3-2-1 has been the gold standard for data protection for decades. Most people have the first two copies. The third - offsite - is the one that saves you when the building burns down. This page explains the rule and shows you how to implement it with restic.
RAID is not backup. A second disk in the same machine is not offsite. A NAS in the same building is not offsite. Cloud sync (Dropbox, Google Drive) is not quite the same as backup - sync propagates deletions and ransomware encryption to the remote copy.
Real offsite backup means: immutable snapshots, physically separate location, encrypted with a key you control.
# Set up credentials
sudo tee /etc/restic/env <<EOF
RESTIC_REPOSITORY=sftp:vaultuser@vault.servercrate.net:22150:/data
RESTIC_PASSWORD=your-strong-password
EOF
sudo chmod 600 /etc/restic/env
source /etc/restic/env
restic init
# First offsite backup
restic backup /home /etc /var/www \
--tag offsite \
--exclude="*/cache" \
--exclude="*/tmp"
# Verify it worked
restic snapshots
A backup you have never tested is not a backup, it is a hope. Schedule a restore drill every 90 days. Restore a random file and verify it opens correctly. Restore a full directory to a temp location and check it. This takes 15 minutes and is worth more than any monitoring dashboard.
# Test restore of a specific file
restic restore latest \
--target /tmp/restore-test \
--include /etc/nginx/nginx.conf
cat /tmp/restore-test/etc/nginx/nginx.conf
Some people recommend 3-2-1-1-0: an additional immutable copy (1) with zero errors verified (0). Restic's restic check command handles the zero-errors verification. An append-only remote repository handles immutability - once written, old snapshots cannot be deleted even if an attacker gains access to your backup credentials.
The original 3-2-1 rule predates ransomware as a mainstream threat. Modern variants add a fourth requirement: at least one copy must be immutable or append-only, so ransomware that encrypts your primary data and local backup cannot also destroy the offsite copy.
Restic with ServerCrate provides strong isolation for the offsite copy - the vault is only writable via SFTP with your credentials, not mounted as a network drive or accessible via SMB. An attacker who compromises your primary machine cannot reach the vault without your SFTP credentials. This makes it a practical ransomware-resilient offsite component for most homelab and small business setups.
Having three copies means nothing if none of them are actually restorable. Schedule a restore test monthly: pick a random file from your most recent snapshot and restore it. Quarterly, do a full directory restore to a temporary location. The restic restore guide has copy-paste commands for every scenario. ServerCrate has no egress fees so testing costs you nothing beyond a few minutes of time.
The offsite piece. Free tier, no card required.
No egress fees, cancel anytime, 7-day money-back guarantee