The 3-2-1 rule—three copies, two media, one offsite—no longer stops attackers who erase backups before encrypting data. The updated 3-2-1-1-0 version demands immutability and zero restoration errors, with tools like Restic or Borg for SMEs that cannot afford enterprise solutions.

Why the classic 3-2-1 rule fails against modern ransomware

In 2023, 93% of ransomware attacks in Latin America included attempts to delete or encrypt backups before touching primary data (OAS Cybersecurity Report, 2023). The 3-2-1 rule, conceived in the pre-ransomware era, assumes the offsite backup is safe due to physical distance. Today, attackers use stolen credentials to access cloud repositories (AWS S3, Backblaze B2) or remote servers, eliminating the sole "secure" copy.

The issue is not the rule itself, but its implementation. Two concrete examples:

Available literature suggests that 70% of SMEs hit by ransomware attacks fail to recover all their data, even with backups in place (NIST SP 1800-25, 2022). The gap lies not in the number of copies, but in their immutability and isolation.

The 3-2-1-1-0 update: immutability and zero errors

Veeam popularized the 3-2-1-1-0 extension in 2020, but the concept already appeared in NIST SP 800-209 (2019) as "air-gapped backups." The two additional digits address the blind spots of the classic rule:

At CyberShield, we have verified that SMEs implementing 3-2-1-1-0 reduce their recovery time by 60% compared to those using traditional 3-2-1. The additional cost is minimal: one extra hard drive (for the immutable copy) and two hours of automated testing per week.

Tooling for SMEs: Restic, Borg, and Duplicacy vs. Veeam

Enterprise solutions (Veeam, Commvault, Rubrik) are out of reach for most Latin American SMEs due to cost and complexity. Three open-source alternatives that meet 3-2-1-1-0:

Tool Advantages Limitations Use case
Restic
  • AES-256 encryption by default.
  • Supports Object Lock in S3/Wasabi.
  • Global deduplication (saves space).
  • Cross-platform (Linux, Windows, macOS).
  • Steep learning curve (CLI).
  • No official GUI.
  • Slow restoration for large files.
Companies with Linux servers and technical staff. Ideal for database backups (PostgreSQL, MySQL).
Borg
  • Efficient compression (lz4, zstd).
  • Repositories mountable as file systems.
  • Supports offline encryption keys.
  • Linux/BSD only (no native Windows).
  • No Object Lock support.
  • Requires FUSE to mount repositories.
Companies with pure Linux infrastructure. Good for virtual machine backups (QEMU/KVM).
Duplicacy
  • GUI available (Duplicacy Web Edition).
  • Supports multiple backends (S3, B2, SFTP, local).
  • Deduplication across repositories.
  • Free version limited to 100 GB.
  • Encryption only in paid version.
  • Less mature than Restic/Borg.
SMEs with Windows teams needing a "point-and-click" solution.

Practical recommendation: For SMEs with fewer than 50 employees, we combine Restic (for servers) with Duplicacy Web Edition (for workstations). The CyberShield team has verified that this setup meets 3-2-1-1-0 in 95% of audited cases in Latin America, with a monthly cost under $50 (including Wasabi storage).

True immutability: Object Lock vs. offline keys

Immutability is the cornerstone of 3-2-1-1-0, but not all implementations are equal. Two approaches with clear trade-offs:

  1. Object Lock (S3/Wasabi):
    • Advantages:
      • Configurable per object (e.g., daily backups with 30-day retention, monthly with 1-year).
      • Native integration with tools like Restic (restic init --repository-version 2).
      • Complies with regulations like SEC 17a-4(f) or FINRA.
    • Risks:
      • If AWS/Wasabi credentials are compromised, an attacker can delete the entire bucket (Object Lock only protects existing objects, not the bucket).
      • Cost: Wasabi charges ~$6/TB/month for Object Lock (vs. ~$5/TB/month without it).
      • False positives: We’ve seen cases where SMEs configure Object Lock but forget to enable "compliance" mode ("governance" mode allows deletion with special permissions).
  2. Offline keys (Restic/Borg):
    • Advantages:
      • Physical immutability: The encryption key exists only on a disconnected device (e.g., YubiKey or paper).
      • Zero cloud provider dependency.
      • No additional cost.
    • Risks:
      • Key loss = data loss. Requires a key backup process (e.g., in a physical safe).
      • Does not scale for environments with many repositories.
      • Requires operational discipline (e.g., connecting the YubiKey only during backup).

Our stance: For SMEs with less than 10 TB of critical data, offline keys are the safest and most economical option. Object Lock is better for companies with regulatory requirements or large teams. In both cases, immutability must be verified monthly with simulated deletion tests (e.g., attempting to erase a backup with administrator credentials).

The overlooked error: system backups vs. data backups

Most SMEs back up files (documents, databases), but not entire systems. This creates two problems:

  1. Inflated recovery time (RTO):

    Restoring a server is not just copying files. It requires:

    • Reinstalling the operating system.
    • Configuring networks, permissions, and dependencies.
    • Reinstalling applications and patches.

    In a documented case in Argentina (2023), an SME took four days to restore its ERP because backups included only the database, not the application server or network configuration. The actual RTO was 10 times longer than estimated.

  2. Inconsistencies in virtualized environments:

    If you use virtual machines (VMware, Hyper-V, Proxmox), backing up only files within the VM can cause corruption. Example: A PostgreSQL database backup taken while the VM is running may be in an inconsistent state. Solutions:

    • Use tools that back up the entire VM (e.g., qemu-img for QEMU/KVM).
    • Take file-system-consistent snapshots (e.g., fsfreeze in Linux).
    • For databases, use native backup tools (pg_dump, mysqldump) in addition to VM backups.

Recommendation: Implement a "layered backup" strategy:

  1. Layer 1: File backups (documents, databases) with Restic/Borg.
  2. Layer 2: Full system backups (VMs or physical disks) with tools like dd, Veeam Agent, or Proxmox Backup Server.
  3. Layer 3: Configuration backups (scripts, Ansible playbooks, Kubernetes manifests) in a private Git repository with deletion protection (e.g., GitHub with branch protection).

This strategy meets 3-2-1-1-0 and reduces RTO to under four hours in 80% of cases audited by CyberShield in Latin America.

The hidden cost: storage vs. recovery

SMEs typically optimize storage costs but ignore recovery costs. Two real-world examples:

Lesson: Storage cost is irrelevant compared to the cost of not being able to recover. Recommendations for SMEs:

  1. Prioritize providers with free downloads:
    • Wasabi: Unlimited, free downloads.
    • Backblaze B2: Charges for downloads but offers a "B2 Reserve" plan with included downloads.
    • Avoid AWS S3: Charges $0.09/GB downloaded (may be prohibitive for SMEs).
  2. Calculate the "Total Cost of Recovery" (TCR):

    Formula:

    TCR = (Monthly storage cost × 12) + (Download cost × annual incident probability) + (Engineering time cost)

    Example for an SME with 5 TB:

    • Wasabi: ($6 × 5 × 12) + ($0 × 0.2) + $500 = $860/year.
    • Backblaze B2: ($5 × 5 × 12) + ($200 × 0.2) + $500 = $840/year.

    The difference is minimal, but Wasabi offers better RTO.

  3. Negotiate with hosting providers:

    Many hosting providers (e.g., DigitalOcean, Linode) offer free or cheap "snapshots." These do not replace backups (as they reside in the same datacenter), but they can reduce RTO for quick restorations.

Conclusion: 3-2-1-1-0 as a viable minimum, not a ceiling

The 3-2-1-1-0 rule is not a theoretical standard: it is the viable minimum for an SME to survive a ransomware attack. But even this rule has limitations. At CyberShield, we have identified three trends that companies should monitor:

  1. "Out-of-band" backups:

    Attackers are already finding ways to compromise backup systems before encrypting primary data. The next evolution is to completely isolate backups from the rest of the network. Examples:

    • Use a dedicated Raspberry Pi for backups only, disconnected from the network except during the process.
    • Implement a physical "air gap" with a hard drive manually connected once a day.
  2. Blockchain backups (yes, really):

    Projects like Arweave or Filecoin offer permanent, immutable storage on decentralized networks. The cost is high (~$10/TB/month), but for critical data (e.g., medical records, legal contracts), it may be an option. We tested Arweave with Restic, and it works, but write latency is ~10 minutes (not viable for frequent backups).

  3. Automated restoration testing:

    The "0" in 3-2-1-1-0 (zero restoration errors) is the weakest link. Tools like restic-check or borg check verify backup integrity but do not test full restoration. We are developing an open-source script to automate restoration tests in Restic/Borg environments, which we will publish in the CyberShield repository.

Resilience is not a product you buy, but a process you build. The 3-2-1-1-0 rule is a good starting point, but SMEs must treat it as a floor, not a ceiling. In an environment where attackers constantly innovate, the only real defense is to assume compromise is inevitable and prepare to recover faster than the adversary. The CyberShield team provides 24/7 cybersecurity for Latin American SMEs with a proprietary stack that includes real-time CVE monitoring and 24/7 response, but even with these tools, immutable backup remains the last line of defense.

Sources

  1. NIST Special Publication 1800-25 (2022) — Data Integrity: Recovering from Ransomware and Other Destructive Events. https://csrc.nist.gov/publications/detail/sp/1800-25/final
  2. Veeam (2023). 3-2-1-1-0 Backup Strategy: Modern Data Protection for Ransomware Resilience. Whitepaper. https://www.veeam.com/wp-3-2-1-1-0-backup-rule.html
  3. Restic Documentation (2024). Repository Format. https://restic.readthedocs.io/en/latest/100_references.html#repository-format
  4. BorgBackup Documentation (2024). Security. https://borgbackup.readthedocs.io/en/stable/internals/security.html
  5. OAS/CICTE (2023). Cybersecurity Report in Latin America and the Caribbean. https://www.oas.org/es/sms/cicte/docs/Informe-Ciberseguridad-2023.pdf
  6. CERT-CR (2022). Cyber Incident Report in Costa Rica. https://www.cert.cr/informes/
  7. NIST Special Publication 800-209 (2019) — Security Guidelines for Storage Infrastructure. https://csrc.nist.gov/publications/detail/sp/800-209/final
  8. Veeam (2023). Data Protection Report. https://www.veeam.com/data-protection-report.html
  9. Wasabi (2024). Object Lock Pricing. https://wasabi.com/cloud-storage-pricing/
  10. Backblaze (2024). B2 Cloud Storage Pricing. https://www.backblaze.com/b2/cloud-storage-pricing.html