Immutable Backups
Plain English Translation
Organizations must ensure that their backup files cannot be altered, overwritten, or deleted after they are created. This concept, often called Write Once Read Many (WORM) storage or immutable backups, guarantees data integrity. By preventing modifications at the storage level, organizations protect their recovery data from malicious software, like ransomware, that actively attempts to encrypt or destroy network-connected backups.
Technical Implementation
Use the tabs below to select your organization size.
Required Actions (startup)
- Enable native cloud immutability features on backup storage buckets for a minimum 30-day retention.
- Ensure backup service accounts follow the principle of least privilege.
Required Actions (scaleup)
- Utilize Object Lock immutable backups with compliance mode to prevent even root accounts from deleting backups.
- Implement distinct access controls and MFA for the storage infrastructure housing the backups.
Required Actions (enterprise)
- Integrate local WORM storage arrays on-premises alongside air-gapped immutable cloud storage.
- Monitor backup integrity controls via centralized dashboards with alerts for unauthorized access attempts.
Immutable backups are copies of data that cannot be altered, encrypted, or deleted once written. They are critical for ransomware backup protection because modern ransomware actively seeks out and destroys traditional network backups to force a ransom payment.
They use specialized file system controls or write once read many backup storage (WORM) protocols that lock the files at the storage level. Even if an attacker gains administrative access, the storage layer blocks any modification or deletion commands until a predetermined timer expires.
To meet CyberSecure Canada backup requirements, Section 5.6.2.6 explicitly states that backup files shall not be modifiable to maintain data integrity. Organizations must implement technical controls to ensure backups cannot be tampered with by users or malware.
Organizations can implement object lock immutable backups in cloud storage by enabling compliance mode on their storage buckets. This applies a WORM model to the bucket, specifying an exact retention period during which the files are strictly locked against changes.
While both protect data, air gapped backups vs immutable backups represent different approaches. Air-gapped backups are physically or completely logically disconnected from the network, whereas immutable backups remain connected but are locked at the storage level against unauthorized changes.
An immutable backup retention policy should align with the organization's legal, regulatory, and business continuity needs. Typical retention ranges from 30 days for immediate operational recovery to several years for long-term compliance archiving. Tools like WatchDog Security's Policy Management can help maintain the retention policy as a controlled document with approvals and review history.
Yes, when evaluating immutable snapshots vs immutable backups, secure storage snapshots can satisfy compliance if they guarantee data integrity. They must be configured so they cannot be modified or prematurely deleted, even by compromised administrator accounts.
To prove backup integrity controls, organizations must provide configuration screenshots of WORM or Object Lock settings. They should also demonstrate logs showing that attempts to delete or alter a locked backup file were successfully denied by the storage system. Tools like WatchDog Security's Compliance Center can help organize this evidence and link it to CSC-05-021 for audit readiness.
Using governance mode instead of compliance mode (allowing admins to bypass locks), failing to secure the storage account's root credentials, or improperly setting the retention period are common mistakes that compromise backup immutability best practices.
Encryption keys must be stored securely and separately from the backup data, using robust access controls like MFA and role-based access. If keys are lost or compromised, the immutable backups for ransomware recovery will be unreadable, defeating their purpose.
Immutable backup controls often fail audits because evidence is scattered across storage consoles, ticketing systems, and screenshots. Tools like WatchDog Security's Compliance Center can help centralize evidence (e.g., Object Lock/WORM configurations and denial logs) and map it directly to CSC-05-021 for consistent reporting.
Gaps in backup immutability increase ransomware impact and can undermine recovery objectives, so teams need a clear way to assess likelihood, impact, and remediation ownership. Tools like WatchDog Security's Risk Register can help document the risk, assign treatment plans, track due dates, and produce board-ready status updates tied to this control.
"Backup files shall not be modifiable to maintain data integrity."
| Version | Date | Author | Description |
|---|---|---|---|
| 1.0.0 | 2026-02-24 | WatchDog Security GRC Team | Initial publication |