{"id":435,"date":"2025-06-24T08:08:00","date_gmt":"2025-06-24T08:08:00","guid":{"rendered":"https:\/\/sreschool.com\/blog\/?p=435"},"modified":"2026-05-05T07:29:42","modified_gmt":"2026-05-05T07:29:42","slug":"backup-strategy-in-devsecops","status":"publish","type":"post","link":"https:\/\/sreschool.com\/blog\/backup-strategy-in-devsecops\/","title":{"rendered":"Backup Strategy in DevSecOps"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\"><strong>1. Introduction &amp; Overview<\/strong><\/h1>\n\n\n\n<h3 class=\"wp-block-heading\">\u2705 What is a Backup Strategy?<\/h3>\n\n\n\n<p>A <strong>Backup Strategy<\/strong> defines how data is copied and stored securely to ensure recovery in the event of data loss, corruption, or cyberattacks. It encompasses the frequency, tools, storage locations, and retention policies for backups.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83e\udded History &amp; Background<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>1970s\u20131980s:<\/strong> Tape-based backups became standard in data centers.<\/li>\n\n\n\n<li><strong>2000s:<\/strong> Introduction of disk-to-disk and snapshot-based backups.<\/li>\n\n\n\n<li><strong>2010s onward:<\/strong> Cloud-based, real-time, and immutable backups emerged, supporting DevOps and DevSecOps principles.<\/li>\n\n\n\n<li><strong>Now:<\/strong> Integration with CI\/CD pipelines, ransomware protection, and compliance-aligned backup strategies are vital for modern DevSecOps.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd10 Why Is It Relevant in DevSecOps?<\/h3>\n\n\n\n<p>In a DevSecOps framework, a backup strategy:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ensures <strong>business continuity<\/strong>.<\/li>\n\n\n\n<li>Protects against <strong>ransomware<\/strong> and <strong>insider threats<\/strong>.<\/li>\n\n\n\n<li>Meets <strong>compliance requirements<\/strong> (GDPR, HIPAA, etc.).<\/li>\n\n\n\n<li>Enables <strong>secure infrastructure automation<\/strong> and <strong>disaster recovery<\/strong> in fast-paced deployments.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>2. Core Concepts &amp; Terminology<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd11 Key Terms and Definitions<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Term<\/th><th>Definition<\/th><\/tr><\/thead><tbody><tr><td><strong>RTO (Recovery Time Objective)<\/strong><\/td><td>Maximum acceptable downtime after a failure.<\/td><\/tr><tr><td><strong>RPO (Recovery Point Objective)<\/strong><\/td><td>Maximum acceptable data loss in terms of time.<\/td><\/tr><tr><td><strong>Snapshot<\/strong><\/td><td>Point-in-time copy of data for quick restore.<\/td><\/tr><tr><td><strong>Immutable Backup<\/strong><\/td><td>Backup that cannot be modified or deleted during a retention period.<\/td><\/tr><tr><td><strong>Incremental Backup<\/strong><\/td><td>Only backs up data changed since the last backup.<\/td><\/tr><tr><td><strong>Full Backup<\/strong><\/td><td>Complete copy of all data, typically done weekly.<\/td><\/tr><tr><td><strong>Disaster Recovery (DR)<\/strong><\/td><td>A plan and set of procedures for recovering IT systems and data.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd04 How It Fits Into the DevSecOps Lifecycle<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Plan:<\/strong> Define backup policies aligned with business and compliance goals.<\/li>\n\n\n\n<li><strong>Develop:<\/strong> Integrate secure backup triggers in pipelines.<\/li>\n\n\n\n<li><strong>Build:<\/strong> Include artifacts in backup plans (e.g., binaries, container images).<\/li>\n\n\n\n<li><strong>Test:<\/strong> Validate backup integrity with test restores in CI pipelines.<\/li>\n\n\n\n<li><strong>Release\/Deploy:<\/strong> Backups before deployment to safeguard rollback.<\/li>\n\n\n\n<li><strong>Operate:<\/strong> Automate backup operations and monitor failures.<\/li>\n\n\n\n<li><strong>Monitor:<\/strong> Alert on backup job failures, anomalies, or storage issues.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>3. Architecture &amp; How It Works<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83e\udde9 Components of a Backup Strategy<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Source Systems:<\/strong> Applications, databases, infrastructure (VMs, containers).<\/li>\n\n\n\n<li><strong>Backup Agents\/Tools:<\/strong> Software to capture and transmit data.<\/li>\n\n\n\n<li><strong>Storage Backends:<\/strong> Cloud (S3, Azure Blob), on-premises, hybrid.<\/li>\n\n\n\n<li><strong>Scheduler\/Orchestrator:<\/strong> Defines backup frequency and retention policies.<\/li>\n\n\n\n<li><strong>Monitoring &amp; Alerting:<\/strong> Ensures visibility and proactive response.<\/li>\n\n\n\n<li><strong>Security Layer:<\/strong> Encryption, access controls, integrity checks.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd04 Internal Workflow<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Trigger:<\/strong> Scheduled or event-driven (e.g., post-deploy).<\/li>\n\n\n\n<li><strong>Snapshot\/Data Capture:<\/strong> Captures data from source systems.<\/li>\n\n\n\n<li><strong>Encryption:<\/strong> Encrypts data in-transit and at-rest.<\/li>\n\n\n\n<li><strong>Transfer:<\/strong> Sends to designated storage (cloud, on-prem).<\/li>\n\n\n\n<li><strong>Retention\/Prune:<\/strong> Older backups pruned based on policy.<\/li>\n\n\n\n<li><strong>Monitoring:<\/strong> Logs, alerts, and dashboards track status.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udcca Architecture Diagram (Descriptive)<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>+----------------+        +----------------+      +------------------+\n| Source Systems | -----&gt; | Backup Agents  | ---&gt; | Encrypted Backup |\n| (Apps, DBs)    |        | &amp; Orchestrator |      | Storage (Cloud)  |\n+----------------+        +----------------+      +------------------+\n                               |                        \u2191\n                          +---------+           +-------------+\n                          | Schedule| &lt;-------- | CI\/CD Hook  |\n                          +---------+           +-------------+\n<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd17 Integration Points with CI\/CD or Cloud Tools<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Tool<\/th><th>Integration Type<\/th><\/tr><\/thead><tbody><tr><td><strong>GitLab CI<\/strong><\/td><td>Pre\/post-deployment backup jobs<\/td><\/tr><tr><td><strong>GitHub Actions<\/strong><\/td><td>Automated triggers on release<\/td><\/tr><tr><td><strong>Jenkins<\/strong><\/td><td>Backup steps in pipeline stages<\/td><\/tr><tr><td><strong>Kubernetes<\/strong><\/td><td>VolumeSnapshot API, Velero integration<\/td><\/tr><tr><td><strong>AWS<\/strong><\/td><td>Backup via AWS Backup, S3, RDS Snapshots<\/td><\/tr><tr><td><strong>Azure<\/strong><\/td><td>Azure Recovery Services Vault<\/td><\/tr><tr><td><strong>GCP<\/strong><\/td><td>GCS, Persistent Disk Snapshots<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>4. Installation &amp; Getting Started<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83e\uddf0 Basic Setup or Prerequisites<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A cloud or on-prem storage target.<\/li>\n\n\n\n<li>Admin access to infrastructure and CI\/CD pipeline.<\/li>\n\n\n\n<li>Backup tools (e.g., Velero, Restic, AWS Backup, etc.).<\/li>\n\n\n\n<li>IAM roles\/permissions for secure access.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd27 Hands-on Example: Kubernetes + Velero (Open-source Backup Tool)<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code># Install Velero CLI\ncurl -L https:\/\/github.com\/vmware-tanzu\/velero\/releases\/download\/v1.12.3\/velero-v1.12.3-linux-amd64.tar.gz | tar -xz\n\n# Install Velero with AWS as backend\nvelero install \\\n    --provider aws \\\n    --bucket my-backup-bucket \\\n    --secret-file .\/credentials-velero \\\n    --backup-location-config region=us-east-1\n\n# Create a backup\nvelero backup create myapp-backup --include-namespaces myapp-namespace\n\n# Restore from backup\nvelero restore create --from-backup myapp-backup\n<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>5. Real-World Use Cases<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. \ud83c\udfe5 Healthcare (HIPAA Compliance)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Back up patient data before software updates.<\/li>\n\n\n\n<li>Immutable backups to avoid ransomware encryption.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">2. \ud83d\uded2 E-commerce (PCI-DSS)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Nightly snapshots of order databases.<\/li>\n\n\n\n<li>Backup before deploying promotions or sales events.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">3. \ud83d\ude80 SaaS Startup<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CI\/CD pipeline triggers backup of MongoDB and Postgres before major releases.<\/li>\n\n\n\n<li>Use GitHub Actions + AWS CLI for snapshot automation.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">4. \ud83c\udfe2 Financial Services<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use encrypted backups of containers and audit logs.<\/li>\n\n\n\n<li>Regular recovery testing as part of compliance drills.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>6. Benefits &amp; Limitations<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\u2705 Benefits<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data integrity &amp; business continuity<\/strong><\/li>\n\n\n\n<li><strong>Ransomware resilience<\/strong> with immutability<\/li>\n\n\n\n<li><strong>DevSecOps automation<\/strong> compatible<\/li>\n\n\n\n<li><strong>Regulatory compliance<\/strong> (GDPR, HIPAA, SOC2)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\u26a0\ufe0f Limitations<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cost overhead<\/strong> with high-frequency or full backups<\/li>\n\n\n\n<li><strong>Complex restoration<\/strong> in multi-cloud environments<\/li>\n\n\n\n<li><strong>Versioning limitations<\/strong> for some cloud storage services<\/li>\n\n\n\n<li><strong>Backup failures<\/strong> often go unnoticed without proper alerting<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>7. Best Practices &amp; Recommendations<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd10 Security Tips<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use <strong>end-to-end encryption<\/strong>.<\/li>\n\n\n\n<li>Apply <strong>least privilege<\/strong> IAM policies.<\/li>\n\n\n\n<li>Enable <strong>immutable backups<\/strong>.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\u2699\ufe0f Performance &amp; Maintenance<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Schedule <strong>off-peak<\/strong> backups.<\/li>\n\n\n\n<li>Monitor for <strong>latency and success rates<\/strong>.<\/li>\n\n\n\n<li>Use <strong>incremental<\/strong> where possible to save bandwidth.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udccf Compliance &amp; Automation<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Automate <strong>audit trail exports<\/strong>.<\/li>\n\n\n\n<li>Align retention policies with <strong>compliance mandates<\/strong>.<\/li>\n\n\n\n<li>Automate <strong>test restores<\/strong> in CI\/CD pipelines.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>8. Comparison with Alternatives<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Feature<\/th><th>Manual Scripts<\/th><th>Velero<\/th><th>AWS Backup<\/th><th>Restic<\/th><\/tr><\/thead><tbody><tr><td>CI\/CD Integration<\/td><td>\u274c<\/td><td>\u2705<\/td><td>\u2705<\/td><td>\u2705<\/td><\/tr><tr><td>Cloud Native Support<\/td><td>\u274c<\/td><td>\u2705<\/td><td>\u2705<\/td><td>\u2705<\/td><\/tr><tr><td>Immutable Backups<\/td><td>\u274c<\/td><td>\u2705<\/td><td>\u2705<\/td><td>\u2705<\/td><\/tr><tr><td>GUI Dashboard<\/td><td>\u274c<\/td><td>\u274c<\/td><td>\u2705<\/td><td>\u274c<\/td><\/tr><tr><td>Cost<\/td><td>Free<\/td><td>Free<\/td><td>Paid<\/td><td>Free<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udccc When to Choose Backup Strategy Over Others<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use <strong>Velero<\/strong> for Kubernetes workloads.<\/li>\n\n\n\n<li>Use <strong>AWS Backup<\/strong> if deeply integrated into AWS ecosystem.<\/li>\n\n\n\n<li>Use <strong>Restic<\/strong> for filesystem-level backups with encryption.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>9. Conclusion<\/strong><\/h2>\n\n\n\n<p>A robust <strong>backup strategy<\/strong> is a foundational pillar in <strong>DevSecOps<\/strong>, ensuring security, compliance, and business continuity. Whether you\u2019re operating in the cloud, on-prem, or hybrid, integrating backups into CI\/CD pipelines enhances resilience and speeds up incident response.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. Introduction &amp; Overview \u2705 What is a Backup Strategy? A Backup Strategy defines how data is copied and stored [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-435","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Backup Strategy in DevSecOps - SRE School<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sreschool.com\/blog\/backup-strategy-in-devsecops\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Backup Strategy in DevSecOps - SRE School\" \/>\n<meta property=\"og:description\" content=\"1. Introduction &amp; Overview \u2705 What is a Backup Strategy? A Backup Strategy defines how data is copied and stored [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sreschool.com\/blog\/backup-strategy-in-devsecops\/\" \/>\n<meta property=\"og:site_name\" content=\"SRE School\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-24T08:08:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-05T07:29:42+00:00\" \/>\n<meta name=\"author\" content=\"priteshgeek\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"priteshgeek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sreschool.com\/blog\/backup-strategy-in-devsecops\/\",\"url\":\"https:\/\/sreschool.com\/blog\/backup-strategy-in-devsecops\/\",\"name\":\"Backup Strategy in DevSecOps - SRE School\",\"isPartOf\":{\"@id\":\"https:\/\/sreschool.com\/blog\/#website\"},\"datePublished\":\"2025-06-24T08:08:00+00:00\",\"dateModified\":\"2026-05-05T07:29:42+00:00\",\"author\":{\"@id\":\"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db\"},\"breadcrumb\":{\"@id\":\"https:\/\/sreschool.com\/blog\/backup-strategy-in-devsecops\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sreschool.com\/blog\/backup-strategy-in-devsecops\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sreschool.com\/blog\/backup-strategy-in-devsecops\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sreschool.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Backup Strategy in DevSecOps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sreschool.com\/blog\/#website\",\"url\":\"https:\/\/sreschool.com\/blog\/\",\"name\":\"SRESchool\",\"description\":\"Master SRE. Build Resilient Systems. Lead the Future of Reliability\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sreschool.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db\",\"name\":\"priteshgeek\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/sreschool.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g\",\"caption\":\"priteshgeek\"},\"url\":\"https:\/\/sreschool.com\/blog\/author\/priteshgeek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Backup Strategy in DevSecOps - SRE School","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sreschool.com\/blog\/backup-strategy-in-devsecops\/","og_locale":"en_US","og_type":"article","og_title":"Backup Strategy in DevSecOps - SRE School","og_description":"1. Introduction &amp; Overview \u2705 What is a Backup Strategy? A Backup Strategy defines how data is copied and stored [&hellip;]","og_url":"https:\/\/sreschool.com\/blog\/backup-strategy-in-devsecops\/","og_site_name":"SRE School","article_published_time":"2025-06-24T08:08:00+00:00","article_modified_time":"2026-05-05T07:29:42+00:00","author":"priteshgeek","twitter_card":"summary_large_image","twitter_misc":{"Written by":"priteshgeek","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sreschool.com\/blog\/backup-strategy-in-devsecops\/","url":"https:\/\/sreschool.com\/blog\/backup-strategy-in-devsecops\/","name":"Backup Strategy in DevSecOps - SRE School","isPartOf":{"@id":"https:\/\/sreschool.com\/blog\/#website"},"datePublished":"2025-06-24T08:08:00+00:00","dateModified":"2026-05-05T07:29:42+00:00","author":{"@id":"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db"},"breadcrumb":{"@id":"https:\/\/sreschool.com\/blog\/backup-strategy-in-devsecops\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sreschool.com\/blog\/backup-strategy-in-devsecops\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sreschool.com\/blog\/backup-strategy-in-devsecops\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sreschool.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Backup Strategy in DevSecOps"}]},{"@type":"WebSite","@id":"https:\/\/sreschool.com\/blog\/#website","url":"https:\/\/sreschool.com\/blog\/","name":"SRESchool","description":"Master SRE. Build Resilient Systems. Lead the Future of Reliability","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sreschool.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Person","@id":"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db","name":"priteshgeek","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/sreschool.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g","caption":"priteshgeek"},"url":"https:\/\/sreschool.com\/blog\/author\/priteshgeek\/"}]}},"_links":{"self":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts\/435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/comments?post=435"}],"version-history":[{"count":1,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts\/435\/revisions"}],"predecessor-version":[{"id":436,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts\/435\/revisions\/436"}],"wp:attachment":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/media?parent=435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/categories?post=435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/tags?post=435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}