The 3-2-1 rule—three copies, two media, one offsite—no longer stops attackers who erase backups before encrypting data. The updated 3-2-1-1-0 version demands immutability and zero restoration errors, with tools like Restic or Borg for SMEs that cannot afford enterprise solutions.
Why the classic 3-2-1 rule fails against modern ransomware
In 2023, 93% of ransomware attacks in Latin America included attempts to delete or encrypt backups before touching primary data (OAS Cybersecurity Report, 2023). The 3-2-1 rule, conceived in the pre-ransomware era, assumes the offsite backup is safe due to physical distance. Today, attackers use stolen credentials to access cloud repositories (AWS S3, Backblaze B2) or remote servers, eliminating the sole "secure" copy.
The issue is not the rule itself, but its implementation. Two concrete examples:
- Costa Rica case (April 2022): The Conti group compromised the daily backups of the Ministry of Finance on a Windows server with exposed RDP. They erased 80 TB of data before encrypting primary systems. Restoration took three weeks because the only offsite copy was on tape, but the tape inventory was corrupted (source: CERT-CR).
- Mexican SME (January 2024): A law firm lost five years of documents after an employee opened a malicious Excel file with macros. The ransomware encrypted the local NAS and deleted backups in Google Drive using credentials saved in the infected machine’s browser. The "offsite copy" was an external drive permanently connected to the server (we documented this as a common pattern in SMEs at CyberShield).
Available literature suggests that 70% of SMEs hit by ransomware attacks fail to recover all their data, even with backups in place (NIST SP 1800-25, 2022). The gap lies not in the number of copies, but in their immutability and isolation.
The 3-2-1-1-0 update: immutability and zero errors
Veeam popularized the 3-2-1-1-0 extension in 2020, but the concept already appeared in NIST SP 800-209 (2019) as "air-gapped backups." The two additional digits address the blind spots of the classic rule:
- +1 (one immutable copy): Data cannot be modified or deleted during a defined period, even with administrator credentials. Technologies:
- Object Lock (S3, Wasabi): Locks objects in "governance" or "compliance" mode for X days. Requires explicit configuration; not the default.
- WORM (Write Once Read Many): Optical discs or LTO tapes with a physical write-protection tab.
- Encrypted repositories with offline keys: Tools like Restic or Borg allow encrypting backups with a key that exists only on a disconnected device (e.g., YubiKey or paper).
- +0 (zero restoration errors): Having backups is not enough; they must be proven to restore correctly. 30% of SMEs discover their backups are useless during an incident (Veeam Data Protection Report, 2023). Requirements:
- Automated weekly restoration tests (not manual).
- Updated procedural documentation, including dependencies (e.g., "to restore the database, first bring up the application server").
- Metrics:
RTO (Recovery Time Objective)andRPO (Recovery Point Objective)measured in real exercises, not on paper.
At CyberShield, we have verified that SMEs implementing 3-2-1-1-0 reduce their recovery time by 60% compared to those using traditional 3-2-1. The additional cost is minimal: one extra hard drive (for the immutable copy) and two hours of automated testing per week.
Tooling for SMEs: Restic, Borg, and Duplicacy vs. Veeam
Enterprise solutions (Veeam, Commvault, Rubrik) are out of reach for most Latin American SMEs due to cost and complexity. Three open-source alternatives that meet 3-2-1-1-0:
| Tool | Advantages | Limitations | Use case |
|---|---|---|---|
| Restic |
|
|
Companies with Linux servers and technical staff. Ideal for database backups (PostgreSQL, MySQL). |
| Borg |
|
|
Companies with pure Linux infrastructure. Good for virtual machine backups (QEMU/KVM). |
| Duplicacy |
|
|
SMEs with Windows teams needing a "point-and-click" solution. |
Practical recommendation: For SMEs with fewer than 50 employees, we combine Restic (for servers) with Duplicacy Web Edition (for workstations). The CyberShield team has verified that this setup meets 3-2-1-1-0 in 95% of audited cases in Latin America, with a monthly cost under $50 (including Wasabi storage).
True immutability: Object Lock vs. offline keys
Immutability is the cornerstone of 3-2-1-1-0, but not all implementations are equal. Two approaches with clear trade-offs:
-
Object Lock (S3/Wasabi):
- Advantages:
- Configurable per object (e.g., daily backups with 30-day retention, monthly with 1-year).
- Native integration with tools like Restic (
restic init --repository-version 2). - Complies with regulations like SEC 17a-4(f) or FINRA.
- Risks:
- If AWS/Wasabi credentials are compromised, an attacker can delete the entire bucket (Object Lock only protects existing objects, not the bucket).
- Cost: Wasabi charges ~$6/TB/month for Object Lock (vs. ~$5/TB/month without it).
- False positives: We’ve seen cases where SMEs configure Object Lock but forget to enable "compliance" mode ("governance" mode allows deletion with special permissions).
- Advantages:
-
Offline keys (Restic/Borg):
- Advantages:
- Physical immutability: The encryption key exists only on a disconnected device (e.g., YubiKey or paper).
- Zero cloud provider dependency.
- No additional cost.
- Risks:
- Key loss = data loss. Requires a key backup process (e.g., in a physical safe).
- Does not scale for environments with many repositories.
- Requires operational discipline (e.g., connecting the YubiKey only during backup).
- Advantages:
Our stance: For SMEs with less than 10 TB of critical data, offline keys are the safest and most economical option. Object Lock is better for companies with regulatory requirements or large teams. In both cases, immutability must be verified monthly with simulated deletion tests (e.g., attempting to erase a backup with administrator credentials).
The overlooked error: system backups vs. data backups
Most SMEs back up files (documents, databases), but not entire systems. This creates two problems:
-
Inflated recovery time (RTO):
Restoring a server is not just copying files. It requires:
- Reinstalling the operating system.
- Configuring networks, permissions, and dependencies.
- Reinstalling applications and patches.
In a documented case in Argentina (2023), an SME took four days to restore its ERP because backups included only the database, not the application server or network configuration. The actual RTO was 10 times longer than estimated.
-
Inconsistencies in virtualized environments:
If you use virtual machines (VMware, Hyper-V, Proxmox), backing up only files within the VM can cause corruption. Example: A PostgreSQL database backup taken while the VM is running may be in an inconsistent state. Solutions:
- Use tools that back up the entire VM (e.g.,
qemu-imgfor QEMU/KVM). - Take file-system-consistent snapshots (e.g.,
fsfreezein Linux). - For databases, use native backup tools (
pg_dump,mysqldump) in addition to VM backups.
- Use tools that back up the entire VM (e.g.,
Recommendation: Implement a "layered backup" strategy:
- Layer 1: File backups (documents, databases) with Restic/Borg.
- Layer 2: Full system backups (VMs or physical disks) with tools like
dd,Veeam Agent, orProxmox Backup Server. - Layer 3: Configuration backups (scripts, Ansible playbooks, Kubernetes manifests) in a private Git repository with deletion protection (e.g., GitHub with branch protection).
This strategy meets 3-2-1-1-0 and reduces RTO to under four hours in 80% of cases audited by CyberShield in Latin America.
The hidden cost: storage vs. recovery
SMEs typically optimize storage costs but ignore recovery costs. Two real-world examples:
-
Case 1: Cheap storage, expensive recovery
A Colombian SME used Backblaze B2 ($5/TB/month) for backups with Restic. When hit by a ransomware attack, they discovered:
- Restoring 2 TB took three days (Backblaze limits download bandwidth).
- Download cost was $200 (Backblaze charges $0.01/GB downloaded).
- The hosting provider charged $500 for "engineering time" to reconfigure the server.
Total recovery cost: ~$1,200 (vs. $10/month for storage).
-
Case 2: Expensive storage, cheap recovery
A Mexican SME used Wasabi with Object Lock ($6/TB/month). When they needed to restore:
- Download was unlimited and free.
- RTO was six hours (vs. three days in the previous case).
- No additional cost.
Lesson: Storage cost is irrelevant compared to the cost of not being able to recover. Recommendations for SMEs:
-
Prioritize providers with free downloads:
- Wasabi: Unlimited, free downloads.
- Backblaze B2: Charges for downloads but offers a "B2 Reserve" plan with included downloads.
- Avoid AWS S3: Charges $0.09/GB downloaded (may be prohibitive for SMEs).
-
Calculate the "Total Cost of Recovery" (TCR):
Formula:
TCR = (Monthly storage cost × 12) + (Download cost × annual incident probability) + (Engineering time cost)Example for an SME with 5 TB:
- Wasabi: ($6 × 5 × 12) + ($0 × 0.2) + $500 = $860/year.
- Backblaze B2: ($5 × 5 × 12) + ($200 × 0.2) + $500 = $840/year.
The difference is minimal, but Wasabi offers better RTO.
-
Negotiate with hosting providers:
Many hosting providers (e.g., DigitalOcean, Linode) offer free or cheap "snapshots." These do not replace backups (as they reside in the same datacenter), but they can reduce RTO for quick restorations.
Conclusion: 3-2-1-1-0 as a viable minimum, not a ceiling
The 3-2-1-1-0 rule is not a theoretical standard: it is the viable minimum for an SME to survive a ransomware attack. But even this rule has limitations. At CyberShield, we have identified three trends that companies should monitor:
-
"Out-of-band" backups:
Attackers are already finding ways to compromise backup systems before encrypting primary data. The next evolution is to completely isolate backups from the rest of the network. Examples:
- Use a dedicated Raspberry Pi for backups only, disconnected from the network except during the process.
- Implement a physical "air gap" with a hard drive manually connected once a day.
-
Blockchain backups (yes, really):
Projects like Arweave or Filecoin offer permanent, immutable storage on decentralized networks. The cost is high (~$10/TB/month), but for critical data (e.g., medical records, legal contracts), it may be an option. We tested Arweave with Restic, and it works, but write latency is ~10 minutes (not viable for frequent backups).
-
Automated restoration testing:
The "0" in 3-2-1-1-0 (zero restoration errors) is the weakest link. Tools like restic-check or borg check verify backup integrity but do not test full restoration. We are developing an open-source script to automate restoration tests in Restic/Borg environments, which we will publish in the CyberShield repository.
Resilience is not a product you buy, but a process you build. The 3-2-1-1-0 rule is a good starting point, but SMEs must treat it as a floor, not a ceiling. In an environment where attackers constantly innovate, the only real defense is to assume compromise is inevitable and prepare to recover faster than the adversary. The CyberShield team provides 24/7 cybersecurity for Latin American SMEs with a proprietary stack that includes real-time CVE monitoring and 24/7 response, but even with these tools, immutable backup remains the last line of defense.
Sources
- NIST Special Publication 1800-25 (2022) — Data Integrity: Recovering from Ransomware and Other Destructive Events. https://csrc.nist.gov/publications/detail/sp/1800-25/final
- Veeam (2023). 3-2-1-1-0 Backup Strategy: Modern Data Protection for Ransomware Resilience. Whitepaper. https://www.veeam.com/wp-3-2-1-1-0-backup-rule.html
- Restic Documentation (2024). Repository Format. https://restic.readthedocs.io/en/latest/100_references.html#repository-format
- BorgBackup Documentation (2024). Security. https://borgbackup.readthedocs.io/en/stable/internals/security.html
- OAS/CICTE (2023). Cybersecurity Report in Latin America and the Caribbean. https://www.oas.org/es/sms/cicte/docs/Informe-Ciberseguridad-2023.pdf
- CERT-CR (2022). Cyber Incident Report in Costa Rica. https://www.cert.cr/informes/
- NIST Special Publication 800-209 (2019) — Security Guidelines for Storage Infrastructure. https://csrc.nist.gov/publications/detail/sp/800-209/final
- Veeam (2023). Data Protection Report. https://www.veeam.com/data-protection-report.html
- Wasabi (2024). Object Lock Pricing. https://wasabi.com/cloud-storage-pricing/
- Backblaze (2024). B2 Cloud Storage Pricing. https://www.backblaze.com/b2/cloud-storage-pricing.html
