A method, system, and computer-readable medium for maintaining up-to-date,
consistent backup copies of primary data that are immune to corruption
even when security of the primary data is breached. Independent security
domains are established for primary and secondary data, such that access
to each security domain must be obtained independently of access to the
other security domains. For example, a host computer system having access
to data storage in the primary security domain does not have access to
data storage in the secondary security domain, and vice versa. Changes to
primary data are synchronously replicated over a tightly controlled
replication link from primary data storage in the primary security domain
to secondary data storage in the secondary security domain. A change to
the data is completed in the primary security domain when an
acknowledgement is received that the change to the data has been stored
in secondary data storage.