- Malcolm Tutt
"Fortifying Your Data: The Power of Air-Gapped Backups
Immutable backups are a type of backup that cannot be modified or deleted once they have been created. They are designed to protect against data loss or corruption, as well as against malicious attacks such as ransomware.
There are a few different ways to create immutable backups, including:
1. Snapshot-based backups: These are backups created as a point-in-time snapshot of the data. Once the snapshot is taken, the data is frozen and cannot be modified or deleted.
2. Read-only backups: These are backups created in a read-only format, such as a CD or DVD. Once the backup is created, it cannot be modified or deleted.
3. Offsite backups: These are backups stored in a separate location, such as in the cloud, and can only be accessed by authorized personnel.
4. Air-gapped backups: These are backups that are stored on a separate, isolated network, and can't be accessed from the main network, this way even if the main network is compromised, the backups are safe.
Air-gapped backups can be in the cloud
Air-gapped backups are stored on a separate, isolated network and can't be accessed from the main network. The idea is that if the main network is compromised, the backups will still be safe.
Air-gapped backups can be stored in the cloud, but the cloud storage must be disconnected or isolated from the main network. This can be achieved through a variety of methods, such as:
1. Using a separate account: Setting up a separate cloud account for the backups and ensuring that the account is not accessible from the main network.
2. Using a VPN: Connecting to the cloud storage using a virtual private network (VPN) that is not connected to the main network.
3. Using a physical air gap: A physical disconnection, such as a disk drive, stores the backups and keeps them isolated from the main network.
4. Multi-factor authentication will place an additional layer of protection around the immutable backups.
The main advantage of immutable backups is that they can protect against data loss or corruption, as well as against malicious attacks such as ransomware. Once the backup is created, it cannot be modified or deleted, so it is always possible to restore the data to a known good state.
Additionally, it's essential to verify the integrity of the backups and test them regularly to ensure that they can be used to restore your files in an emergency.
Drop us a line, and we´ll get right back to you firstname.lastname@example.org