11 Enterprise backup strategies have always been shaped by the dominant risks of their time. For years, the 3-2-1 rule offered a practical answer to hardware failure, accidental deletion, and site-level disasters. Today, ransomware has changed the equation. Attackers no longer stop at production systems; they actively seek out and destroy backups. In this environment, the traditional 3-2-1 rule is necessary but no longer sufficient. The 3-2-1-1-0 backup strategy extends the original model to address modern threat realities. It introduces immutability, isolation, and verification as first-class design principles, not optional add-ons. For organizations designing ransomware-resilient backup architectures, 3-2-1-1-0 has become the new reference framework. This article explains the strategy in detail, compares it to the traditional 3-2-1 rule, and explores how modern object storage platforms enable its practical implementation at enterprise scale. What is the 3-2-1-1-0 backup strategy? The 3-2-1-1-0 backup strategy is an evolution of the classic 3-2-1 rule. It defines not only how many copies of data to keep and where to store them, but also how those copies must behave under attack and during recovery. At a high level, the rule states: 3 copies of data 2 different storage media or platforms 1 copy stored offsite 1 copy that is immutable or air-gapped 0 errors after verified recovery testing Each number addresses a specific failure or attack scenario. Together, they form a framework designed for ransomware-resilient backup rather than simple data loss prevention. The five pillars of the 3-2-1-1-0 rule Three copies of data The first principle remains unchanged from the original rule: maintain at least three copies of critical data. This includes the primary production dataset and a minimum of two backups. Multiple copies protect against corruption, deletion, and partial failure. If one backup set is compromised or incomplete, others remain available. In practice, many enterprises maintain more than three copies, but three remains the minimum baseline for resilience. Two different media or platforms Storing all copies on the same type of system creates a single failure domain. The second principle requires diversity at the storage layer. This may involve combining: On-premises storage with cloud storage Block or file systems with object storage Different storage vendors or platforms Media diversity ensures that a vulnerability, misconfiguration, or attack affecting one platform does not automatically compromise all backups. One offsite copy At least one backup copy must be stored outside the primary data center or availability zone. Offsite storage protects against physical disasters, regional outages, and site-wide compromise. Modern implementations often use cloud object storage or secondary data centers as offsite locations. The key requirement is physical and administrative separation from the production environment. One immutable or air-gapped copy The additional “1” is the most significant change from the traditional rule. It requires at least one backup copy that cannot be modified or deleted during a defined retention period. Historically, this role was filled by offline tape. Today, immutability is more commonly achieved through object storage technologies that enforce write-once, read-many behavior. An immutable backup copy protects against: Ransomware attempting to encrypt or delete backups Compromised administrator credentials Accidental deletion or misconfiguration Without this layer, attackers who gain access to backup systems can neutralize the entire recovery strategy. Zero errors through verified recovery The final “0” emphasizes verification rather than assumption. Backups must be tested regularly to confirm that recovery works as expected. Verification may include: Automated restore testing Integrity checks Periodic recovery drills A backup that cannot be restored successfully is operationally equivalent to no backup at all. The zero-error principle ensures that resilience exists in practice, not just in architecture diagrams. 3-2-1 vs. 3-2-1-1-0: traditional and modern backup strategies compared Feature3-2-1 (Traditional)3-2-1-1-0 (Modern)Primary goalGeneral data loss preventionRansomware resilienceThreat modelHardware failure, disastersCyber-attacks, insider threatsIsolationOffsite copy, often onlineImmutable or air-gapped copyBackup integrityAssumedVerified through testingRecovery confidenceVariableMeasured and validated The traditional 3-2-1 model assumes that backups remain available and trustworthy. The 3-2-1-1-0 strategy removes that assumption and replaces it with enforced isolation and continuous verification. Immutability vs. air-gap: physical isolation or logical protection? A common question in modern backup design is whether immutability truly replaces air-gapping. Physical air-gaps, such as removable media stored offline, provide strong isolation but introduce operational challenges. Manual handling, rotation errors, delayed backups, and inconsistent retention are common sources of failure. Immutability, particularly through object storage technologies such as S3 Object Lock, creates a logical air-gap. Data remains online and accessible for recovery, but cannot be altered or deleted until retention policies expire. From an operational standpoint, logical air-gaps often provide higher reliability: No reliance on manual processes Consistent policy enforcement Immediate availability for recovery Protection even against privileged accounts For many enterprises, immutable object storage offers a more predictable and scalable path to ransomware-resilient backup than physical isolation alone. How Scality ARTESCA and RING enable ransomware-proof 3-2-1-1-0 architectures Implementing 3-2-1-1-0 at scale requires storage platforms designed for immutability, integration, and long-term growth. Scality’s object storage solutions align closely with these requirements. Native immutability for ransomware-resilient backup Scality object storage supports object-level immutability using S3-compatible retention controls. Once backups are written and locked, they cannot be modified or deleted until the defined retention period expires. This ensures that at least one backup copy remains protected even if attackers gain administrative access to backup infrastructure. Immutability becomes a storage-level guarantee rather than a procedural safeguard. Hybrid and offsite flexibility Scality platforms support deployment across on-premises environments, secondary data centers, and cloud-integrated architectures. This flexibility enables organizations to place backup copies in distinct locations without changing backup workflows. Hybrid designs allow enterprises to meet offsite requirements while maintaining operational control and predictable costs. Scale without silos Backup environments grow continuously. Object storage architectures built for horizontal scale allow organizations to retain more restore points, extend retention periods, and consolidate backup repositories without frequent migrations. By removing capacity ceilings, Scality storage supports long-term compliance, investigation, and recovery scenarios that extend beyond short backup windows. Integration with backup software and verification workflows Modern backup platforms rely on tight integration between storage and software layers. Scality object storage integrates with leading backup solutions, enabling features such as automated verification, recovery testing, and policy-driven retention. This integration supports the “0” principle of the 3-2-1-1-0 strategy by making recovery testing routine rather than exceptional. Designing a practical 3-2-1-1-0 backup architecture A typical enterprise implementation may look like this: Production data on primary systems Local backup copies stored on fast on-premises storage Offsite backup copies stored in cloud or secondary locations Immutable backup copy stored on object storage with enforced retention Automated recovery testing scheduled regularly The goal is not complexity, but layered protection. Each layer assumes the failure of the one below it. Why 3-2-1-1-0 matters now Ransomware has shifted backup from an operational task to a core security control. Organizations that cannot restore data quickly and cleanly face prolonged outages, regulatory exposure, and reputational damage. The 3-2-1-1-0 backup strategy provides a clear, actionable framework for building resilience into backup architectures. It replaces assumptions with guarantees and aligns backup design with modern threat models. For enterprises evaluating their data protection posture, the question is no longer whether backups exist, but whether they can survive deliberate attack and support verified recovery. 3-2-1-1-0 answers that question with structure, discipline, and measurable outcomes.