{"id":20095,"date":"2025-09-25T00:39:33","date_gmt":"2025-09-25T00:39:33","guid":{"rendered":"https:\/\/www.sandbox.backupassist.com\/blog\/?p=20095"},"modified":"2025-09-25T01:48:04","modified_gmt":"2025-09-25T01:48:04","slug":"does-cloud-immutability-guarantee-a-restore-point","status":"publish","type":"post","link":"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point","title":{"rendered":"Does Cloud Immutability Guarantee a Restore Point?"},"content":{"rendered":"\n<p><em>*This article was 100% human written by the author, Linus Chang.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">TL;DR summary<\/h2>\n\n\n\n<p>Cloud immutability is absolutely vital for achieving the highest level of cyber-resilience, but surprisingly to many, it&#8217;s not a magic wand that will get you there automatically.<\/p>\n\n\n\n<p>Instead, think of cloud immutability as the fundamental building block &#8211; reliable cloud storage that will be ready for you when you need it, even if a hacker has broken in and deleted the data.<\/p>\n\n\n\n<p>On top of this storage sits a stack of technologies that must work together in unison &#8211; using the right backup software that supports immutability, with the correct backup configuration, running on your systems.<\/p>\n\n\n\n<p>It&#8217;s the combination of this stack that will give you a dependable restore point, and the highest level of cyber-resilience.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Table of Contents<\/h2>\n\n\n\n<ol class=\"wp-block-list\"><li>What problem does Cloud Immutability solve?<\/li><li>The role of backup software<\/li><li>The role of the cloud storage provider<\/li><li>Who should consider cloud immutability?<\/li><li>Are there downsides?<\/li><li>Putting it together<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">What problem does Cloud Immutability solve?<\/h2>\n\n\n\n<p>There&#8217;s a very real problem that <a href=\"https:\/\/www.backupassist.com\/blog\/what-is-cloud-immutability-and-why-is-it-important\" target=\"_blank\" rel=\"noreferrer noopener\">cloud immutability<\/a> is designed to solve: to stop hackers from holding you to ransom.<\/p>\n\n\n\n<p>Let&#8217;s try to understand this by drawing out the components of a backup system:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/Components-of-a-Backup-System.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"722\" src=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/Components-of-a-Backup-System-1024x722.jpg\" alt=\"\" class=\"wp-image-20096\" srcset=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/Components-of-a-Backup-System-1024x722.jpg 1024w, https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/Components-of-a-Backup-System-300x211.jpg 300w, https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/Components-of-a-Backup-System-768x541.jpg 768w, https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/Components-of-a-Backup-System.jpg 1500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p> <\/p>\n\n\n\n<p>The key weakness is that underpinning the entire backup system is the backup storage layer. For a variety of reasons (which I&#8217;ll write about in other articles), hackers nearly always try to attack the backup storage layer and irrevocably delete the backup data. Then the hacker can install ransomware on the live I.T. systems, leaving the victim locked out of their own data, with no backup and no option other than to pay the ransom.<\/p>\n\n\n\n<p>Cloud immutability solves this problem by implementing a <strong>write once, read many (WORM) <\/strong>method of storage. Once data is written to the backup storage, it is automatically locked and protected from harm. If an attacker subsequently deletes the data, it looks like it&#8217;s deleted, but actually it&#8217;s just hidden from view &#8211; past versions of that file are still there and can never be purged manually.<\/p>\n\n\n\n<p>Each storage provider implements the fine details in slightly different ways, but what&#8217;s common is that the data will be <strong>preserved for a minimum time period<\/strong>, known as the <a href=\"https:\/\/www.backupassist.com\/blog\/data-archiving-and-retention-101-best-practices-with-backupassist\" target=\"_blank\" rel=\"noreferrer noopener\">retention period<\/a>. And the retention periods can only be modified upwards, preventing the attacker from setting it to 0 days (which would then trigger imminent deletion).<\/p>\n\n\n\n<p>In practical terms, if you set the retention period to 180 days, it gives you 180 days to realize you suffered some data loss. That&#8217;s ample time and opportunity to do a restore.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The role of backup software<\/h2>\n\n\n\n<p>Immutable cloud storage mitigates against the attack on underlying backup data at the storage level. However, you should think of it like it were a bank vault &#8211; while it&#8217;s a secure container, it&#8217;s up to you to put your jewels inside it.<\/p>\n\n\n\n<p>So, in order to get a dependable restore point, you need to ensure you&#8217;re putting in the right data into the cloud vault. That&#8217;s where backup software comes in. Business-grade products like BackupAssist will:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Take point-in-time snapshots of your systems and applications (GB or TB in size).<\/li><li>Break down those snapshots into individual bite-sized chunks of data suitable for cloud storage (generally MB in size).<\/li><li>Apply deduplication, compression and encryption to those chunks.<\/li><li>Store those chunks on immutable cloud storage, setting retention dates based on the backup configuration and policies.<\/li><li>Maintain catalogs of the data to provide search and restore functions, and storing those catalogs on immutable cloud storage.<\/li><\/ol>\n\n\n\n<p>And the entire process runs in reverse when performing a restore.<\/p>\n\n\n\n<p>Provided the backup software does not malfunction (for example, backups could be repeatedly interrupted due to unstable internet connection), and it was configured properly by suitably knowledgeable I.T. staff, then the combination of immutable cloud storage and your backup software will give you dependable restore points.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">A simple example<\/h3>\n\n\n\n<p>Let&#8217;s say a dental clinic backs up its data to an Amazon S3 bucket using BackupAssist Classic, and cloud immutable storage. Let&#8217;s also assume that at least one full backup has been completed and the backup software is configured to keep backups for 180 days.<\/p>\n\n\n\n<p>Now let&#8217;s also say:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>A hacker has managed to compromise the network of the dental clinic.<\/li><li>The hacker also discovered the credentials to the cloud storage account.<\/li><li>The hacker deleted all data in the S3 bucket used for backup storage.<\/li><li>The hacker changed the configuration of BackupAssist to delete the backup job.<\/li><li>No other backup jobs were running (which is not best practice &#8211; it means backup eggs were in the same basket).<\/li><\/ol>\n\n\n\n<p>Without cloud immutable storage, the dental clinic would be vulnerable and would likely have to pay a ransom &#8211; with Step 5 meaning all eggs were in one basket, and Step 3 meaning that one basket was destroyed.<\/p>\n\n\n\n<p>With cloud immutable storage, the dental clinic has a dependable restore point. You can simply install BackupAssist on a new computer, point it to your S3 bucket, and it will automatically detect historic backups and past versions, even if the bucket looks like it&#8217;s empty.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The role of the cloud storage provider<\/h2>\n\n\n\n<p>When relying on immutable cloud storage, you&#8217;re relying on the cloud provider&#8217;s infrastructure as well. Such factors include:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>The software implementation of immutable storage<\/li><li>The hardware &#8211; RAID arrays, power, networking<\/li><li>Any backups or replication that the cloud provider does behind the scenes<\/li><li>Service availability &#8211; which really matters because the service must be up at the time of backup and restore.<\/li><\/ol>\n\n\n\n<p>All these factors are wrapped up into two key figures known as <strong>durability <\/strong>and <strong>availability<\/strong>. Taking Amazon S3 as an example, and assuming you&#8217;ve got 1TB of data, split into 1MB chunks:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Durability<\/strong>: 99.999999999% (one in a million chance you&#8217;ll lose a 1MB of data per year)<\/li><li><strong>Availability<\/strong>: 99.99% available over a given year (down for up to 52.56 minutes per year)<\/li><\/ul>\n\n\n\n<p>In non-technical terms, you&#8217;ll have a higher chance of getting struck by lightning multiple times than losing data.<\/p>\n\n\n\n<p>Nonetheless, there is always the risk of the cloud provider facing force majeure events such as natural disasters, acts of war, and so on.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Who should consider cloud immutability?<\/h2>\n\n\n\n<p>Most likely, you&#8217;ll have one of these needs:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li><strong>Business risk mitigation<\/strong> &#8211; backing up to immutable cloud storage is inexpensive; paying a ransom is crippling.<\/li><li><strong>Compliance<\/strong> &#8211; for example, many countries require medical records to be retained for 6+ years.<\/li><li><strong>Certification<\/strong> &#8211; you may need to pass certain compliance certification tests. In my home country, Australia, cloud immutability is a key component of achieving <a href=\"https:\/\/www.cyber.gov.au\/business-government\/asds-cyber-security-frameworks\/essential-eight\" target=\"_blank\" rel=\"noreferrer noopener\">ASD Essential 8<\/a>, Maturity Level 3.<\/li><\/ol>\n\n\n\n<p>In my view, the case for using immutable cloud storage is compelling. (And yes, I&#8217;m impartial &#8211; I&#8217;m not affiliated with any cloud storage vendor.)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are there downsides?<\/h2>\n\n\n\n<p>Yes. But they&#8217;re minimal.<\/p>\n\n\n\n<p>In our testing, we project that there&#8217;ll be a modest increase in data storage costs &#8211; less than 10% increase for typical clients. We have not seen any noticeable performance costs.<\/p>\n\n\n\n<p>In the coming months, we&#8217;ll conduct some comprehensive tests and report back. If you don&#8217;t want to miss any news, subscribe to our newsletter &#8211;<\/p>\n\n\n\n<!--Zoho Campaigns Web-Optin Form's Header Code Starts Here-->\n\n<script type=\"text\/javascript\" src=\"https:\/\/psit-zgpvh.maillist-manage.net\/js\/optin.min.js\" onload=\"setupSF('sf3z9dabc823077d2fb3c679f378f7d471e9e9b80ff30d3c6ec1897fd024ceb8105a','ZCFORMVIEW',false,'light',false,'0')\"><\/script>\n<script type=\"text\/javascript\">\n\tfunction runOnFormSubmit_sf3z9dabc823077d2fb3c679f378f7d471e9e9b80ff30d3c6ec1897fd024ceb8105a(th){\n\t\t\/*Before submit, if you want to trigger your event, \"include your code here\"*\/\n\t};\n<\/script>\n\n<style>.quick_form_9_css * { -webkit-box-sizing: border-box !important; -moz-box-sizing: border-box !important; box-sizing: border-box !important; overflow-wrap: break-word }@media only screen and (max-width: 600px) {.quick_form_9_css[name=\"SIGNUP_BODY\"] { width: 100% !important; min-width: 100% !important; margin: 0px auto !important; padding: 0px !important } .SIGNUP_FLD { width: 90% !important; margin: 10px 5% !important; padding: 0px !important } .SIGNUP_FLD input { margin: 0 !important; border-radius: 25px !important } }<\/style>\n\n<!--Zoho Campaigns Web-Optin Form's Header Code Ends Here--><!--Zoho Campaigns Web-Optin Form Starts Here-->\n\n<div id=\"sf3z9dabc823077d2fb3c679f378f7d471e9e9b80ff30d3c6ec1897fd024ceb8105a\" data-type=\"signupform\" style=\"opacity: 1;\">\n\t<div id=\"customForm\">\n\t\t<div class=\"quick_form_9_css\" style=\"background-color: rgb(255, 255, 255); width: 350px; z-index: 2; font-family: &quot;Arial&quot;; border-width: 1px; border-style: solid; border-color: rgb(235, 235, 235); overflow: hidden\" name=\"SIGNUP_BODY\">\n\t\t\t<div>\n\t\t\t\t<div style=\"font-size: 14px; font-family: &quot;Arial&quot;; font-weight: bold; color: rgb(136, 136, 136); text-align: left; padding: 10px 15px 5px; width: 100%; display: block\" id=\"SIGNUP_HEADING\">Subscribe to our Newsletter<\/div>\n\t\t\t\t<div style=\"position:relative;\">\n\t\t\t\t\t<div id=\"Zc_SignupSuccess\" style=\"display:none;position:absolute;margin-left:4%;width:90%;background-color: white; padding: 3px; border: 3px solid rgb(194, 225, 154);  margin-top: 10px;margin-bottom:10px;word-break:break-all\">\n\t\t\t\t\t\t<table width=\"100%\" cellpadding=\"0\" cellspacing=\"0\" border=\"0\">\n\t\t\t\t\t\t\t<tbody>\n\t\t\t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t<td width=\"10%\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"successicon\" src=\"https:\/\/psit-zgpvh.maillist-manage.net\/images\/challangeiconenable.jpg\" align=\"absmiddle\">\n\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t<td>\n\t\t\t\t\t\t\t\t\t\t<span id=\"signupSuccessMsg\" style=\"color: rgb(73, 140, 132); font-family: sans-serif; font-size: 14px;word-break:break-word\">&nbsp;&nbsp;Thank you for Signing Up<\/span>\n\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t<\/tbody>\n\t\t\t\t\t\t<\/table>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<form method=\"POST\" id=\"zcampaignOptinForm\" style=\"margin: 0px; width: 100%; padding: 0px 15px\" action=\"https:\/\/psit-zgpvh.maillist-manage.net\/weboptin.zc\" target=\"_zcSignup\">\n\t\t\t\t\t<div style=\"background-color: rgb(255, 235, 232); padding: 10px; color: rgb(210, 0, 0); font-size: 11px; margin: 20px 10px 0px; border: 1px solid rgb(255, 217, 211); opacity: 1; display: none\" id=\"errorMsgDiv\">Please correct the marked field(s) below.<\/div>\n\t\t\t\t\t<div style=\"position: relative; margin: 10px 0 15px; width: 225px; height: 30px; display: inline-block\" class=\"SIGNUP_FLD\">\n\t\t\t\t\t\t<input type=\"text\" style=\"font-size: 14px; border: 1px solid rgb(235, 235, 235); border-radius: 0; width: 100%; height: 100%; z-index: 4; outline: none; padding: 5px 10px; color: rgb(136, 136, 136); text-align: left; font-family: &quot;Arial&quot;; background-color: transparent; background-color: rgb(255, 255, 255); box-sizing: border-box\" placeholder=\"Email\" changeitem=\"SIGNUP_FORM_FIELD\" name=\"CONTACT_EMAIL\" id=\"EMBED_FORM_EMAIL_LABEL\">\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div style=\"position: relative; width: 90px; height: 37px; text-align: left; display: inline-block; margin: 0px 0px 10px\" class=\"SIGNUP_FLD\">\n\t\t\t\t\t\t<input type=\"button\" style=\"text-align: center; width: 100%; height: 100%; z-index: 5; border: 0px; color: rgb(255, 255, 255); cursor: pointer; outline: none; font-size: 14px; background-color: rgb(247, 143, 30); margin: 0px 0px 0px -5px; border-radius: 0px 3px 3px 0px\" name=\"SIGNUP_SUBMIT_BUTTON\" id=\"zcWebOptin\" value=\"Submit\">\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<input type=\"hidden\" id=\"fieldBorder\" value=\"\">\n\t\t\t\t\t<input type=\"hidden\" id=\"submitType\" name=\"submitType\" value=\"optinCustomView\">\n\t\t\t\t\t<input type=\"hidden\" id=\"emailReportId\" name=\"emailReportId\" value=\"\">\n\t\t\t\t\t<input type=\"hidden\" id=\"formType\" name=\"formType\" value=\"QuickForm\">\n\t\t\t\t\t<input type=\"hidden\" name=\"zx\" id=\"cmpZuid\" value=\"128d2fa8f\">\n\t\t\t\t\t<input type=\"hidden\" name=\"zcvers\" value=\"3.0\">\n\t\t\t\t\t<input type=\"hidden\" name=\"oldListIds\" id=\"allCheckedListIds\" value=\"\">\n\t\t\t\t\t<input type=\"hidden\" id=\"mode\" name=\"mode\" value=\"OptinCreateView\">\n\t\t\t\t\t<input type=\"hidden\" id=\"zcld\" name=\"zcld\" value=\"1752e6ea3a1bbf1b\">\n\t\t\t\t\t<input type=\"hidden\" id=\"zctd\" name=\"zctd\" value=\"1752e6ea387a3089\">\n\t\t\t\t\t<input type=\"hidden\" id=\"document_domain\" value=\"\">\n\t\t\t\t\t<input type=\"hidden\" id=\"zc_Url\" value=\"psit-zgpvh.maillist-manage.net\">\n\t\t\t\t\t<input type=\"hidden\" id=\"new_optin_response_in\" value=\"0\">\n\t\t\t\t\t<input type=\"hidden\" id=\"duplicate_optin_response_in\" value=\"0\">\n\t\t\t\t\t<input type=\"hidden\" name=\"zc_trackCode\" id=\"zc_trackCode\" value=\"ZCFORMVIEW\">\n\t\t\t\t\t<input type=\"hidden\" id=\"zc_formIx\" name=\"zc_formIx\" value=\"3z9dabc823077d2fb3c679f378f7d471e9e9b80ff30d3c6ec1897fd024ceb8105a\">\n\t\t\t\t\t<input type=\"hidden\" id=\"viewFrom\" value=\"URL_ACTION\">\n\t\t\t\t\t<span style=\"display: none\" id=\"dt_CONTACT_EMAIL\">1,true,6,Contact Email,2<\/span>\n\t\t\t\t<\/form>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t<img decoding=\"async\" src=\"https:\/\/psit-zgpvh.maillist-manage.net\/images\/spacer.gif\" id=\"refImage\" onload=\"referenceSetter(this)\" style=\"display:none;\">\n<\/div>\n<input type=\"hidden\" id=\"signupFormType\" value=\"QuickForm_Horizontal\">\n<div id=\"zcOptinOverLay\" oncontextmenu=\"return false\" style=\"display:none;text-align: center; background-color: rgb(0, 0, 0); opacity: 0.5; z-index: 100; position: fixed; width: 100%; top: 0px; left: 0px; height: 988px;\"><\/div>\n<div id=\"zcOptinSuccessPopup\" style=\"display:none;z-index: 9999;width: 800px; height: 40%;top: 84px;position: fixed; left: 26%;background-color: #FFFFFF;border-color: #E6E6E6; border-style: solid; border-width: 1px;  box-shadow: 0 1px 10px #424242;padding: 35px;\">\n\t<span style=\"position: absolute;top: -16px;right:-14px;z-index:99999;cursor: pointer;\" id=\"closeSuccess\">\n\t\t<img decoding=\"async\" src=\"https:\/\/psit-zgpvh.maillist-manage.net\/images\/videoclose.png\">\n\t<\/span>\n\t<div id=\"zcOptinSuccessPanel\"><\/div>\n<\/div>\n\n<!--Zoho Campaigns Web-Optin Form Ends Here-->\n\n\n\n<h2 class=\"wp-block-heading\">Putting it together<\/h2>\n\n\n\n<p>Coming back to the original question: &#8220;Does Cloud Immutability Guarantee a Restore Point?&#8221;<\/p>\n\n\n\n<p>Benjamin Franklin once said, &#8220;&#8230; in this world nothing can be said to be certain, except death and taxes.&#8221;<\/p>\n\n\n\n<p>I&#8217;ll confidently say that the combination of the right backup software with cloud immutability is as close to a guaranteed restore point as I&#8217;ve seen in 24 years in the industry.<\/p>\n\n\n\n<p>It&#8217;s more dependable than many technologies we&#8217;ve had in the past. And in the future, I&#8217;m sure I&#8217;ll hear far more stories where backups to immutable cloud storage end up saving the day, than people complaining about the costs.<\/p>\n\n\n\n<p>Until next time &#8211; stay safe, and stay cyber-resilient!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While &#8220;Cloud Immutability&#8221; is the latest in a long line of buzzwords, does it improve your cyber-resilience? Is it worth the extra costs? And who should consider it?<\/p>\n","protected":false},"author":2,"featured_media":20099,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[771,757],"tags":[],"class_list":["post-20095","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-backupassist-classic","category-cyber-resilience"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Does Cloud Immutability Guarantee a Restore Point?<\/title>\n<meta name=\"description\" content=\"Cloud immutability strengthens cyber-resilience, but does it guarantee a restore point? Learn how backup software and immutable storage work together.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Does Cloud Immutability Guarantee a Restore Point?\" \/>\n<meta property=\"og:description\" content=\"Cloud immutability strengthens cyber-resilience, but does it guarantee a restore point? Learn how backup software and immutable storage work together.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-25T00:39:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-25T01:48:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/shutterstock_2492224549.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Linus Chang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linus Chang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point\"},\"author\":{\"name\":\"Linus Chang\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3\"},\"headline\":\"Does Cloud Immutability Guarantee a Restore Point?\",\"datePublished\":\"2025-09-25T00:39:33+00:00\",\"dateModified\":\"2025-09-25T01:48:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point\"},\"wordCount\":1313,\"publisher\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/shutterstock_2492224549.jpg\",\"articleSection\":[\"BackupAssist Classic\",\"Cyber Resilience\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point\",\"name\":\"Does Cloud Immutability Guarantee a Restore Point?\",\"isPartOf\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/shutterstock_2492224549.jpg\",\"datePublished\":\"2025-09-25T00:39:33+00:00\",\"dateModified\":\"2025-09-25T01:48:04+00:00\",\"description\":\"Cloud immutability strengthens cyber-resilience, but does it guarantee a restore point? Learn how backup software and immutable storage work together.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point#primaryimage\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/shutterstock_2492224549.jpg\",\"contentUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/shutterstock_2492224549.jpg\",\"width\":1000,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sandbox.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Does Cloud Immutability Guarantee a Restore Point?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sandbox.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3\",\"name\":\"Linus Chang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g\",\"caption\":\"Linus Chang\"},\"description\":\"*Founder &amp; Creator, BackupAssist* Linus Chang has been writing software since he was eight years old. He founded BackupAssist in 2002 \u2014 making him one of the longest-standing voices in Windows backup and data protection \u2014 and has spent the decades since talking to IT administrators around the world about what actually goes wrong, and why. His interest in data loss isn't abstract. Early in his career, he was working at the Monash University help desk when a student came in with a floppy disk that wouldn't read. They tried everything. None of their drives could read it either. The disk held her entire PhD dissertation \u2014 years of work \u2014 and it was the only copy. She broke down in tears. There was nothing he could do. Five years later, he wrote the first version of BackupAssist. Linus holds a Bachelor of Science in Computer Science and has held Microsoft Certified Solution Developer and Sun Certified Java Programmer credentials. More recently, he has completed digital forensics and cyber-security courses through the Black Hat Conference. He has spoken on information security and cryptography at Infosecurity Europe, addressed politicians and policymakers at Australian Parliament House, presented to SMB IT administrators at the IT Pro Experts Conference, and served as a guest lecturer to Cyber Security master's students at the University of Melbourne. On this blog, Linus writes about backup strategy and the technical side of cyber-resilience \u2014 drawing on 24 years of product development and direct conversation with the IT professionals BackupAssist is built for. [Connect with Linus on LinkedIn](https:\/\/www.linkedin.com\/in\/linuschang\/)\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/author\/linus-chang\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Does Cloud Immutability Guarantee a Restore Point?","description":"Cloud immutability strengthens cyber-resilience, but does it guarantee a restore point? Learn how backup software and immutable storage work together.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point","og_locale":"en_US","og_type":"article","og_title":"Does Cloud Immutability Guarantee a Restore Point?","og_description":"Cloud immutability strengthens cyber-resilience, but does it guarantee a restore point? Learn how backup software and immutable storage work together.","og_url":"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point","og_site_name":"Cyber Resilience Blog","article_published_time":"2025-09-25T00:39:33+00:00","article_modified_time":"2025-09-25T01:48:04+00:00","og_image":[{"width":1000,"height":533,"url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/shutterstock_2492224549.jpg","type":"image\/jpeg"}],"author":"Linus Chang","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Linus Chang","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point#article","isPartOf":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point"},"author":{"name":"Linus Chang","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3"},"headline":"Does Cloud Immutability Guarantee a Restore Point?","datePublished":"2025-09-25T00:39:33+00:00","dateModified":"2025-09-25T01:48:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point"},"wordCount":1313,"publisher":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point#primaryimage"},"thumbnailUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/shutterstock_2492224549.jpg","articleSection":["BackupAssist Classic","Cyber Resilience"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point","url":"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point","name":"Does Cloud Immutability Guarantee a Restore Point?","isPartOf":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point#primaryimage"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point#primaryimage"},"thumbnailUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/shutterstock_2492224549.jpg","datePublished":"2025-09-25T00:39:33+00:00","dateModified":"2025-09-25T01:48:04+00:00","description":"Cloud immutability strengthens cyber-resilience, but does it guarantee a restore point? Learn how backup software and immutable storage work together.","breadcrumb":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point#primaryimage","url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/shutterstock_2492224549.jpg","contentUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/shutterstock_2492224549.jpg","width":1000,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/does-cloud-immutability-guarantee-a-restore-point#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sandbox.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"Does Cloud Immutability Guarantee a Restore Point?"}]},{"@type":"WebSite","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#website","url":"https:\/\/www.sandbox.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sandbox.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.sandbox.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3","name":"Linus Chang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g","caption":"Linus Chang"},"description":"*Founder &amp; Creator, BackupAssist* Linus Chang has been writing software since he was eight years old. He founded BackupAssist in 2002 \u2014 making him one of the longest-standing voices in Windows backup and data protection \u2014 and has spent the decades since talking to IT administrators around the world about what actually goes wrong, and why. His interest in data loss isn't abstract. Early in his career, he was working at the Monash University help desk when a student came in with a floppy disk that wouldn't read. They tried everything. None of their drives could read it either. The disk held her entire PhD dissertation \u2014 years of work \u2014 and it was the only copy. She broke down in tears. There was nothing he could do. Five years later, he wrote the first version of BackupAssist. Linus holds a Bachelor of Science in Computer Science and has held Microsoft Certified Solution Developer and Sun Certified Java Programmer credentials. More recently, he has completed digital forensics and cyber-security courses through the Black Hat Conference. He has spoken on information security and cryptography at Infosecurity Europe, addressed politicians and policymakers at Australian Parliament House, presented to SMB IT administrators at the IT Pro Experts Conference, and served as a guest lecturer to Cyber Security master's students at the University of Melbourne. On this blog, Linus writes about backup strategy and the technical side of cyber-resilience \u2014 drawing on 24 years of product development and direct conversation with the IT professionals BackupAssist is built for. [Connect with Linus on LinkedIn](https:\/\/www.linkedin.com\/in\/linuschang\/)","url":"https:\/\/www.sandbox.backupassist.com\/blog\/author\/linus-chang"}]}},"_links":{"self":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/20095","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=20095"}],"version-history":[{"count":7,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/20095\/revisions"}],"predecessor-version":[{"id":20115,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/20095\/revisions\/20115"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/20099"}],"wp:attachment":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=20095"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=20095"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=20095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}