Architecture

Immutable Backup Repository on Object Storage

Using S3 Object Lock to create a tamper-proof backup vault where backup data cannot be deleted or modified until the retention period expires, providing protection against accidental deletion and ransomware.

6 connections 3 resources

Summary

What it is

Using S3 Object Lock to create a tamper-proof backup vault where backup data cannot be deleted or modified until the retention period expires, providing protection against accidental deletion and ransomware.

Where it fits

Immutable backups on S3 are the last line of defense for data protection. Even if an attacker gains full access to production systems, Object Lock ensures backup data remains intact and recoverable — meeting compliance requirements and ransomware resilience goals.

Misconceptions / Traps
  • Compliance mode Object Lock is truly immutable — even the root account cannot delete data before retention expires. Misconfigured retention periods can cause unexpected storage costs for undeletable data.
  • Immutable does not mean encrypted. Object Lock prevents deletion but not unauthorized reading. Combine with server-side encryption and access controls for complete protection.
Key Connections
  • depends_on Object Lock / WORM Semantics — the S3 API mechanism for immutability
  • solves Retention Governance Friction — API-enforced retention replaces manual governance
  • scoped_to Object Storage, S3

Definition

What it is

Using S3 Object Lock (WORM) to create tamper-proof backup vaults where retention policies prevent deletion or modification of backup data, even by administrators, for a defined period.

Why it exists

Ransomware attacks increasingly target backup infrastructure. Immutable backups on S3 with Object Lock guarantee that backup data cannot be encrypted, deleted, or modified — providing a last line of defense for data recovery.

Primary use cases

Ransomware-proof backup vaults, regulatory-compliant backup retention, air-gapped-equivalent backup on S3, Veeam/Commvault immutable repository targets.

Connections 6

Outbound 4
Inbound 2

Resources 3