials
  • Separate environments
  • Separate trust boundaries

2. Immutability

  • OS-level (hardened repo)
  • Storage-level (object lock)
  • Physical (tape)

3. Isolation

  • Network segmentation
  • Limited exposure
  • Air-gap where possible

4. Verification (0 Errors)

  • Automated testing
  • Sandbox validation
  • Regular recovery drills
A backup is only valid if it is recoverable.

Common Mistakes to Avoid

  • Relying on a single immutable repository
  • Using shared credentials across layers
  • Having no offline or air-gapped copy
  • Skipping recovery testing

Conclusion: Backup Is Not Enough

The original 3-2-1-1-0 rule is still essential — but modern threats demand more.

The New Reality

  • One immutable copy = good backup
  • Two independent immutable copies = true resilience
If one layer fails, the other must survive.

That is the difference between:

  • Backup strategy
  • Cyber resilience architecture

Where It All Started

🔗 Original post:https://community.veeam.com/blogs-and-podcasts-57/3-2-1-1-0-golden-backup-rule-569?tid=569&fid=57

 

Final Thought

In 2026, resilience is not a feature — it is a requirement by design.

 

More details on my personal site : From Backup to Cyber Resilience | Nico Losschaert

4 comments

Jason Orchard-ingram micro
Forum|alt.badge.img+2

great post,  totally agree with you “In 2026, resilience is not a feature — it is a requirement by design.”


kciolek
Forum|alt.badge.img+4
  • Influencer
  • April 13, 2026

great post! thanks for sharing!


StephenM
Forum|alt.badge.img+2
  • Comes here often
  • April 13, 2026

My license plate is V32110, if we change the rule I have to get a new license plate.  Excellent points!


kciolek
Forum|alt.badge.img+4
  • Influencer
  • April 13, 2026

My license plate is V32110, if we change the rule I have to get a new license plate.  Excellent points!

lol ..that’s awesome!