Methodologies around technology have changed over the years but the guiding principles have remained the same. One of these methodologies is the 3-2-1 rule, where three copies of your data are stored in two locations, with one of these copies being off site. This rule has evolved to fit today’s new and ever-changing needs for data protection.
The original idea for the 3-2-1 rule was structured around having a primary center and a DR data center with data replicated to each one and then replicated to something immutable like tape. Times have since changed and customers have recognized the benefits of running multiple data centers with high availability and connectivity. These data centers are now interconnected, and domains have been stretched across multiple locations, which has led to added risk for the user. If an account on one site gets compromised, the other sites are likely to be compromised as well. So, being separated geographically does not necessarily mean the sites are actually separate.
Enter object storage technology. It can allow scalability, reliability and performance that adds a new dimension to the traditional 3-2-1 rule. When leveraging object storage and writing to a different protocol a logical air gap between the source data and the destination is formed. With the addition of object lock, a retention of the object is written to the object itself and this inhibits the ability for a malicious actor to remove any backups. It’s the 3-2-1 rule with a modern spin on it.
Listen to this Podcast:
Today, service providers are implementing and building upon methodologies to keep data secure and functional for clients. New threats like ransomware, which is one of the fastest growing malware threats that encrypts and deletes data, is now deemed as a top virus in the world economy. To thwart these threats, sophisticated solutions – including object storage – are helping to make sure data can withstand ransomware attacks while remaining available and resilient.
Do you want to learn more data immutability and how to keep your data safe and secure during these changing times? Listen to the Veristor podcast: “Modernization of the 3-2-1 Rule.”