Ransomware attacks commonly attempt not only to encrypt production data but also to corrupt or encrypt accessible backups. CRISC-aligned resilience strategies increasingly emphasize the use ofimmutable backups—copies of data that cannot be altered or deleted within a defined retention period. Immutable backups ensure that even if ransomware compromises live systems and standard backup repositories, a protected copy remains recoverable. Recovering from a previous cycle is helpful only if that backup itself was not encrypted or tampered with; without immutability, this is uncertain. Verifying backups is good practice but does not guarantee protection against later corruption. Multiple media types increase redundancy but do not inherently prevent modification or deletion. Immutable backup technologies directly support assured recovery after ransomware, making them the best enabling control for this scenario.
[Reference:CRISC Review Manual – Risk Response and Mitigation (backup strategies and resilience to malware)., , ]
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit