What is the 3-2-1 backup rule?

In the realm of data protection and Veeam, the 3-2-1 Rule has long served as a foundational guideline. This rule outlines the importance of maintaining multiple copies of your data, but as technology continues to evolve, the notion of data redundancy has taken on new dimensions, particularly with the introduction of cloud-based solutions. In this article, we’ll explore how you can enhance your data backup strategy with it.

What is the 3-2-1 Rule?

The 3-2-1 Rule is a data protection strategy that recommends having three copies of your data, stored on two different types of media, with one copy kept off-site.

As a widely embraced data backup strategy, the 3-2-1 Rule prescribes:

This rule is a robust guideline for data protection, ensuring redundancy, resilience, and the ability to recover data even in the face of unexpected events or disasters.

By mitigating single points of failure, enhancing data availability, and protecting against corruption, redundancy ensures the safety of critical information. It plays a pivotal role in disaster recovery, adapting to evolving technologies, and meeting compliance requirements. Diversified storage and off-site backups, as recommended by the rule, effectively mitigate various risks, contributing to the overall security and reliability of critical data.

Origin and Evolution of the Rule

The 3-2-1 Rule was first conceived by U.S. photographer Peter Krogh. This was a rather important innovation for the photography world and has deep implications for other technology disciplines and stays timeless to this day. Even though this rule is flexible and timeless, I reached out to Peter for a quote on the 3-2-1 Rule nowadays and he offered this:

The 3-2-1 Rule was first concepted by U.S. photographer Peter Krogh. This was a rather important innovation for the photography world and has deep implications into other technology disciplines and stays timeless to this day. Even though this rule is flexible and timeless, I reached out to Peter for a quote on the 3-2-1 Rule nowadays and he offered this:


While my focus has been primarily on digital media, the 3-2-1 principles are pretty universal. In fact, the “rule” itself was simply a synopsis of the practices that I found among IT professionals, as I was writing my first book. I just gave it a catchy name.

Over nearly 20 years, 3-2-1 has been a great tool to evaluate data risk exposure. It started in an era of 30GB hard drives and CD backups and has scaled nicely to a world of 18TB drives and ubiquitous cloud storage. With so much of our life and livelihood stored in digital form, and with the threats of malware increasing, it’s important for everyone to have a framework for assessing vulnerabilities.

Peter Krogh


While the 3-2-1 backup strategy (three copies, two media types, one off-site) remains a pillar of data protection, evolving storage needs demand a nuanced approach. Daily full backups might no longer be the most efficient choice. Implementing alternative methods like incremental/differential backups or continuous data protection (CDP) can offer significant storage and performance benefits but require closer management for data consistency and accessibility.

Modern Trends and Considerations

Disaster Recovery Solutions

Beyond mere data recovery, Disaster Recovery as a Service (DRaaS) expands the 3-2-1 concept by safeguarding server OSes, environments, applications, and more. DRaaS, leveraging server virtualization, can seamlessly restore entire IT operations after an outage, minimizing downtime and maximizing business continuity.

Adapting, Not Abandoning

The 3-2-1 rule remains a fundamental framework, but adapting to modern technologies and threats is crucial. Explore solutions that seamlessly integrate with modern approaches like CDP and deduplication while offering intelligent data management and comprehensive DRaaS capabilities. By embracing these advancements, organizations can ensure their data is not just backed up, but readily recoverable and resilient in the face of any disruption.

Modern Applications of the 3-2-1 Rule

With this base rule outline, now we can upgrade it to work with modern critical data. However, let’s not forget the base rule’s best attributes:

In today’s digital age, the 3-2-1 Rule has evolved and expanded. Add content with bullet point formatting to explore how organizations now implement this rule with modern technologies.

We have spoken to several organizations that have had more than three copies in flight for some of their critical collections of backup data or disaster recovery (DR) infrastructure. One of the surprise use cases is the ability to have additional analytics on the data. This can be tested with SureBackup or a more specific line of business analytics with the data in the backup or DR infrastructure. Additional use cases like this bolster the value of a backup solution in organizations.

Even more attributes of this rule include:

Embracing Cloud Backups

In the past, relying on physical media such as tapes and hard drives was the norm. Today, we can achieve a higher level of efficiency and reliability through cloud backups.

Cloud backups not only simplify and modernize data protection but also open new avenues for data security and resilience, ultimately safeguarding your critical information in an ever-evolving digital landscape.

Cloud backups provide several benefits, including:

  1. Instant Availability: With cloud backups, your data is not only offsite but instantly available reducing recovery time. There’s no longer a need for the manual process of transferring, cataloging, and tracking physical tapes.
  2. Data Redundancy: Cloud-to-cloud storage ensures that your backups are stored securely on robust cloud infrastructure, reducing the risk of data loss due to hardware failures or other disasters. Leading cloud providers offer multiple availability zones, guaranteeing uninterrupted data access even if one data center experiences downtime.
  3. Streamlined Data Protection: Cloud backups simplify the backup process, eliminating the need for physical transportation of hardware. This saves valuable time and resources.
  4. Immutability: With the help of native APIs such as the Amazon S3 Object Lock API and Immutable Storage for Azure Blob, you can further enhance data security by making your backups immutable and placing them in a WORM (Write Once, Read Many) state. This level of immutability is crucial for maintaining data integrity, ensuring compliance, and safeguarding against potential data breaches.

You can define immutability periods in alignment with your data retention policies, achieving and sustaining the highest standards of security and compliance without incurring unnecessary costs. In essence, these immutability features fortify your data against tampering or accidental alterations, making it an essential component of your comprehensive data protection strategy.

The 3-2-1-1-0 Rule with Veeam

Veeam can configure numerous combinations following the 3-2-1 Rule. This versatility is evident in the following implementations, each contributing to adherence to this guideline:

The Veeam difference is that we have added an extra 1 and 0 at the end, helping ensure recovery with the many types of incidents that can occur. This upgraded rule gives incredible versatility by going the extra mile.

The figure below is our 3-2-1-1-0 Rule visualized:

These two additions are critically important today. Having a copy of backup data that is either offline, air-gapped, or immutable is an incredibly resilient specimen to help ensure data recovery in a ransomware event. There are some scenarios where a copy can have multiple characteristics, such as WORM tape media removed from the tape library device. This would be offline, immutable, and air-gapped all at once. I collectively refer to the phrase “ultra-resilient” for a copy of data that is either offline, air-gapped, or immutable.

Backing up your data is not enough – you must ensure that each backup is recoverable, complete, and uncorrupted. Recovery testing is critical because it ensures that you really are protected against disasters and ransomware attacks. SureBackup recovery verification by Veeam is a great way to confidently know that you can restore data. This isn’t because a Veeam backup isn’t “good” it is just that certain behaviors are only manifested on restores or reboots that may inhibit a restore going as planned.

At Veeam, we believe Cybersecurity is better as a team sport. We have storage partners for the data center and cloud that provide immutable backup copies managed by our software, from snapshots, flash disks, appliances, object storage. It is supported at every copy perhaps one in the data center, two in the cloud, which makes sure it is too difficult to compromise all copies. If all your eggs are in one basket – perhaps a former employee knows how to unlock immutable, but if it’s distributed across three vendors, then the chances are impossible.

Leveraging multiple vendors also proves advantageous in situations where data portability is crucial, such as the need to restore backups from one location to another due to supply chain issues. Veeam not only supports this functionality but also increases your likelihood of achieving successful data recovery when multiple vendors are involved.

The 3-2-1-1-0 Rule, as endorsed by Veeam, is the modern approach to data protection. We have nothing but evidence in the form of customer stories at the Veeam website that bad things happen to good servers, storage, and data. Now, more than ever, you need to be able to have control over your data to ensure recoverability.  Ready to evolve your 3-2-1 strategy? Let Veeam be your guide. Explore our Cloud Backup Solutions and discover how we can help you achieve data resilience in the modern era.

 

Latest release trial
Veeam Data Platform
Embrace Complete Data Resilience
 

Exit mobile version