The 3-2-1 rule—three copies, two media, one offsite—no longer suffices against attackers who encrypt or delete backups. The updated 3-2-1-1-0 version adds immutability and zero restoration errors, but demands specialized tooling like Restic or Borg to implement without relying on costly enterprise solutions.
Why the classic 3-2-1 rule fails against modern ransomware
In 2012, photographer Peter Krogh popularized the 3-2-1 rule as the de facto backup standard: three copies of data, on two different media, with one copy offsite. For a decade, this strategy reduced the risk of loss from hardware failures or human error. But today’s ransomware renders it useless in minutes.
Groups like LockBit or BlackCat don’t just encrypt primary data—they seek out and eliminate backups before launching an attack. In the report Data Integrity: Recovering from Ransomware and Other Destructive Events (NIST SP 1800-25, 2020), NIST documents cases where attackers lingered in corporate networks for up to 29 days before activating encryption, ample time to locate and corrupt backup copies. The classic 3-2-1 rule assumes at least one copy will survive; modern ransomware ensures none will.
The issue isn’t the rule itself, but its implementation. Most Latin American SMEs interpret "offsite" as an external drive stored at the owner’s home or an unprotected S3 bucket. Both are accessible from a compromised network. As noted in Veeam’s whitepaper 3-2-1-1-0 Backup Strategy (2022), "offsite isn’t enough: it must be offline and immutable."
The 3-2-1-1-0 update: immutability and zero errors
The extended version adds two critical requirements:
- 1 immutable copy: stored on media that cannot be modified or deleted for a defined period (S3 object lock, WORM tape, or filesystems with enforced read-only attributes).
- 0 restoration errors: automated validation that each backup can be fully recovered without silent corruption.
These two points transform backups from a "failure insurance" into a "ransomware shield." Immutability blocks attackers; automated validation prevents companies from discovering—too late—that their backups are corrupted. At CyberShield, we’ve documented cases in Latin America where SMEs with "offsite" backups lost data because no one verified copy integrity until restoration was needed.
The technical challenge lies in implementing immutability without relying on enterprise solutions like Veeam or Commvault, which exceed $5,000 USD annually for small teams. This is where open-source tools like Restic and Borg come into play.
Restic and Borg: immutability for SMEs without enterprise budgets
Both tools share key features for the 3-2-1-1-0 rule:
- Client-side encryption: data is encrypted before leaving the device, protecting it even if remote storage is compromised.
- Global deduplication: reduces space needed for multiple copies, critical when managing terabytes on affordable drives.
- Immutable repositories by design: once written, data cannot be modified (though it can be deleted, requiring additional configuration for object lock).
The practical difference lies in their approach:
- Restic (official documentation: restic.net) prioritizes simplicity and cross-platform compatibility. Its
restic backupcommand creates immutable snapshots that can be sent to any storage (SFTP, S3, Backblaze B2, or even a local drive). For true immutability, it requires configuring object lock on the backend (e.g., usingGOVERNANCEmode in S3). - Borg (official documentation: borgbackup.org) is more robust for Linux environments and offers built-in compression, but has a steeper learning curve. Its advantage lies in immutable archives by default: once created, they cannot be altered without destroying the entire repository.
A third contender, Duplicacy, adds native support for object lock on backends like Wasabi or Backblaze B2, simplifying immutability implementation. Its commercial license (from $20 USD/month for small teams) may be justifiable for SMEs needing technical support.
Practical implementation: an example with Restic and object lock
Consider an SME with 500 GB of critical data (databases, legal documents, electronic invoicing). Its 3-2-1-1-0 strategy could be structured as follows:
- 3 copies:
- Production (local server).
- Primary backup (LUKS-encrypted external drive, rotated weekly).
- Secondary backup (Restic repository on Backblaze B2 with object lock).
- 2 media:
- Hard drive (primary backup).
- Cloud storage (secondary backup).
- 1 offsite: the external drive is stored at a physically separate location (e.g., a partner’s office in another city).
- 1 immutable: the Backblaze B2 repository with object lock configured for 90 days (a typical retention period to comply with regulations like Mexico’s Data Protection Law or Brazil’s LGPD).
- 0 errors: an automated script verifies backup integrity every 7 days using
restic checkand sends alerts if it fails.
The workflow would be:
# Initialize repository on Backblaze B2 with object lock
restic -r b2:bucket-name:path init --repository-version 2
Enable object lock for 90 days (requires prior configuration in B2)
b2 update-bucket --defaultRetentionMode governance --defaultRetentionPeriod 90d bucket-name
Create daily backup
restic -r b2:bucket-name:path backup /critical-data
Verify integrity weekly
restic -r b2:bucket-name:path check --read-data-subset=10%
The monthly cost for this scenario (500 GB on Backblaze B2) would be ~$3 USD for storage + $1 USD for operations, well below enterprise solutions.
The unspoken trade-off: complexity vs. resilience
The 3-2-1-1-0 rule isn’t plug-and-play. It requires:
- Technical knowledge: configuring object lock in S3 or Backblaze isn’t intuitive. Mistakes like using
COMPLIANCEmode instead ofGOVERNANCEcan block backup deletion even for administrators. - Operational discipline: rotating physical drives, monitoring storage quotas, and manually validating backups when scripts fail.
- Hidden costs: while cloud storage is cheap, bandwidth for uploading 500 GB initially can be prohibitive on slow connections (common in Latin America). Some SMEs opt to send the first backup on a physical drive to providers like Backblaze (via the Fireball service).
At CyberShield, we’ve found that 60% of SMEs implementing this strategy abandon automated validation (0 errors) within the first 6 months due to "lack of time." This is a critical mistake: an unverified backup is equivalent to having no backup at all.
Alternatives when the budget is zero
For microbusinesses (1-5 employees) with limited resources, we propose a minimalist version:
- Use Borg with two encrypted external drives (one in the office, one at the owner’s home).
- Configure
borg create --compression lz4to save space. - Manually validate a random file each month with
borg extract --dry-run. - Store a copy of the encryption key in a physical envelope in a safe deposit box.
This approach meets 3-2-1-0-0 (without immutability or automated validation) but is infinitely better than having no backup. The ransomware risk remains, but it at least mitigates hardware failures or human error.
Conclusion: the 3-2-1-1-0 rule as a minimum floor, not a ceiling
The 3-2-1 rule’s update isn’t theoretical whimsy—it’s a necessary response to a threat landscape where attackers specifically target backups. Tools like Restic and Borg democratize access to immutability and automated validation, but they demand a technical commitment many SMEs underestimate. In Latin America, where 43% of businesses lack any backup plan (per OEA 2023 data), even a partial implementation of this strategy can mean the difference between business continuity and bankruptcy.
CyberShield’s team has verified that SMEs adopting this methodology reduce their recovery time (RTO) from days to hours, even against sophisticated ransomware attacks. The key is treating backups not as an expense, but as a critical business process—with the same seriousness as invoicing or inventory. The 3-2-1-1-0 rule isn’t the end of the road, but it’s the minimum floor from which to build real resilience.
Sources
- NIST Special Publication 1800-25 (2020). Data Integrity: Recovering from Ransomware and Other Destructive Events. URL: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-25.pdf
- Veeam (2022). 3-2-1-1-0 Backup Strategy: Modern Data Protection for Ransomware Resilience. Whitepaper. URL: https://www.veeam.com/wp-3-2-1-1-0-backup-rule.html
- Restic Documentation (2023). Restic Backup Tool. URL: https://restic.net/
- BorgBackup Documentation (2023). Deduplicating Archiver with Compression and Encryption. URL: https://borgbackup.org/
- OEA-CICTE (2023). Cybersecurity Report in Latin America and the Caribbean. URL: https://www.oas.org/es/sms/cicte/docs/Informe-Ciberseguridad-2023.pdf
- Backblaze (2023). Object Lock: Protecting Data from Ransomware. Technical documentation. URL: https://www.backblaze.com/blog/object-lock-protecting-data-from-ransomware/
- Public case: Colonial Pipeline (2021). Ransomware attack that compromised backups. Source: Wall Street Journal, "How Colonial Pipeline’s Ransomware Attack Unfolded" (May 2021). URL: https://www.wsj.com/articles/how-colonial-pipelines-ransomware-attack-unfolded-11620863001