Immutable Backups

Updated: 2026-02-24

Plain English Translation

Organizations must ensure that their backup files cannot be altered, overwritten, or deleted after they are created. This concept, often called Write Once Read Many (WORM) storage or immutable backups, guarantees data integrity. By preventing modifications at the storage level, organizations protect their recovery data from malicious software, like ransomware, that actively attempts to encrypt or destroy network-connected backups.

Executive Takeaway

Implementing immutable backups ensures that critical recovery data remains intact and untouched, providing guaranteed ransomware backup protection.

ImpactHigh
ComplexityMedium

Why This Matters

  • Guarantees data integrity for successful disaster recovery operations.
  • Defeats ransomware strains designed to corrupt or delete network-attached backups.
  • Meets strict regulatory and compliance requirements for data preservation.

What “Good” Looks Like

  • Enabling Object Lock or WORM features on cloud and local backup repositories, and tools like WatchDog Security's Posture Management can help detect misconfigurations in supported environments and provide remediation guidance.
  • Setting a strict immutable backup retention policy that aligns with business needs, and tools like WatchDog Security's Policy Management can help keep the policy version-controlled with approvals and audit-ready change history.
  • Isolating backup management consoles using multi-factor authentication and distinct credentials.

Immutable backups are copies of data that cannot be altered, encrypted, or deleted once written. They are critical for ransomware backup protection because modern ransomware actively seeks out and destroys traditional network backups to force a ransom payment.

They use specialized file system controls or write once read many backup storage (WORM) protocols that lock the files at the storage level. Even if an attacker gains administrative access, the storage layer blocks any modification or deletion commands until a predetermined timer expires.

To meet CyberSecure Canada backup requirements, Section 5.6.2.6 explicitly states that backup files shall not be modifiable to maintain data integrity. Organizations must implement technical controls to ensure backups cannot be tampered with by users or malware.

Organizations can implement object lock immutable backups in cloud storage by enabling compliance mode on their storage buckets. This applies a WORM model to the bucket, specifying an exact retention period during which the files are strictly locked against changes.

While both protect data, air gapped backups vs immutable backups represent different approaches. Air-gapped backups are physically or completely logically disconnected from the network, whereas immutable backups remain connected but are locked at the storage level against unauthorized changes.

An immutable backup retention policy should align with the organization's legal, regulatory, and business continuity needs. Typical retention ranges from 30 days for immediate operational recovery to several years for long-term compliance archiving. Tools like WatchDog Security's Policy Management can help maintain the retention policy as a controlled document with approvals and review history.

Yes, when evaluating immutable snapshots vs immutable backups, secure storage snapshots can satisfy compliance if they guarantee data integrity. They must be configured so they cannot be modified or prematurely deleted, even by compromised administrator accounts.

To prove backup integrity controls, organizations must provide configuration screenshots of WORM or Object Lock settings. They should also demonstrate logs showing that attempts to delete or alter a locked backup file were successfully denied by the storage system. Tools like WatchDog Security's Compliance Center can help organize this evidence and link it to CSC-05-021 for audit readiness.

Using governance mode instead of compliance mode (allowing admins to bypass locks), failing to secure the storage account's root credentials, or improperly setting the retention period are common mistakes that compromise backup immutability best practices.

Encryption keys must be stored securely and separately from the backup data, using robust access controls like MFA and role-based access. If keys are lost or compromised, the immutable backups for ransomware recovery will be unreadable, defeating their purpose.

Immutable backup controls often fail audits because evidence is scattered across storage consoles, ticketing systems, and screenshots. Tools like WatchDog Security's Compliance Center can help centralize evidence (e.g., Object Lock/WORM configurations and denial logs) and map it directly to CSC-05-021 for consistent reporting.

Gaps in backup immutability increase ransomware impact and can undermine recovery objectives, so teams need a clear way to assess likelihood, impact, and remediation ownership. Tools like WatchDog Security's Risk Register can help document the risk, assign treatment plans, track due dates, and produce board-ready status updates tied to this control.

CYBERSECURE-CANADA Section 5.6.2.6

"Backup files shall not be modifiable to maintain data integrity."

VersionDateAuthorDescription
1.0.02026-02-24WatchDog Security GRC TeamInitial publication