Cyber storage and DORA: Why true backup is central to operational resilience 

ComplianceOctober 29, 2025 | 4 minutesBy Mikkel Oxfeldt

The Digital Operational Resilience Act (DORA) is now in force across the European Union, setting a new standard for how financial institutions manage ICT (information and communication technology) risk and ensure operational resilience.

DORA doesn’t just encourage resilience — it mandates it. For banks, insurers, investment firms, and other regulated entities, that means proving the ability to recover data quickly, completely, and securely after a disruption.

Yet not all “backups” meet that bar. Many organizations still rely on cloud snapshots or synchronized copies stored in the same logical infrastructure as production data. These may offer convenience, but they fall short of the true backup principles that DORA implies — especially around separation, immutability, and verifiable recovery.

At the heart of those principles is control: the ability to retain authority over your own data, regardless of what happens. This is where cyber storage becomes essential — not merely storing data but protecting it according to the resilience standards DORA now enforces.

What DORA actually requires 

DORA doesn’t mention “cyber storage” by name, but its language — particularly in Article 12 — sets clear expectations that align with cyber storage fundamentals. Among the key provisions are:

  • Organizations must establish backup systems governed by formal backup policies, including periodic testing and documented recovery procedures. 
  • Backup systems must be physically and logically segregated from the production ICT systems they protect. 
  • Restorations must preserve the integrity and confidentiality of data, with multiple checks and reconciliations to ensure accuracy. 
  • Recovery time and recovery point objectives (RTOs and RPOs) must be appropriate for critical functions and achievable even under severe disruption.

In short, DORA enforces a high bar: Backups must be resilient, verifiable, isolated, and capable of restoring operations safely and swiftly.

From backup to true backup 

The term backup is widely used, but not always accurately. A synchronized copy in the same cloud or a versioned snapshot inside the same tenant is not a true backup. If a ransomware attack, cloud outage, or credential compromise affects your production environment, these copies are often just as vulnerable. Under DORA, that’s no longer acceptable.

A compliant backup must be physically and logically segregated from the production system

A compliant backup must be physically and logically segregated from the production system — and this is precisely the design principle behind true backup and the 3-2-1 rule: Three copies of data, on two different media, with one stored offsite.

In a SaaS and cloud-first world, this “offsite” element translates to independent infrastructure — an isolated environment built for immutability and recovery assurance, often referred to as air gapping. It also ensures that organizations stay in control of their data at all times — able to access, restore, and verify it independently, without relying on the same systems that might have failed.

That’s what defines cyber storage: a modern, purpose-built approach to backup that eliminates shared-risk dependencies and ensures that data remains recoverable, even when everything else fails.

It’s designed to be a proactive defense against threats like ransomware by embedding security measures such as immutability, anomaly detection, and access controls directly into the storage system itself. 

Mikkel Oxfeldt is General Counsel, Attorney-at-law at Keepit. He started his career in private practice in 1999 advising IT-services providers and Telecoms and has been individually named in Legal 500. Later moved inhouse having various roles ranging from medium-sized scaleups to large, listed businesses. Mikkel has built the legal department at Keepit with the mantra of providing commercially sound legal advice in a timely fashion. Mikkel joined Keepit in 2020 together with the A-round funding from One Peak Partners.

How cyber storage delivers on DORA’s backup standards

The connection between DORA and cyber storage lies in the shared goal of resilience through independence. Where DORA establishes the why, cyber storage delivers the how

DORA principleCyber storage capabilityOutcome
Physical and logical segregation (Art. 12.3)Independent, vendor-neutral cloud separated from production infrastructure Prevents shared-risk exposure and cross-impact from production failures 
Integrity and tamper resistance (Art. 12.7) Immutable storage and cryptographically linked versioningProtects data from deletion, corruption, or malicious alteration
Timely recovery and RTO/RPO assurance (Art. 12.6)Granular, instant restore optionsEnables rapid operational recovery and business continuity
Regular testing and auditability (Art. 12.2)Built-in monitoring, anomaly detection, and full restore loggingDemonstrates compliance and recovery confidence

Cyber storage and DORA: Why true backup is central to operational resilience 

ComplianceOctober 29, 2025 | 4 minutesBy Mikkel Oxfeldt

Cyber storage embodies what DORA envisions — a secure, independent layer of resilience that safeguards data regardless of where the threat originates.

Common pitfalls under DORA 

Many organizations meet pitfalls as they work to meet DORA’s requirements, not because the regulation is unclear, but because their backup strategies don’t yet align with its expectations. Typical issues include:

  • Backups hosted in the same hyperscaler as production, failing to meet the data segregation requirement
  • Replicated systems that inherit the same permissions or security flaws as the primary environment
  • Backups that can be deleted, modified, or encrypted — intentionally or accidentally — lack immutability by default
  • Infrequent or unverified restore testing

Under DORA, these weaknesses translate into regulatory and operational risk. A true backup strategy eliminates them through independent infrastructure, immutability, and verifiable recoverability — the cornerstones of cyber storage.

Putting it into practice 

Building DORA-aligned resilience doesn’t start with compliance checklists — it starts with architecture. Organizations should:

  • Adopt independent, vendor-neutral storage for all critical SaaS application data. 
  • Ensure immutability by design to protect against alteration or deletion. 
  • Test restorations regularly and document the results. 
  • Maintain full audit trails and access logs. 
  • Integrate anomaly detection and continuous monitoring to identify threats early. 
  • Align RTO and RPO targets with business-critical services.

This approach transforms backup from an operational afterthought into an enabler of resilience — and proof to support compliance.

Conclusion: DORA codifies the principles of cyber storage 

DORA doesn’t need to use the term cyber storage — its requirements already describe it.


By mandating data segregation, immutability, and verifiable recovery, the regulation effectively codifies the very foundations of modern, intelligent backup design.

For organizations aiming to strengthen resilience and demonstrate compliance, the goal isn’t simply to have backups. It’s to have true backup — independently stored, immutable, and ready to recover when it matters most, keeping you in control of your data.

 

Learn more about how independent, immutable backup supports DORA compliance.

Get the DORA factsheet

Mikkel Oxfeldt is General Counsel, Attorney-at-law at Keepit. He started his career in private practice in 1999 advising IT-services providers and Telecoms and has been individually named in Legal 500. Later moved inhouse having various roles ranging from medium-sized scaleups to large, listed businesses. Mikkel has built the legal department at Keepit with the mantra of providing commercially sound legal advice in a timely fashion. Mikkel joined Keepit in 2020 together with the A-round funding from One Peak Partners.