What are Immutable Backups?
Ransomware attacks frequently target backup repositories before encrypting production systems. When organizations discover their production data is encrypted and attempt recovery, they often find that attackers have already deleted their backup repositories. Recovery point objectives become irrelevant when there is nothing left to recover from.
Immutable backups prevent exactly this scenario. So what is immutable backup technology? The immutable backup definition centers on Write-Once-Read-Many (WORM) technology that creates unalterable recovery points which cannot be encrypted or deleted by ransomware attackers, even when those attackers obtain administrative credentials to your systems.
According to the Verizon 2025 Data Breach Investigations Report, 44% of all data breaches in 2025 involved ransomware. Industry research consistently shows that most ransomware-attacked organizations struggle to recover the majority of their data, with many recovering less than half of what was lost.
High-profile incidents illustrate the consequences of inadequate backup protection. The Colonial Pipeline attack (2021) forced the company to pay $4.4 million in ransom after ransomware disrupted fuel supply across the Eastern United States. JBS Foods (2021) paid $11 million to ransomware operators who compromised the world's largest meat processing company. In each case, immutable backups would have provided a recovery path independent of ransom negotiations.
The technical mechanism is straightforward: WORM technology allows data to be written to storage media a single time and prevents that data from being erased or modified until a predetermined retention period expires. Once you create an immutable backup, authorized users can read the data as often as needed, but they cannot change it. Neither can attackers.
Federal agencies including CISA, NSA, and FBI recognize the immutable backups ransomware protection value and position these solutions as the "last line of defense" in enterprise protection strategies. NIST frameworks (SP 800-184, CSF 2.0) integrate immutable backup requirements with broader cybersecurity controls.
Why Immutable Backups Matter in Cybersecurity
Ransomware operators routinely target backup infrastructure as their first objective. They understand that organizations with viable backups can recover without paying ransoms, so modern attack playbooks prioritize backup destruction before encrypting production systems. The connection between immutable backups, ransomware defense, and organizational resilience is direct: WORM-protected backups eliminate this attack vector entirely.
The financial impact of backup failures during ransomware incidents is severe. The IBM 2024 breach report documented $4.88 million as the global average cost of a data breach, with compromised backups significantly extending recovery times and increasing costs. Organizations without accessible backups face difficult choices between paying ransoms with no guarantee of data recovery or rebuilding systems from scratch.
Immutable backups also address credential-based attacks. When attackers compromise administrative accounts through phishing, credential stuffing, or privilege escalation, they gain the same permissions as legitimate administrators. Traditional backup systems treat these compromised credentials as valid, allowing attackers to delete backup repositories. WORM technology operates independently of user permissions, rejecting deletion requests regardless of credential validity.
Research from the Ponemon Institute highlights gaps in enterprise authentication infrastructure, with many organizations lacking validated backup recovery plans for Active Directory systems. Since enterprise authentication depends on AD recovery, this represents a single point of failure that immutable backups directly address.
Understanding the differences between traditional and immutable backup systems clarifies why this protection matters.
Differences Between Traditional and Immutable Backup Systems
Traditional backup systems rely on access controls to protect data. Administrators with appropriate permissions can modify, overwrite, or delete backup files. This design works well for legitimate operations but creates vulnerabilities when attackers obtain those same permissions.
Immutable backups enforce protection at the storage layer rather than the permission layer. WORM technology physically or logically prevents data modification regardless of who requests it. The storage system rejects delete commands from any source, including root accounts and backup administrators.
The key differences between these approaches include:
- Modification capability: Traditional backups allow authorized users to modify or delete data. Immutable backups prevent modification by anyone until retention periods expire.
- Credential vulnerability: Traditional backups become vulnerable when administrative credentials are compromised. Immutable backups maintain protection regardless of credential status.
- Ransomware resilience: Traditional backups can be encrypted or deleted by ransomware with administrative access. Immutable backups remain intact even during active attacks.
- Storage efficiency: Traditional backups support deduplication and incremental updates that reduce storage consumption. Immutable backups require more storage capacity due to write-once constraints.
- Recovery flexibility: Traditional backups can be modified to fix corruption or remove malware before restoration. Immutable backups preserve data exactly as written, requiring clean-room recovery environments for infected data.
Organizations should implement both approaches in complementary tiers. Traditional backups handle rapid operational recovery for everyday incidents. Immutable backups serve as the protected recovery layer for ransomware and destructive attacks.
To understand how immutable backups provide this protection, you need to examine their underlying architecture.
Core Components of Immutable Backups
Immutable backup systems consist of four architectural layers that work together to prevent data modification while maintaining operational recovery capabilities. Understanding the immutable backups meaning requires examining how backup immutability operates at each layer.
WORM Storage Foundation
The foundational layer implements Write-Once-Read-Many technology through physical media, tape systems, or software-defined object storage. Physical implementations include optical media and tape systems like IBM LTO WORM Data Cartridges. Software-defined implementations use object lock mechanisms in AWS S3 Object Lock or Google Cloud Backup Vaults. Storage operating systems enforce immutability by rejecting Delete or Overwrite commands at the kernel level, creating multiple protection layers that operate independently of user permissions or administrative credentials.
Data Segregation Architecture
You must store immutable backups separately from primary storage systems, either physically or logically. Organizations implement three tiers: operational backup for fast recovery, immutable protection with WORM capabilities, and physical air-gap via offline storage. Each tier serves different recovery time objectives and security requirements. Organizations frequently combine these layers according to the 3-2-1-1-0 backup strategy framework.
Retention Policy Engine
Time-based retention locks prevent premature deletion regardless of permission levels obtained during system compromise. You configure minimum retention periods that cannot be bypassed through administrative actions or API calls, ensuring temporal guarantees of backup integrity.
Access Control Layer
Organizations should implement layered access controls for backup infrastructure:
- Dedicated backup administrator accounts
- MFA for all administrative access (CIS 6.5)
- Least privilege implementation (CIS 5.4)
- Regular access reviews (CIS 5.3)
These controls ensure that even compromised administrative credentials cannot modify or prematurely delete immutable backup data due to WORM technical enforcement. This provides layered defense against both external attackers and insider threats.
Understanding these architectural components provides the foundation for examining how WORM technology operates during backup, retention, and recovery phases.
How Immutable Backups Work
The immutability mechanism operates through Write-Once-Read-Many (WORM) technology, which implements kernel-level controls that prevent data modification or deletion after initial write. The architecture combines physical or logical data segregation, predetermined retention period enforcement, and air-gapping capabilities to establish protection against ransomware attacks.
- Write phase: When your backup software initiates a backup job, it writes data to WORM-compliant storage media or cloud object storage with immutability features enabled. During this initial write operation, the storage system creates an unalterable copy while simultaneously establishing retention metadata that defines when the data can be deleted. For tape implementations, physical write protection activates after writing completes. For cloud implementations like AWS S3 Object Lock, compliance mode prevents deletion by any user, including root accounts, until retention expires.
- Retention enforcement phase: Once the write phase completes, the storage system actively rejects modification or deletion requests through kernel-level controls that operate independently of administrative credentials. Modern implementations include vault locking that prevents modification of retention policies themselves, ensuring attackers cannot simply change retention settings to zero days and then delete backups.
- Recovery phase : You maintain full read access to backup data for recovery. Establish isolated recovery environments separate from production networks to test backup integrity without reinfection risk.
- While the technical mechanism provides robust protection, organizations must select the right implementation approach for their environment.
Types of Immutable Backup Solutions
Organizations can implement immutable backup solutions through several distinct approaches, each offering different trade-offs between recovery speed, cost, and security isolation.
- Immutable backup options evaluation criteria : When evaluating immutable backup options, key criteria include recovery time objectives, storage costs, compliance requirements, and integration with existing infrastructure. These evaluation criteria help organizations assess vendor lock-in risks, scalability limitations, and the level of administrative overhead required for ongoing management.
- Immutable cloud backup: Major cloud providers offer built-in immutability features. AWS S3 Object Lock provides two modes: Governance mode allows users with specific permissions to override protection, while Compliance mode prevents deletion by anyone, including root accounts, until retention expires. Azure Immutable Blob Storage and Google Cloud Storage retention policies offer similar capabilities. Cloud solutions provide rapid deployment and eliminate hardware management, but require careful configuration to ensure true immutability rather than access-control-based protection.
- Hardware WORM solutions: Physical WORM media includes LTO tape cartridges with hardware write-protection and optical WORM discs. These solutions provide air-gap capability when stored offline, making them unreachable by network-based attacks. Recovery times extend to hours or days compared to minutes for online solutions, but physical isolation offers protection that software-based approaches cannot match.
- Software-defined immutability: Enterprise backup platforms including Veeam Hardened Repository, Commvault, and Cohesity implement immutability through hardened Linux repositories with restricted access. These solutions integrate with existing backup workflows while adding WORM protection at the software layer. Verify that implementations enforce immutability at the storage level rather than relying solely on access controls.
- Air-gapped vs. immutable backups: Air-gapped backups achieve protection through physical disconnection from networks, while immutable backups remain connected but unmodifiable. Air-gapped solutions prevent any network-based attack from reaching backup data. Immutable solutions enable faster recovery but remain vulnerable to attacks on new backup jobs before immutability locks engage. The 3-2-1-1-0 framework recommends implementing both approaches across different backup tiers.
Beyond security considerations, regulatory requirements often dictate which implementation approach organizations must adopt.
Compliance Requirements
Regulatory frameworks increasingly mandate immutable backup capabilities, making compliance a primary driver for implementation beyond ransomware defense.
Financial services requirements
SEC Rule 17a-4 requires broker-dealers to preserve electronic records in non-rewriteable, non-erasable format, a direct mandate for WORM storage. Financial institutions must demonstrate that records cannot be altered or deleted during required retention periods, which WORM technology satisfies by design.
Healthcare data protection
HIPAA requires covered entities to maintain retrievable exact copies of electronic protected health information. While HIPAA does not explicitly mandate immutability, HHS guidance recommends immutable backups as a safeguard against ransomware attacks that could compromise patient data availability.
Data privacy considerations
GDPR Article 17 establishes the right to erasure, creating tension with immutable backup retention. Organizations must architect solutions that honor deletion requests in production systems while maintaining compliant backup retention. Implement data classification that separates personal data subject to erasure rights from business records requiring long-term immutable retention.
Record retention obligations
SOX Section 802 mandates retention of audit workpapers and financial records. Organizations subject to multiple regulatory frameworks should map retention requirements across data classifications and configure differential immutability policies that satisfy overlapping obligations without excessive storage costs.
Meeting compliance requirements is just one advantage. Immutable backups deliver broader operational and security benefits that justify their implementation.
Key Benefits of Immutable Backups
Backup immutability delivers measurable security and operational advantages that extend beyond basic data protection capabilities.
- Guaranteed recovery point availability: When ransomware encrypts production systems, you need certainty that recovery points remain accessible. Immutability provides this guarantee through technical controls that operate independently of compromised credentials.
- Insider threat protection: Immutable backups protect against malicious insiders and accidental deletion by authorized users through WORM mechanisms that prevent data modification regardless of user intent.
- Multi-threat scenario coverage: While the primary use case for immutable backups is ransomware defense, these solutions also protect against data corruption from software bugs, accidental deletion during maintenance operations, and destructive attacks where threat actors intentionally destroy data without ransom demands.
These benefits establish immutable backups as essential infrastructure. The immutable backups ransomware defense capability alone justifies implementation. However, deployment introduces specific challenges that require careful planning.
Challenges and Limitations of Immutable Backups
Implementing immutable backups introduces operational complexities and cost considerations that you must address through careful architecture planning.
- Linear storage growth: Immutable backups cannot be modified or deleted during retention periods, creating linear storage consumption that increases with every backup cycle. This constraint requires capacity planning that accounts for maximum retention periods multiplied by data change rates.
- Recovery workflow complexity: Organizations frequently focus on backup operations while neglecting recovery workflow design. Industry research reveals that many organizations either lack backups or find them unavailable during ransomware attacks, suggesting widespread gaps between backup deployment and recovery readiness.
- Cloud encryption configuration risks: SANS Institute research identifies attack methods where threat actors exploit AWS S3 Server-Side Encryption with Customer-Provided Keys (SSE-C) to control encryption keys. Proper configuration of compliance-mode object locks prevents these attacks.
- Administrative overhead: Implementing rigorous backup testing while maintaining data protection requires established recovery validation protocols with defined recovery time objectives (RTO) and recovery point objectives (RPO), documented recovery procedures for systems, and verified backup integrity through regular testing. This aligns with the industry-standard 3-2-1-1-0 backup rule, where the final "0" represents zero tolerance for untested or failed recoveries. Research from the Ponemon Institute suggests widespread gaps in backup validation practices.
Organizations can avoid these pitfalls by recognizing common implementation mistakes before they compromise recovery effectiveness.
Common Immutable Backup Mistakes
Organizations implementing immutable backups frequently encounter preventable challenges that undermine recovery effectiveness.
- Insufficient recovery testing: Industry research shows that many organizations either lack backups or find their backups unavailable or compromised during attacks. Low recovery success rates underscore the importance of regular testing. You must test recovery operations quarterly at minimum and maintain zero tolerance for untested recovery procedures.
- Confusing access controls with true immutability: Genuine WORM immutability requires kernel-level enforcement that prevents modification even by privileged administrators—not access restrictions that attackers can bypass with compromised credentials.
- Single location dependency: The 3-2-1-1-0 backup strategy requires three copies of data on two different media with one copy offsite, one copy immutable or air-gapped, and zero backup recovery errors. Organizations deploying immutable backups in single locations have implemented only one component of data protection strategies.
- Backup frequency misalignment: You should align backup frequency with business impact rather than applying uniform policies across heterogeneous environments. Financial transaction systems may require hourly or continuous backups, while archived documentation can follow daily schedules.
- Over-reliance on backup without recovery planning: Backup deployment creates false security confidence when organizations focus on protection rather than restoration. You need documented recovery procedures, identified priority data, and established RTO and RPO for different system tiers.
- Manual configuration errors: Manual configuration of immutability settings, retention periods, and backup schedules introduces consistency and compliance risks. Organizations need policy-based automation where administrators centrally define backup and retention rules to reduce manual mistakes.
- Isolated implementation: CISA's #StopRansomware Guide emphasizes that effective ransomware defense requires integration of multiple security layers. Organizations treating immutable backups as standalone solutions misunderstand the threat model.
Avoiding these mistakes requires following established frameworks that address each vulnerability systematically.
Best Practices for Immutable Backups
Current best practices reflect convergent guidance from CISA, NIST, ISO standards, and industry analysts, establishing a framework for enterprise deployment.
Implement multi-tiered architecture
Deploy layered backup strategies combining operational, immutable, and air-gap tiers. Operational backup provides fast daily operations. Immutable protection delivers WORM capabilities for long-term retention. Physical air-gap creates complete network disconnection via tape or offline storage.
Establish isolated recovery environments
Deploy Isolated Recovery Environments (IRE) in combination with Immutable Data Vaults (IDV) for defense architectures that enable clean room recovery testing: secure, isolated environments where organizations can safely restore and analyze backup data without reintroducing malware into production environments.
Follow the 3-2-1-1-0 standard
The industry-standard 3-2-1-1-0 backup rule represents evolved best practice for enterprise ransomware resilience:
- 3 copies of data (production system plus two backup copies)
- 2 different media types (combining disk, tape, and cloud storage)
- 1 copy stored offsite (geographically separated for disaster recovery)
- 1 copy immutable or air-gapped (WORM protection or physically disconnected)
- 0 errors in recovery testing (mandatory validation with zero tolerance for untested recoveries)
Test recoveries quarterly, measure actual recovery time objectives, and maintain zero tolerance for untested procedures.
Implement privileged access controls
Establish dedicated administrator accounts for backup management (CIS 5.4), enforce mandatory MFA for all backup administrative access (CIS 6.5), implement principle of least privilege, and conduct regular access reviews with dormant account cleanup (CIS 5.3).
Secure cloud encryption configurations
Block customer-provided key encryption methods (SSE-C) where attackers can control encryption. Verify that cloud providers offer true immutability through compliance-mode object locks rather than access restrictions alone.
Establish complete asset inventory
Implement foundational asset management controls: enterprise asset inventory (CIS 1.1), software inventory (CIS 2.1), and data management processes identifying data by priority (CIS 3.1). These inventories enable you to prioritize backup resources based on data importance.
Integrate network-level protection
Implement firewall rules for backup servers (CIS 4.4), secure network infrastructure configuration (CIS 4.2), and network segmentation separating backup networks from production environments.
Maintain vulnerability management
Implement systematic vulnerability management for backup infrastructure:
- OS patch management for backup servers
- Application patch management for backup software
- Regular vulnerability scanning of backup environments
- Prioritized remediation based on CVSS scores
Following these best practices establishes strong backup protection, but immutable backups work most effectively when integrated with endpoint security that stops ransomware before it reaches your data.
Common Use Cases for Immutable Backups
Organizations deploy immutable backups across diverse scenarios where data integrity and recovery certainty are essential.
- Ransomware recovery planning: Security teams implement immutable backups as ransomware recovery insurance within incident response plans. When ransomware encrypts production systems and compromises traditional backups, immutable copies provide the clean recovery point needed to restore operations without paying ransoms. Organizations with tested immutable backup procedures can decline ransom demands with confidence.
- Regulatory compliance and audit readiness: Financial services firms use immutable backups to satisfy SEC Rule 17a-4 requirements for non-rewriteable record retention. Healthcare organizations deploy WORM-protected backups to maintain HIPAA-compliant copies of electronic protected health information. During audits, immutable backups demonstrate that records remained unaltered throughout retention periods.
- Critical infrastructure protection: Energy, utilities, and manufacturing organizations protect operational technology environments with immutable backups that ensure recovery capability following attacks on industrial control systems. These sectors face targeted attacks from nation-state actors seeking to disrupt essential services, making recovery certainty a national security concern.
- Merger and acquisition data preservation: Legal and finance teams require immutable backups during M&A transactions to preserve evidence chains and protect against data manipulation claims. WORM technology provides verifiable proof that financial records, contracts, and due diligence materials remained unchanged throughout transaction processes.
- Intellectual property protection: Research institutions and technology companies protect proprietary data, source code repositories, and product designs with immutable backups. When competitors or nation-state actors target intellectual property, organizations can verify that protected copies remain authentic and recover from theft or destruction attempts.
- Disaster recovery for cloud-native environments: Organizations operating primarily in cloud environments implement immutable cloud backups through AWS S3 Object Lock, Azure Immutable Blob Storage, or Google Cloud retention policies. These solutions protect against both external attacks and accidental deletion by cloud administrators or automated processes.
These use cases demonstrate that immutable backups serve as foundational infrastructure across industries, but they work most effectively when integrated with endpoint security that stops ransomware before it reaches your data.
How to Strengthen Ransomware Recovery
SentinelOne's Singularity Platform integrates immutable backup strategies with autonomous threat prevention and forensic investigation capabilities, addressing the ransomware lifecycle from prevention through recovery.
Autonomous rollback capability
SentinelOne's behavioral AI finds malicious activity at execution, in real time, stopping ransomware before file encryption begins. When ransomware encrypts files, SentinelOne's autonomous rollback reverts encryption automatically. According to MITRE ATT&CK evaluation results, SentinelOne reduces alert volumes by 88%, enabling security teams to focus on validated threats rather than alert triage during recovery operations. This capability proves particularly valuable for isolated encryption incidents where full backup restoration would be excessive, maintaining business continuity while preserving immutable backups for disaster-level scenarios.
Purple AI accelerates threat analysis by providing natural language queries across your security data, enabling security teams to rapidly assess backup compromise indicators and prioritize recovery operations based on attack scope.
Forensic context for recovery decisions
SentinelOne's Storyline technology, enhanced by Purple AI's natural language investigation capabilities, provides forensic context on attack progression. It shows you exactly which systems require restoration from immutable backups versus remediation through other approaches. This analysis enables organizations to prioritize restoration efforts based on compromise scope and data integrity validation. During recovery operations, immutable backup systems remain protected against ransomware modification through WORM technology that prevents attackers from encrypting or deleting restored data.
Unified security orchestration
SentinelOne integrates with cloud-native immutability features through centralized orchestration across security architecture. The platform's data lake architecture ingests and normalizes data from multiple sources, enabling attack reconstruction through correlation and analysis.
Purple AI enables security analysts to investigate suspicious access patterns and correlate security events through conversational queries, reducing the time required to validate recovery options during incident response.
Proactive attack prevention
SentinelOne stops attacks before they reach your immutable backups while ensuring recovery capability when primary defenses fail. This layered approach to immutable backups and ransomware defense positions backup protection as the last line of defense within multi-layered cybersecurity strategies that include vulnerability management, access controls, and network segmentation.
Explore how SentinelOne strengthens your ransomware recovery capabilities. Request a SentinelOne demo to see autonomous rollback and immutable backup integration in action.
Unleash AI-Powered Cybersecurity
Elevate your security posture with real-time detection, machine-speed response, and total visibility of your entire digital environment.
Get a DemoKey Takeaways
Immutable backups provide WORM-protected recovery points that ransomware cannot encrypt or delete. The immutable backups meaning is straightforward: data protection that operates independently of user permissions. Implement multi-tiered architectures following the 3-2-1-1-0 standard with mandatory recovery testing, privileged access controls, and integration with broader security layers.
Industry research consistently demonstrates that many ransomware-attacked organizations struggle to recover the majority of their data, highlighting the importance of validated recovery readiness over backup deployment alone.
FAQs
An immutable backup is a data copy protected by Write-Once-Read-Many (WORM) technology that prevents modification or deletion until a predetermined retention period expires. This immutable backup definition reflects how protection operates at the storage system level, meaning no user, regardless of their administrative privileges, can alter or remove the backup data.
When security teams ask what is immutable backup protection, the answer centers on guaranteed recovery points for ransomware incidents where attackers typically target backup systems before encrypting production data.
Immutable backups address a fundamental vulnerability in traditional backup systems: administrative access enables both legitimate recovery and malicious destruction. When ransomware operators compromise privileged credentials, they can delete backup repositories before initiating encryption, eliminating recovery options entirely.
WORM technology operates independently of user permissions, rejecting deletion requests regardless of credential validity. Federal agencies including CISA, NSA, and FBI position immutable backups as the "last line of defense" in enterprise ransomware protection strategies.
Immutable backups protect against ransomware by using WORM technology that prevents data modification or deletion at the storage layer. The immutable backups ransomware protection mechanism works as follows: when ransomware operators gain administrative access and attempt to delete backups before encrypting production systems, the storage system rejects these deletion commands regardless of the credentials used.
This ensures recovery points remain available even when attackers have full administrative control over compromised systems. Organizations can restore from immutable backups without paying ransoms because attackers cannot encrypt or destroy these protected copies.
Immutability periods should align with your organization's recovery requirements and regulatory obligations. Most organizations configure retention periods between 30 and 90 days for operational recovery, ensuring protection against ransomware attacks while managing storage costs.
Regulatory requirements may mandate longer periods, with SEC Rule 17a-4 requiring financial records retention for six years and HIPAA requiring healthcare records for six years from creation or last effective date. Configure differential retention policies based on data classification, applying longer immutability periods to critical systems and compliance-sensitive data.
Test immutable backup recovery procedures quarterly at minimum, with monthly testing recommended for critical systems. The 3-2-1-1-0 backup standard emphasizes zero tolerance for untested recoveries because backup value depends entirely on restoration capability.
Testing should validate actual recovery time objectives in isolated recovery environments, verify data integrity after restoration, and confirm that recovery procedures work under realistic incident conditions. Document test results and update procedures based on findings to maintain recovery readiness.
Regular backups can be modified or deleted by users with appropriate permissions, including attackers who compromise administrative credentials.
Immutable backups use Write-Once-Read-Many technology that prevents modification or deletion by anyone, including privileged administrators, until predetermined retention periods expire. This technical distinction provides ransomware resilience where traditional backups fail.
Retention periods must align with regulatory requirements specific to your industry. SEC Rule 17a-4, HIPAA, and SOX establish varying retention obligations. Balance legal requirements against storage costs by implementing differential retention policies across data classifications.
Yes. WORM technology prevents data modification regardless of user permissions or intent, protecting against both malicious insiders and accidental deletion by authorized users.
The immutability mechanism treats data protection as a storage property rather than an access control policy, operating independently of user credentials.
Cloud-based immutable backups provide equivalent security when configured with compliance-mode object locks that prevent deletion even by root accounts.
Verify true immutability through provider-managed encryption rather than customer-provided keys, which attackers can exploit. On-premise solutions offer maximum physical control but require specialized infrastructure.
Establish isolated recovery environments separate from production networks where you can restore and analyze backup data without reinfection risk. WORM technology permits unlimited read operations for recovery while preventing modification, enabling rigorous testing without compromising data integrity.
Implement quarterly recovery validation measuring actual recovery time objectives, document procedures, and maintain zero tolerance for untested recoveries to ensure backup viability during actual ransomware incidents.

