Immutable Backups: Ransomware Defense
This article is educational content about immutable backups and ransomware defense. It is not professional security guidance, backup architecture design, or a substitute for consulting with a qualified backup and security specialist.
Ransomware fundamentally changed the backup calculus. For decades, backup protected against accidental data loss—employees deleting files by mistake, hardware failures, software corruption. Backups also protected against intentional data loss by insiders or natural disasters. But ransomware creates a different threat. An attacker doesn't just want to destroy your data. They want to encrypt it so that you can't access it and then demand money for the decryption key. The attacker's goal is to make your data useless while keeping it intact.
If backups are accessible the same way production systems are accessible, ransomware can access and encrypt them too. A backup on the corporate network, accessible with normal credentials, can be encrypted by ransomware propagating through your network. A backup stored in cloud storage with normal access permissions can be accessed and encrypted if an attacker compromises your cloud credentials. Traditional backups become useless against ransomware. Immutable backups—backups that cannot be modified or deleted after creation—provide defense against ransomware because even if an attacker compromises your entire environment, they cannot encrypt or delete immutable backups. Once ransomware became the dominant cyber threat, immutable backups evolved from a luxury feature to a fundamental requirement.
What Immutability Means and How It Works
Immutable means unchangeable. An immutable backup is one that, once written, cannot be modified or deleted until a predetermined time period expires—the retention period. After that period expires, the backup can be deleted or kept indefinitely depending on your retention policy. But during the immutability period, nothing can touch it.
The critical detail is that immutability must be enforced at the storage layer, not at the application layer. An administrator with full system access cannot delete an immutable backup before its retention expires. Ransomware running with administrative access also cannot delete it. A hacker with stolen cloud credentials cannot delete it. Network traffic cannot modify it. Once the backup is written as immutable, it's locked until the retention period ends. This is what provides defense against ransomware—the immutability is absolute, not just "strongly discourages deletion" or "makes deletion difficult." It's technically impossible to delete.
This is the key distinction between immutability and other backup protection strategies. You could create policies saying "backups must not be deleted" but an administrator or attacker can override policies. You could use permissions to restrict who can delete backups but an attacker who compromises the administrator account can still delete them. Immutability backed by storage technology cannot be bypassed through policies, permissions, or administrative access. It's enforced by the hardware or storage system itself.
Write-Once Storage Technology
Immutability requires storage that enforces write-once semantics. Write-once means data can be written once, read many times, but cannot be overwritten or deleted until the retention period expires. Some storage systems (certain object storage services, specialized backup appliances, and advanced storage arrays) enforce write-once at the storage layer. Other storage systems don't enforce write-once—they allow overwriting and deletion at any time.
A backup written to a standard file system is not immutable because an administrator with the right permissions can delete the file. A backup written to an external drive formatted as NTFS or ext4 is not immutable because file permissions on those systems can be overridden. A backup written to write-once storage is immutable because the storage itself prevents deletion.
This is a critical distinction. Immutability must come from the storage technology, not from software configuration or policies. If you're relying on software policies to enforce immutability, you don't actually have immutability. If an attacker compromises the backup software, they might be able to bypass the policies. If you're relying on file permissions, a compromised administrator can change the permissions. Write-once storage enforced at the hardware or storage service level cannot be bypassed by software or administrative action.
Time-Based Retention and Hold Periods
Immutable backups include a retention period or hold period—the time during which the backup cannot be deleted. This retention period is configured when the backup is created and cannot be shortened. Retention periods might be 30 days, 90 days, six months, or years depending on backup requirements.
During the retention period, the backup is locked. After the retention period expires, the backup can be deleted or kept indefinitely depending on your policy. The retention period should match your recovery requirements. If you need to be able to recover from a ransomware attack that happened 30 days ago, your retention period needs to be at least 30 days. Some organizations use longer retention—90 days or six months—to provide protection against discovered-late attacks. If ransomware was present in your environment for weeks before being detected, a 30-day retention period might not be sufficient. You'd need to recover from a backup created before the attack was discovered, which might have been 45 days ago.
The retention period is a key configuration for immutable backups. It's the bridge between "backup is immutable now" and "backup is deletable." Once the period expires, the backup transitions from immutable to mutable, and you can delete it if you want. But while immutable, nothing can touch it.
Separation from Primary Systems
Immutable backups provide protection only if they're separate from the primary systems that might be compromised. If an immutable backup is on the same network as infected primary systems and the attacker has access to it, they cannot delete it because of immutability. But they might be able to limit your ability to restore from it. They might interfere with the restore process, prevent restore commands from executing, or create obstacles to recovery.
Better protection comes from separating backups from primary systems. This might mean backups on a completely different network segment, backups at a different physical location, or backups at a different cloud provider. Network separation means even if an attacker compromises your entire primary network, the backup network is isolated and backups cannot be accessed. The attacker cannot interfere with restore because they cannot reach the backup system.
This separation concept is called an air gap—a backup that's not connected to anything compromised. An air-gapped backup is both immutable and inaccessible to anyone on the compromised network. This provides maximum protection against ransomware.
Offline and Air-Gapped Backups for Maximum Protection
Offline backups are backups that are not continuously connected to any network. They might be tape stored in a safe deposit box. They might be an external drive stored off-site in a secure location. They might be cloud storage that's only accessible through a special out-of-band process that requires manual authorization. The defining characteristic is that they're not connected to normal network infrastructure.
Air-gapped storage is a specific type of offline storage—completely disconnected from any network. An attacker cannot encrypt or delete what they cannot reach. Offline and air-gapped backups provide the highest level of protection against ransomware because there's no network path to them and no way for compromised systems to affect them.
The trade-off is recovery time. If backups are completely offline and stored off-site, it might take hours to retrieve them and bring them into a location where they can be restored. A tape backup stored in a safe deposit box might require someone to go to the bank during business hours, retrieve the tape, bring it to the data center, and load it into a tape drive. This could add hours to recovery time. But that extra time is worth it for critical data—the additional recovery time is acceptable compared to the alternative of paying a ransom or accepting data loss.
Ransomware Threat Model and Encryption
Ransomware encrypts files so that owners cannot access them, then demands payment for a decryption key. An attacker with access to backups can encrypt them too, making recovery impossible. Immutable backups prevent this because ransomware cannot overwrite immutable data. The ransomware can attempt to delete it, but deletion fails because the storage prevents it. The ransomware can attempt to overwrite it with encrypted data, but that fails too. The immutable backup remains in its original state, unencrypted and recoverable.
Offline and air-gapped backups provide even stronger protection because the ransomware cannot reach them to encrypt them at all. The backup is not on any network the ransomware can access, so the attack doesn't even reach the backup system.
The combination of immutability, offline storage, and air-gapping provides strong defense. An organization with this setup is resilient to ransomware because they can always recover from a known-clean backup. The attacker cannot encrypt, delete, or even access the backup. Organizations without immutable backups face difficult choices during ransomware attacks: pay the ransom (which doesn't guarantee your data is returned), lose data, or spend days or weeks paying vendors to recover systems without the backup.
Recovery from Ransomware with Immutable Backups
If you have an immutable backup created before ransomware attack, recovery is straightforward. You have a known-clean copy of your data that cannot have been encrypted by the ransomware. The recovery process is: identify the time when ransomware attack occurred, restore from the backup created before that attack, validate the restored systems are working correctly, bring them back into production.
This might take hours to days depending on data volume. A system with a few terabytes might recover in hours. A system with hundreds of terabytes might take days. But compare that to the alternatives. Paying a ransom: you're trusting criminals to actually provide a working decryption key and not return to attack you again. Rebuilding without backups: you're starting from zero and might never recover everything. Negotiating with threat actors: you might pay hundreds of thousands or millions. Immutable backups eliminate the ransom pressure because recovery without payment is feasible.
Cost and Operational Considerations
Immutable backups cost more than standard backups. Immutable storage media (write-once tape, object storage with immutability enforced) costs more than regular storage. Maintaining backups for longer retention periods (because you cannot delete them during retention) costs more storage and ongoing storage costs. Air-gapped and offline storage requires additional infrastructure: secure storage facilities, tape drives, or backup appliances. The cost is real and significant for organizations with large data volumes.
However, the cost of immutable backups is typically less than the cost of a ransomware attack, whether you pay ransom, lose business during recovery, or rebuild from scratch. Organizations have paid millions in ransoms. They've lost millions in business disruption. They've spent millions in recovery costs. Immutable backups that cost hundreds of thousands annually are insurance that costs less than the claim.
Organizations should evaluate the cost of immutable backups against the cost of potential ransomware scenarios. What would a ransomware attack cost your organization? If recovery without backups would take two weeks and cost $2 million in recovery labor and business disruption, immutable backup infrastructure costing $500K is clearly justified. If ransomware attack would result in paying a ransom of $5 million, immutable backup infrastructure costing $500K is clearly justified.
Closing: Immutable Backups as Essential Infrastructure
Ransomware made traditional backups insufficient for organizations facing modern threats. Immutable backups—which cannot be modified or deleted during a retention period—provide protection because even if an attacker compromises your entire environment, they cannot encrypt or delete immutable backups. Combine immutability with offline and air-gapped storage for maximum protection.
The combination ensures you can always recover from a ransomware attack by restoring from a known-clean backup. The attacker cannot prevent recovery. The ransom demand loses its leverage because you have a viable alternative. The cost of immutable backups is significant but typically less than the cost of ransomware attacks. For organizations facing ransomware risk, immutable backups are no longer optional features or luxury considerations. They're essential infrastructure. They're the difference between recovering from ransomware and being destroyed by it.
Fully Compliance provides educational content about IT infrastructure and cybersecurity. This article reflects best practices in ransomware defense as of its publication date. Backup and security requirements vary by organization, industry, and risk profile—consult with qualified backup and security specialists for guidance specific to your situation.