Cyber Recovery

Building Ransomware Resilience with Elastio and AWS Backup Logically Air-Gapped Vault

Date Published

By Eswar Nalamaru, Product Manager – Elastio, and Sabith Venkitachalapathy, Solutions Architect – AWS Data Protection Services

Today's large enterprises face significant cybersecurity risks, including ransomware and advanced threats that can compromise critical data. To protect against these, organizations need secure, isolated backups that can be quickly recovered. However, traditional methods for creating these backups are often too complex and expensive for large-scale use. This leaves many companies vulnerable to data loss and business disruptions. This blog post examines how AWS Backup's logically air-gapped vault feature offers a practical solution for creating secure, scalable backups to enhance cyber-resilience.

The AWS Backup logically air-gapped vault is a highly secure storage construct that logically isolates backups and encrypts them using AWS-owned keys, providing an additional layer of protection. Furthermore, the vault's integration with AWS Resource Access Manager (RAM) allows for easy and controlled sharing across multiple AWS accounts, enabling faster recovery times and minimizing Recovery Time Objectives (RTOs) while maintaining strict security measures.

AWS Backup logically air-gapped vaults significantly enhance recovery capabilities, but their effectiveness ultimately depends on the quality of the stored backups. In light of the recent surge in ransomware attacks, which have targeted backups in 94% of cases last year [Sophos], maintaining backup integrity has become more crucial than ever. By implementing Logically Air-Gapped Vaults, organizations can better protect their backups from potential corruption that might otherwise go undetected. This proactive approach ensures that the data remains reliable and usable when recovery is needed, potentially saving organizations from increased recovery costs and operational disruptions.

Many organizations face the challenge of confirming whether their immutable backups are clean and ready for recovery. Elastio addresses this urgent need by inspecting backup data for ransomware, ensuring that businesses always have a recent, verified, clean copy of their data for rapid restoration. Elastio acts as a last layer of defense by ensuring that your backups are always reliable during ransomware attacks and that you always have a clean copy of the data. Previously, Elastio integrated with AWS Backup to protect your EC2 and EBS Recovery points. With the new version of Elastio, you can scan your EC2, EBS, EFS, S3, and VMware Recovery Points. Further, it integrates with AWS Backup Restore testing to monitor your Recovery Points in Logically Air-Gapped Vaults.

AWS Backup Logically Air-Gapped Vaults and Ransomware Recovery

To utilize Logically Air-Gapped Vaults, configure AWS Backup's Backup Plans within your Workload Account to copy backups to the Logically Air-Gapped Vault. Once activated, the Backup Plan automatically transfers backups from the Local Vault to the Logically Air-Gapped Vault.

AWS Backup allows customers to share Recovery Points stored in Logically Air-Gapped Vaults with a designated Recovery Account. To enable cross-account access, use AWS Resource Access Manager (RAM) to share a Logically Air-Gapped Vault with other AWS accounts, including those across different organizations. This powerful sharing capability ensures that backups stored in the Logically Air-Gapped Vault can be swiftly and reliably restored from any authorized shared account, enhancing disaster recovery readiness and operational flexibility.

Logically Air-Gapped Vaults are encrypted using AWS-owned encryption keys. So, Elastio cannot mount the backups of EC2 and EBS directly from Logically Air-gapped Vaults. So, the Recovery Points can be scanned before going to Logically Air-gapped Vaults or restoring Recovery Points from the Logically Air-gapped Vaults.

How Elastio works with AWS Backup Logically Air-Gapped Vaults

Elastio offers flexible deployment options to cater to varying customer requirements, but two primary approaches are commonly used to inspect backups stored in AWS LAG Vaults.

Approach 1: Scan backups in the Workload Account before they reach theLogically Air-GappedVault

Elastio can be deployed in the Workload Account to inspect backups before copying them to the Logically Air-Gapped Vault. This approach allows Elastio to detect ransomware earlier in the attack cycle, identifying threats in your data before they reach the Logically Air-Gapped Vault.

  1. AWS Backup creates a recovery point in an AWS Backup Vault for an Amazon EC2 instance in the AWS account.
  2. Recovery Point creation triggers Amazon EventBridge.
  3. A Lambda function is triggered on the event and checks if the recovery point is tagged with “elastio:action=scan.”
  4. If the recovery point is tagged, the Lambda triggers Elastio scans.

Steps to protect backups before moving to Logically Air-Gapped Vaults:

  1. Deploy Elastio in the Workload account with a CloudFormation Template.
  2. Deploy the CLoudFormation Template in the workload accounts to add tags to AWS Backup Recovery Points. Note that this step is required to protect EC2 Recovery points, as AWS Backup does not pass the metadata of the volumes to the Logically Air-Gapped Vaults. It will be challenging to correlate the volumes in the Elastio Console without this.
  • Go to CloudFormation in AWS and click “Create Stack with new resources.”
  • In Step 1, choose “Upload a template file”, upload the YAML file, and click Next
  • In Step 2, give the name for the stack and click Next by leaving everything default.
  • In Step 3, leave everything default and click Next. In Step 4, acknowledge at the bottom of the screen and click “Submit.”
  1. Add "elastio:action=scan" in the source account AWS Backup Plan.
  • Go to AWS Backups and click the “Create backup plan” button.
  • On the Backup Plan creation page, set a plan, and at the bottom of the page, add elastio:action=scan to the “Tags added to the recovery points – optional” section, as shown in the screenshot below. Click “Create Plan”.
  • Once the plan is created, all the recovery points created with this backup plan are automatically scanned by Elastio.

Elastio scans EC2 and EBS AWS Backup Recovery Points created by AWS Backup. To scan S3 and EFS Recovery points, Elastio scans the Recovery Points as part of a restore test plan.

Approach 2: Scan the backups within theLogically Air-GappedVault

Elastio can scan backups once they are stored in the Logically Air-Gapped Vault, offering a more centralized solution by inspecting backups from multiple workload accounts in one location.

By sharing the Logically Air-Gapped Vault with a Recovery Account through AWS Resource Access Manager (RAM), organizations can inspect backups as part of a Restore Test process, ensuring that recovery points are clean before restoration.

  1. AWS Backup creates a recovery point in a Local Vault for an Amazon EC2 instance in the AWS account.
  2. The recovery point is copied from the Local Vault to the Logically Air-Gapped Vault.
  3. The Logically Air-Gapped Vault is shared with the Recovery Account using AWS Resource Access Manager to perform Restore Testing. Detailed instructions on sharing the recovery points are available in the blog: Introducing AWS Backup logically air-gapped vault.
  4. Perform a restore in the Recovery account via AWS Backup Restore Testing.
  5. An Amazon EventBridge event is triggered when the restore is completed.
  6. A Lambda function is triggered on the event and looks if the recovery point is tagged with “elastio:restore-test=scan.”
  7. If the recovery point is tagged, the Lambda triggers Elastio scans.
  8. The scan results are sent back to AWS Backup restore testing.

Steps to protect backups in Logically Air-Gapped Vaults:

  1. Deploy Elastio in the Recovery account with a CloudFormation Template.
  2. Deploy the CloudFormation Template in the workload accounts to add tags to AWS Backup Recovery Points. Note that this step is required to protect EC2 Recovery Points, as AWS Backup does not pass the metadata of the volumes to the Logically Air-Gapped Vaults. It will be easier to correlate the volumes in the Elastio Console with this.
  • Go to CloudFormation in AWS and click “Create Stack with new resources.”
  • In Step 1, choose “Upload a template file”, upload the YAML file, and click Next
  • In Step 2, give the name for the stack and click Next by leaving everything default
  • In Step 3, leave everything default and click Next. In Step 4, acknowledge at the bottom of the screen and click “Submit.”
  1. Add "elastio:action=scan" in the source account AWS Backup Plan.
  • On the Backup Plan creation page, set a plan, and at the bottom of the page, add elastio:action=scan to the “Tags added to the recovery points – optional” section, as shown in the screenshot below. Click “Create Plan”.
  • Once the plan is created, all the recovery points created with this backup plan are automatically scanned by Elastio.

Elastio scans EC2 and EBS AWS Backup Recovery Points created by AWS Backup. To scan S3 and EFS Recovery points, Elastio scans the Recovery Points as part of a restore test plan.

  1. Deploy the CFN to integrate Elastio with the AWS Backup Restore Testing. This CFN allows Elastio to scan recovery points as the ransomware protection step of the restore testing process.
  • Go to CloudFormation in AWS and click “Create Stack with new resources.”
  • In Step 1, choose "Amazon S3 URL", paste the link, and click "Next."
  • In Step 2, give the name for the stack and click Next by leaving everything default.
  • In Step 3, leave everything default and click Next. In Step 4, acknowledge at the bottom of the screen and click “Submit.”
  1. Add "elastio:restore-test=scan" in the source account AWS Backup's Backup Plan. Elastio automatically scans recovery Points with these tags as part of restore testing.
  • Go to AWS Backup and click the “Create backup plan” button.
  • On the Backup Plan creation page, set a plan, and at the bottom of the page, add elastio:restore-test=scan to the "Tags added to the recovery points – optional" section, as shown in the screenshot below. Click "Create Plan".

Once the plan is created, all the recovery points created with this backup plan are automatically scanned by Elastio.

Conclusion

While AWS Backup Logically Air-Gapped Vaults provide secure storage, Elastio is the critical component that transforms this infrastructure into a truly resilient ransomware defense. By intelligently scanning and validating backups, Elastio enables organizations to confidently identify clean recovery points – a capability essential for effective cyber recovery. Without Elastio's powerful ransomware protection technology, enterprises cannot know that their securely stored backups are usable recovery points, exposing organizations to the devastating impacts of ransomware attacks.

Recover With Certainty

See how Elastio validates every backup across clouds and platforms to recover faster, cut downtime by 90%, and achieve 25x ROI.

Related Articles
An open bank vault door
Elastio Software,  Ransomware,  Cyber Recovery
December 5, 2025

AI-Ready & Ransomware-Proof FSx for NetApp ONTAP Amazon FSx for NetApp ONTAP (FSxN) has become the gold standard for high-performance cloud storage, combining the agility of AWS with the data management power of NetApp. Today, this infrastructure is more critical than ever. As unstructured data volumes explode and enterprises race to feed Generative AI models, FSxN has evolved into the engine room for innovation. It holds the massive datasets that fuel your AI insights and drive business logic. You cannot build trusted AI on unverified data FSxN delivers the trusted, high-performance platform your enterprise relies on. But true trust requires more than uptime—it requires integrity. As enterprise architectures evolve, so do the threats targeting them. The sheer scale of unstructured data creates a massive blind spot where ransomware can hide, silently corrupting data over weeks. If the data residing on your trusted storage is compromised, your AI models are being trained on poisoned assets. The Imperative: Verified Data for Trusted AI Today, Elastio is introducing comprehensive Ransomware Recovery Assurance for Amazon FSx for NetApp ONTAP. We now provide a layered defense that validates the integrity of the data within your primary volumes, SnapMirror replicas, and AWS Backups, ensuring that your storage is not just available, but provably clean. The Three-Tier Defense for FSxN To understand where Elastio fits, we must look at the modern FSxN protection architecture. A resilient implementation typically relies on three layers : Primary Filer: Your active, high-performance workload.SnapMirror Replica: A near-real-time, read-only copy used for disaster recovery with low RPOs (e.g., 5 minutes).AWS Backup: A daily recovery point for long-term retention and compliance. Until now, verified recoverability across these layers was a blind spot. Elastio eliminates that uncertainty by integrating with the entire chain to validate data integrity before a crisis occurs. The Risk of Silent Corruption Ransomware attacks frequently begin subtly, bypassing perimeter defenses and modifying data blocks without triggering immediate alerts. If these corrupted blocks are replicated to your SnapMirror destination or archived into your AWS Backup vault, you aren't preserving your business—you are preserving the attack. Just having backups is not enough. To ensure resilience, you must answer three questions about your recovery points : Are they safe?Are they intact?Are they recoverable? Introducing Elastio Recovery Assurance for FSxN Elastio delivers agentless, automated verification for FSxN environments. Our platform connects to your infrastructure to perform deep-file inspection, providing : Behavioral Ransomware Detection: We identify encryption patterns that signature-based tools miss, including slow-rolling and obfuscated encryption.Insider Threat Detection: We detect malicious tampering or unauthorized encryption driven by compromised credentials.Corruption Validation: We identify unexpected data corruption that could render a backup unusable during a restore. This coverage spans the entire lifecycle. Elastio scans your SnapMirror replicas for immediate RPO validation and utilizes AWS Restore Testing to validate your AWS Backups without rehydrating production data. Complementing NetApp’s Native Defenses Elastio is designed to work with your existing security stack, not replace it. NetApp’s native Autonomous Ransomware Protection (ARP) is an excellent first line of defense, monitoring your production environment for suspicious activity in real-time. Elastio complements ARP by operating beyond the production path. We focus on the recovery chain, performing deep-dive analysis on your backups and replicas. If ARP flags a potential threat in production, Elastio allows you to instantly identify which historical recovery point is clean, verifiable, and safe to restore . Compliance: From "Prevention" to "Proof" Regulatory pressure is shifting. Frameworks like DORA, NYDFS, HIPAA, and PCI-DSS are moving away from simple backup retention mandates toward requirements for demonstrable recovery integrity. Auditors and cyber insurers no longer accept "we have backups" as an answer. They require proof that those backups can be restored. Elastio automates this reporting, providing a validated inventory of clean snapshots that satisfies the most stringent compliance and risk requirements. Recommended Architecture for Provable Recovery To achieve maximum resilience with FSxN, we recommend the following layered approach : Replicate: Use SnapMirror to maintain a secondary copy with a 5-minute RPO.Retain: Use AWS Backup to enforce retention policies.Validate:Run Elastio Hourly Scans on SnapMirror replicas to catch infection early.Run Elastio Restore Tests monthly on AWS Backups to verify your vault. Conclusion In the current threat landscape, ransomware is not a matter of if, but when. Your data is only protected if it can be recovered. With Elastio’s new support for Amazon FSx for NetApp ONTAP, you can move beyond checking a backup box and gain true recovery assurance. In just minutes per TB, you will know if your data is clean or compromised, and be ready to recover with confidence. 3 Key Takeaways AI Integrity Requires Clean Data As FSxN drives generative AI and unstructured data growth, silent corruption becomes a critical risk. Elastio prevents "poisoned" datasets by detecting corruption inside the storage layer.End-to-End Validation Elastio secures the entire FSxN lifecycle, providing deep inspection and clean recovery verification for primary volumes, SnapMirror replicas, and AWS Backups.The "Production and Recovery" Defense Elastio operates outside the production path to complement NetApp’s Autonomous Ransomware Protection (ARP), validating snapshots to ensure you always have a safe place to restore from.

Elastio Software,  Ransomware,  Cyber Recovery
December 5, 2025

The Immutability Blind Spot AWS Logically Air-Gapped (LAG) Vaults are a massive leap forward for cloud recovery assurance. They provide the isolation and immutability enterprises need to survive catastrophic cyber events. But immutability has a dangerous blind spot: it doesn’t distinguish between clean data and corrupted data. If ransomware encrypts your production environment and those changes replicate to your backup snapshots before they are moved to the vault, you are simply locking the malware into your gold-standard recovery archive. You aren’t preserving your business; you’re preserving the attack. Today, Elastio has closed that gap. We introduced a new integration with AWS LAG that ensures only provably clean recovery points enter your immutable vault. By combining our deep-file inspection with a new Automated Quarantine Workflow, we prevent infected data from polluting your recovery environment. The Risk: "Immutable Garbage In, Immutable Garbage Out" The core principle of modern resilience is simple: Immutable storage isn't enough—data integrity must be proven. Ransomware attackers are evolving. They no longer just encrypt production data; they target backup catalogs and leverage "slow burn" encryption strategies to corrupt snapshots over weeks or months. Standard signature-based detection tools often miss these storage-layer attacks because they are looking for executable files, not the mathematical signs of entropy and corruption within the data blocks themselves. If you copy an infected recovery point into an AWS LAG Vault and lock it with a compliance retention policy, you create a restoration loop: every time you attempt to recover, you re-infect the environment. The Elastio Solution: Verify, Then Vault Elastio has updated its recovery assurance platform to act as that gatekeeper. We utilize machine learning-powered ransomware encryption detection models designed specifically to catch advanced strains, including slow encryption, striped encryption, and obfuscated patterns. Here is the new workflow for AWS LAG customers: Ingest & Inspection: As workload backups or snapshots are generated, Elastio automatically inspects the data for signs of ransomware encryption and corruption.The Decision Engine: Based on the inspection results, the workflow forks immediately:Path A: The Clean Path. If the data is verified as clean, it is routed to the customer’s Immutable LAG Vault. Once there, it undergoes automated recovery testing on a set schedule to prove recoverability.Path B: The Infection Path. If data is flagged as infected, it is blocked from entering the clean LAG vault. Instead, the compromised snapshot is automatically routed to a Quarantine Vault, which can itself be configured as a separate Logically Air-Gapped Vault. Optionally, Elastio can trigger the deletion of the local copy immediately after the move to either the clean or quarantine vault is complete, eliminating the need to maintain local retention. Why This Matters for the Enterprise For CISOs, Cloud Architects, and Governance teams, this workflow shifts the posture from "hopeful" to "provable." Audit-Ready Compliance: Whether you are dealing with NYDFS, HIPAA, or cyber insurance requirements, you can now prove that your immutable archives are free of compromise.Reduced Incident Response Time: By automatically segregating infected data, IR teams don't have to waste time shifting through thousands of snapshots to find a clean version. Elastio points you directly to the last clean copy and the first infected copy.Cost Control: You stop paying for premium, immutable storage on data that is useless for recovery. Real-World Value Elastio delivers outcome-driven security. With this update, we provide: Provable Recovery: You don’t just think your backups will work; you have a verified, clean report to prove it.Ransomware Impact Detection: Identify the exact moment of infection to minimize data loss (RPO).Integrity Assurance: Validate that no tampering has occurred within the data before it becomes immutable. Take Control of Your Recovery Don't let your backup vault become a ransomware repository. Ensure that every recovery point stored in AWS LAG is verified, validated, and clean. 3 Key Takeaways Immutability != Integrity Locking unverified data creates a "restoration loop" where ransomware is preserved alongside your critical assets.The "Verify-Then-Vault" Gatekeeper Elastio sits upstream of your AWS LAG Vault, inspecting every recovery point. Only verified clean data is allowed to enter your gold-standard archive, ensuring it remains uncompromised.Automated Quarantine Infected snapshots are instantly routed to a secure Quarantine Vault for forensic analysis, isolating threats without contaminating your clean recovery environment or slowing down response teams.

Best Way to Protect from Ransomware
Elastio Software,  Ransomware,  Cyber Recovery
November 20, 2025

Scan Backups with Amazon GuardDuty Malware Protection for AWS Backup Cybersecurity teams are under pressure: attackers are faster, stealthier, and increasingly targeting backups. Amazon’s announcement of GuardDuty Malware Protection for AWS Backup is an important step forward for cloud security teams. But while detection is essential, detection alone does not equal ransomware readiness. This is where the Elastio and GuardDuty integration becomes a force multiplier. From Alerts to Ransomware Readiness Security leaders understand this: alerts tell you what is happening, but they do not guarantee you can survive what happens next. Modern adversaries: Bypass prevention controlsEncrypt backupsHide inside trusted servicesLeave your environment looking healthy while recovery points are already corrupted With the new integration: GuardDuty detects anomalies, malware, compromised credentials, and suspicious API behaviorElastio responds automatically by scanning data for corruption, ransomware encryption, and malwareCompromised data is quarantinedClean recovery points are validated and preservedFindings are pushed to Security Hub, IR platforms, or SOAR workflows Elastio converts threat alerts into recovery assurance. You do not simply know something bad happened; you know your last clean copy is safe. What It Means for Your Security Teams GuardDuty provides threat visibility: It detects suspicious behaviors across S3, EC2, EBS, IAM, and other AWS services.Elastio provides proof of survivability: It verifies that your data is intact, unencrypted, unmodified, and recoverable. For Incident Response Teams Compromised data is automatically quarantinedElastio identifies the last known clean restore pointFile level forensics and malware details are surfaced instantlyTeams can investigate safely before triggering recovery For CISOs and CIOs A continuous security control that proves ransomware readinessIndependent validation that backups meet compliance, governance, and cyber insurance expectationsReduction in downtime by more than 90 percentRealizable 10 to 25 times ROI through faster, cleaner recovery This turns backup validation into a measurable resilience metric rather than a hope. Executive Summary Customer Pain: Security teams can detect threats, but they cannot tell if backups have already been corrupted. This forces IR teams and CISOs to guess about recovery integrity, slows down response, increases downtime, and creates compliance and audit gaps. Value Proposition:The GuardDuty and Elastio integration turns every detection event into automated recovery assurance. GuardDuty identifies suspicious behavior and Elastio validates the data integrity. Then, compromised data is quarantined, clean recovery points are verified, and detailed evidence is pushed to Security Hub and IR systems. IR teams gain clear, file-level intelligence and a confirmed clean restore point. CISOs receive continuous dashboards that prove recovery readiness, SLA compliance, and audit-ready documentation. Outcome: Customers move from “we detected something” to “we know exactly what is safe to recover and what to do.” This reduces downtime, eliminates recovery guesswork, strengthens compliance, and provides measurable resilience against ransomware.