The 3-2-1 backup is a reliable recovery methodology for ensuring that data is protected adequately and backup copies of the data are available when needed. The basic concept of the 3-2-1 backup strategy is that three copies are made of the data to be protected, the copies are stored on two different types of storage media and one copy of the data is sent offsite.
In the classic 3-2-1 backup scenario, backup software makes a copy of the company’s critical data and saves the copy to another on-premises storage device. During that process or immediately afterward, two more copies of the data are saved to two other devices—traditionally at least one of those devices was a tape library. Tape was a standard part of the process because it made it easy to create a portable copy of the data in the form of a tape cartridge that could easily be sent offsite.
Although the 3-2-1 backup approach has been around since the early days of data protection, it is a concept that is still embraced by most backup software and hardware vendors as a best practice for using their products effectively. They recognize that the general concept is still valid regardless of how or where a company stores its data, even as new requirements and voluminous data have made the 3-2-1 equation a bit more complicated.
3-2-1 backup rules
The 3-2-1 backup strategy is made up of three rules, they are as follows:
- Three copies of data- This includes the original data and at least two backups.
- Two different storage types- Both copies of the backed up data should be kept on two separate storage types to minimize the chance of failure. Storage types could include an internal hard drive, external hard drive, removable storage drive or cloud backup environment.
- One copy offsite- At least one data copy should be stored in an offsite or remote location to ensure that natural or geographical disasters cannot affect all data copies.
Importance of the 3-2-1 rule
The 3-2-1 backup strategy is recognized as a best practice for information security professionals and government authorities. While it does not guarantee all data will never be compromised, this strategy eliminates the most risk. The 3-2-1 methodology is important in ensuring that there is no single point of failure for data. Not only is an organization covered if one copy is corrupted or a technology fails, but also if a natural disaster or theft occurs that wipes out the physical storage types.
Variation on the 3-2-1 backup methodology
There are a number of ways of achieving a workable 3-2-1 backup system, and the variations on the basic theme will depend largely on the amount of data to be protected, the installed storage equipment and the type of offsite repository available.
For example, the first step of making the three copies of the backup data can be accomplished in a variety of ways. The simplest method would be for the backup software to create the “master” backup copy and then that software or a replication utility would make the two additional copies, storing one on a different media type. Alternatively, mirroring could be used to create the first two copies simultaneously with the third spun off from one of those copies. Because one copy has to reside on a different medium, the process of making that copy is often the final step in the process as copying to a different media type is likely to occur at a different rate than that of making the first two disk or solid-state drive-based copies.
For the second copy that is maintained in-house for quick or operational recoveries, companies should store that copy on another server or storage system separate from the originating equipment. The target gear for the second copy should allow easy access to the backup data in case it is needed, such as if the original data is lost or damaged. Storing copy number two on equipment similar to the original system should facilitate recoveries.
However, the in-house copy does not necessarily have to be stored on the same or similar media. In some cases, an organization may make the first “master” copy and then copy that data to two tape drives, simultaneously or sequentially. One tape cartridge would be retained onsite and the other would be sent to the offsite facility. The drawback to this approach is that recovering data from the onsite tape might take some time, certainly longer than recovering from a hard-disk or solid-state drive. This would also be true if other types of removable media were used, such as optical disks or removable drives, although recovery times will vary.
Some backup software applications will handle the multiple-copy aspect automatically, possibly even creating the second or third copy. Data duplicating or replication applications can also handle this chore. In very small environments, the second and third copies may be triggered manually, but that method quickly becomes untenable as data stores grow.
Getting the third copy offsite
In the traditional version of 3-2-1 backup, satisfying the requirement that the “1” copy of data must go offsite was typically accomplished by sending a tape to another location. Usually, a company would contract with a tape vaulting service, which would pick up and store the tape cartridge. Data copied to non-tape portable media would similarly be handled by an offsite vaulting service.
Today, many companies still rely on tape and outside vaulting services, such as Iron Mountain. Some companies that have their own remote facilities such as secondary data centers or disaster recovery installations may use ordinary courier services to pick up and deliver their offsite copies.
Vaulting or other offsite scenarios come with their own caveats. Too often, tapes get lost between the loading dock, the delivery van or the offsite service. And natural elements—heat, cold, rain or snow—can wreak havoc with tape cartridges, causing data loss. For these reasons, offsite copies on any medium should be tested to ensure their integrity soon after they arrive at the remote facility.
Increasingly, however, companies are trying to avoid the pitfalls of manually handling copies of their data by transmitting their offsite copies electronically. So instead of physically shipping tapes, disks or drives, offsite copies can be sent over the internet or private communications lines to a cloud storage service. Often, the backup software or hardware will handle transmitting the offsite copy automatically.
If the offsite copy also represented the second media type copy (the “2” of 3-2-1), sending it to a cloud service adds a wrinkle to the 3-2-1 backup method as the service is likely to store the copy on the same type of media that is used in house. Although this deserves some consideration, it may not be an issue, as cloud storage is often considered more of a storage medium than an alternative storage location.
Universality of the 3-2-1 backup rule
Data protection technologies and techniques have evolved considerably since the 3-2-1 backup methodology was first conceived, but it can still be applied to the various forms of modern data backup and recovery.
Snapshotting and replication are two widely used data protection technologies as they help overcome some of the obstacles of adequately backing up very large data stores. But using snapshots plus replication fits nicely within the 3-2-1 model as the methods used to make the original copy of the data as well as the two duplicates.
Backup appliances are relatively new fixtures in some data centers that combine backup software with dedicated hardware. These devices simplify initial backups and can usually connect seamlessly with a cloud backup service to stash an offsite copy of the data.
Similarly, data protection processes like continuous data protection (CDP) strain the 3-2-1 model a bit, but with proper management these newer approaches can support 3-2-1 effectively.
New uses of backup data and the 3-2-1 rule
There are other developments in modern data protection that do not eliminate the possibility of using a 3-2-1 backup scheme, but they may make it a little more complicated to manage. Two of the most impactful developments involve using backup data for other purposes and the shifting ideals of data integrity.
Today, backups are not just insurance policies, tucked away until something goes awry. Companies are extracting more value from their backup data stores by using that data for things like developing and testing new applications. Contemporary approaches to programming, such as DevOps, require easy access to data that is as close to the real thing as possible to ensure that applications are developed properly. Backup data fits that bill very nicely.
Analytical applications may also need access to large amounts of current data. By using fresh backup data, the results of the analytic process are likely to be more reliable and accurate. Tighter controls and management of data companies is required to ensure that these applications get the best data possible while maintaining the primary concepts of 3-2-1 backup.
Data integrity has always been a key concern of data protection activities. It is not enough to simply back up data and lock away the copies, it is imperative to ensure that backups are complete, uncorrupted and recoverable. Recovery testing helps in this regard, as well as employing some of the more advanced features that backup apps offer to detect ransomware and other threats. Again, these concerns do not necessarily derail a 3-2-1 backup approach, but they may add some steps to the process.
The GDPR—General Data Protection Regulation—is another contemporary wrinkle that could affect data protection practices. The GDPR is a European Union enactment that defines the steps that organizations must take to protect the data of its users. For 3-2-1 backup practitioners, this means ensuring that wherever those three copies of data are stored, security measures are adequate enough to ensure against data loss and to avoid potentially crippling EU fines.
Another directive of the GDPR says that a company’s customers or users have the right to have their names and all data related to them expunged from the company’s storage systems and media. In a 3-2-1 environment, this means that the information must be removed from all three copies of the data.
Shortcomings of 3-2-1 backup
As an effective data protection scheme, 3-2-1 backup has stood the test of time, but when in the context of contemporary storage systems and services, some of the steps and practices may need some adjustments.
Keeping track of 3-2-1 backup data copies can get complicated depending on the type of backup an organization is using in its 3-2-1 setup. For most companies, doing a full backup daily is not feasible, so other approaches are likely being used, such as incremental or differential backups. Because those types of backups require some interim actions to produce a full backup copy, the “3” data copies part may require some added management to ensure that all available copies are up to date and easily accessible.
If a cloud storage service is being used to store the offsite copy, the service provider should be asked to provide details related to its data protection processes. Also, many cloud storage providers will charge customers extra to recover any data that the customer may have accidentally deleted. To avoid over charges and to add a level of data safety, it is a good idea to copy the cloud-based backup to another cloud storage service.
As noted earlier, using a cloud storage service or transmitting a backup copy to a remote facility requires telecommunications services with ample bandwidth to handle the volume of data that is being sent or retrieved. These costs may also escalate as the amount of data a company has grows. And even with speedy communication lines, it takes time to retrieve data, so that should be considered when developing recovery plans.
If tape or optical libraries are part of the 3-2-1 backup scenario, to ensure that data can be recovered in a timely manner, it is necessary to maintain that equipment. Generally, that should not be an issue, but if a company uses tape or optical gear that is older or even end-of-lifed, maintaining that equipment appropriately may be difficult or costly.
3-2-1 backup management
There are some basic managerial fundamentals for a successful 3-2-1 backup implementation, including:
- All data copies are identical and up to date.
- The media that copies are on is readable media.
- All copies and equipment are tested and confirmed to be in working order.
- Remote copies are stored safely.
- Plans to recover single/multiple files or a full backup have been tested.
- Internal data copies are on different storage systems and networks, and are not accessible from outside the company.
The backup software used in the 3-2-1 process can be very helpful as it can automatically direct the disposition of backup copies while cataloging all backup activities. Most backup apps have also added features to check for threats such as malware, ransomware and viruses in backup copies.
If your backup application does not provide all the information you need to effectively manage your 3-2-1 backups, a backup reporting application such as Bocada or Veritas Aptare IT Analytics can provide comprehensive backup management. These applications go well beyond just tracking backups, and can be used for overall storage environment management.