This ultimately depends upon the backup vendor and the methods employed with their solution. It also depends if you intend to deploy and operate the solution yourself or have it delivered by a 3rd party supplier. For example, you might choose to use Azure Site Recovery. This solution works best, in the context of meeting security compliance standards when deployed across an Express Route and when the ASR and vaults are located in an isolated tenancy. This provides you with an air-gapped cloud backup repo and ensures that the backup images are transported across a secure link, which then also maintains immutability. Veeam offers a similar solution though the cloud repo is either delivered by a 3rd party or you build one yourself. Some other vendors offer similar setups but the concern is always around immutability and air gapping as well as the security of the data in transit.
Cloud backup is a method of safeguarding data by storing its backups in a cloud computing environment. The purpose is to shield the data from physical damage, corruption, or loss. Cloud backup solutions bring several advantages over traditional on-premises backup systems, such as scalability, reliability, and ease of use.
This ultimately depends upon the backup vendor and the methods employed with their solution. It also depends if you intend to deploy and operate the solution yourself or have it delivered by a 3rd party supplier. For example, you might choose to use Azure Site Recovery. This solution works best, in the context of meeting security compliance standards when deployed across an Express Route and when the ASR and vaults are located in an isolated tenancy. This provides you with an air-gapped cloud backup repo and ensures that the backup images are transported across a secure link, which then also maintains immutability. Veeam offers a similar solution though the cloud repo is either delivered by a 3rd party or you build one yourself. Some other vendors offer similar setups but the concern is always around immutability and air gapping as well as the security of the data in transit.