Skip to content
general data-protection

Backup

backup data-protection recovery infrastructure
Plain English

A backup is a safety copy of your data stored somewhere separate from the original. If your laptop’s hard drive dies, if ransomware encrypts your files, or if you accidentally delete something important, the backup lets you get it all back. The golden rule is the 3-2-1 rule: keep 3 copies of your data, on 2 different types of storage, with 1 copy stored off-site (a different physical location).

Technical Definition

A backup is a duplicate copy of data created to enable recovery after data loss events. Backup strategy design considers recovery point objective (RPO: how much data loss is acceptable) and recovery time objective (RTO: how quickly must the system be restored).

Backup types:

TypeDescriptionSpeedStorageRestore
FullComplete copy of all dataSlowLargeFast (self-contained)
IncrementalOnly data changed since last backup (any type)FastSmallSlow (requires full + all incrementals)
DifferentialData changed since last full backupMediumMediumMedium (requires full + latest differential)
SnapshotPoint-in-time state capture (CoW, ZFS, LVM)InstantMinimal (grows over time)Fast

3-2-1 backup rule:

  • 3 copies of data (original + 2 backups)
  • 2 different storage media (local disk + cloud, NAS + tape)
  • 1 off-site copy (cloud storage, remote server, safe deposit box)

Extended: 3-2-1-1-0: add 1 air-gapped/immutable copy (ransomware protection) and 0 errors (verify backup integrity regularly).

Key concepts:

  • Deduplication: identify and store only unique data blocks across backups, dramatically reducing storage
  • Encryption: encrypt backups at rest and in transit to protect sensitive data
  • Retention policy: how long backups are kept (daily for 30 days, weekly for 12 weeks, monthly for 12 months)
  • Immutable backups: write-once storage that cannot be modified or deleted (protects against ransomware deleting backups)
  • Backup verification: regularly test restore procedures to confirm backups are usable

Backup strategies

# Incremental backup with restic (encrypted, deduplicated)
$ restic init --repo s3:s3.amazonaws.com/bytesnation-backups
$ restic backup /home/mokey/documents --tag daily
snapshot abc123 saved
Files:    1,234 new, 56 changed, 12,345 unmodified
Added:    45.2 MiB

# ZFS snapshot + send to remote backup
$ sudo zfs snapshot tank/data@daily-$(date +%Y%m%d)
$ sudo zfs send -i tank/data@yesterday tank/data@today | \
  ssh backup-server sudo zfs receive backup/data

# Verify backup integrity
$ restic check --read-data
no errors were found

# List and restore from snapshots
$ restic snapshots
ID        Time                 Host    Tags
abc123    2026-04-15 03:00:00  web     daily
def456    2026-04-14 03:00:00  web     daily

$ restic restore abc123 --target /tmp/restore/ --include "/etc/nginx/"
In the Wild

Backups are insurance for your data. The organizations that recover quickly from ransomware are the ones with tested, off-site, immutable backups. The ones that pay ransoms typically had no viable backups or discovered their backups were also encrypted. In homelab environments, Proxmox Backup Server paired with ZFS snapshots provides enterprise-grade backup for VMs and containers. Cloud providers offer managed backup services (AWS Backup, Azure Backup) with cross-region replication. The most common backup failure is not testing restores: backup jobs run successfully for months, but when a restore is needed, the data is corrupted or incomplete. Schedule regular restore tests. Tools like restic, Borg, and Duplicati provide encrypted, deduplicated, incremental backups to local or cloud storage.