Blog Post

Azure SQL Blog
2 MIN READ

Azure SQL Database LTR Backup Immutability is now Generally Available

Dinakar-Nethi's avatar
Dinakar-Nethi
Icon for Microsoft rankMicrosoft
Nov 19, 2025

Azure SQL Database is a fully managed, always‑up‑to‑date relational database service built for mission‑critical apps. It delivers built‑in high availability, automated backups, and elastic scale, with strong security and compliance capabilities. 

Today, I am very excited to announce the General Availability of immutability for Azure SQL DB LTR backups!

Azure SQL Database now supports immutable long‑term retention (LTR) backups, stored in write‑once, read‑many (WORM) state for a fixed (customer configured) period. That means your LTR backups cannot be modified or deleted during the lock window—even by highly privileged identities—helping you preserve clean restore points after a cyberattack and strengthen your compliance posture. 

Why this matters: ransomware targets backups

Modern ransomware playbooks don’t stop at encrypting production data—they also attempt to alter or delete backups to block recovery. With backup immutability, Azure SQL Database LTR backups are written to immutable storage and locked for the duration you specify, providing a resilient, tamper‑proof recovery layer so you can restore from a known‑good copy when it matters most. 

What we’re announcing

General Availability of Backup Immutability for Long‑Term Retention (LTR) backups in Azure SQL Database. This GA applies to Azure SQL database LTR backups

What immutability does (and doesn’t) do

  • Prevents changes and deletion of LTR backup artifacts for a defined, locked period (WORM). This protection applies even to highly privileged identities, reducing the risk from compromised admin accounts or insider misuse. 
  • Helps address regulatory WORM expectations, supporting customers who must retain non‑erasable, non‑rewritable records (for example, requirements under SEC Rule 17a‑4(f), FINRA Rule 4511(c), and CFTC Rule 1.31(c)–(d)). Always consult your legal/compliance team for your specific obligations. 
  • Complements a defense‑in‑depth strategy—it’s not a replacement for identity hygiene, network controls, threat detection, and recovery drills. See Microsoft’s broader ransomware guidance for Azure

How it works (at a glance)

When you enable immutability on an LTR policy, Azure SQL Database stores those LTR backups on Azure immutable storage in a WORM state. During the lock window, the backup cannot be modified or deleted; after the lock expires, normal retention/deletion applies per your policy. 

Key benefits

  • Ransomware‑resilient recovery: Preserve clean restore points that attackers can’t tamper with during the lock period.
  • Compliance‑ready retention: Use WORM‑style retention to help meet industry and regulatory expectations for non‑erasable, non‑rewritable storage. 
  • Operational simplicity: Manage immutability alongside your existing Azure SQL Database long‑term retention policies. 

Get started

  1. Choose databases that require immutable LTR backups.
  2. Enable immutability on the LTR backup policy and set the retention/lock period aligned to your regulatory and risk requirements.
  3. Validate recovery by restoring from an immutable LTR backup.

Documentation: Learn more about backup immutability for LTR backups in Azure SQL Database in Microsoft Learn. 

Tell us what you think

We’d love your feedback on scenarios, guidance, and tooling that would make immutable backups even easier to adopt. Share your experiences and suggestions in the Azure SQL community forums and let us know how immutability is helping your organization raise its cyber‑resilience.

Updated Nov 19, 2025
Version 1.0
No CommentsBe the first to comment