What Is Immutable Storage?

Immutable Storage - Definition

Immutable storage is a data storage model in which stored objects cannot be modified or deleted for a specified period of time or until explicitly released. In practice, this is enforced through a WORM (Write Once, Read Many) policy, time-based retention locks, and legal hold mechanisms. The goal is to ensure tamper resistance, regulatory compliance, and evidentiary data integrity.

In the context of image and video anonymization, immutable storage guarantees the preservation of original input files, non-editable process logs, and controlled versioning of outputs with blurred faces and license plates.

In object storage environments, immutability is typically enabled through Object Lock mechanisms, while file systems rely on WORM policies and cryptographic verification. Data integrity is validated using checksums and retention metadata. Any implementation must align with GDPR requirements regarding data minimization, purpose limitation, storage limitation, and processing security.

The Role of Immutable Storage in Image and Video Anonymization

Immutable storage strengthens chain-of-custody credibility and simplifies compliance audits. For face blurring and license plate blurring workflows, it provides verifiable proof that:

  • the original video or image was not modified prior to anonymization,
  • the anonymized output is linked to a specific algorithm version and configuration,
  • supporting data and logs were not altered after processing.

In practice, Data Protection Officers (DPOs) and security teams use immutable repositories to retain originals, processing policies, checksums, and execution reports. In Gallio PRO, this applies to input materials and process metadata. The software does not collect logs containing coordinates or face and license plate detection results, nor does it store other personal or sensitive data.

Immutable Storage Technologies

Immutability can be implemented in both cloud and on-premises environments. The following solutions support WORM retention, object locking, and integrity verification. The right choice depends on legal requirements, budget, and integration with the video processing pipeline.

Technology

Key Feature

Scope

Source

 

AWS S3 Object Lock

Governance and Compliance modes, retention and legal hold

Object storage, S3 API

AWS Docs

Azure Blob Immutable Storage

Time-based retention, legal hold

Object storage, Blob

Microsoft Docs

MinIO Object Lock

S3 Object Lock API compatibility

On-premises, object storage

MinIO Docs

NetApp SnapLock

WORM at volume and file level

NAS, on-premises

NetApp TR

Dell EMC Retention Lock

Enforced retention and locking mechanisms

Data protection systems (product-dependent)

Dell Docs

Linux fs-verity

Verifiable file integrity (modification detection)

File system level

kernel.org

Key Parameters and Metrics for Immutable Storage

The following parameters determine the effectiveness and compliance of an immutable storage solution:

Parameter

Significance

Verification

Source

 

Retention mode

Governance vs. Compliance, bypass capability

Object metadata and permission inspection

AWS Docs

Retention period

Duration of non-deletability

Object retention metadata (e.g., RetainUntilDate) / service API

Microsoft Docs

Legal hold

Indefinite lock without end date

Hold flag in metadata

AWS Docs

Scope

Object, container/bucket, volume

Policy configuration

NetApp TR

Cryptographic integrity

File hash as proof of immutability

SHA-256 compliant with FIPS 180-4

NIST FIPS 180-4

Versioning

Change history, overwrite protection

Versioning-enabled flags

AWS Docs

Data durability

Probability of data loss

Service provider declarations

AWS S3 FAQ - 99.999999999% durability

RPO/RTO for immutable backups

Incident recovery capability and loss window

Snapshot schedules and recovery testing

NIST SP 800-209

Compliance Challenges and Limitations

Immutable storage must be designed in accordance with GDPR. Key risks arise from potential conflicts between mandatory retention and the right to erasure.

  • Storage limitation principle - the retention period must be justified by a legal basis and defined in the retention schedule (Art. 5(1)(e) GDPR).
  • Right to erasure - avoid configurations that prevent deletion when there is no valid legal basis for further retention (Art. 17 GDPR).
  • Security of processing - access control, encryption, and monitoring must complement immutability (Art. 32 GDPR).
  • Operational misconfiguration risk - Compliance mode cannot be reversed until the retention period expires.
  • Cost and performance considerations - versioning and immutable backups increase storage consumption.

Use Cases in Gallio PRO

The following workflow illustrates how immutable storage supports batch-based image and video anonymization in Gallio PRO. The software does not perform real-time anonymization or live video stream anonymization.

  1. Ingest original files into a repository with WORM retention and versioning enabled.
  2. Trigger the Gallio PRO process, which automatically blurs only faces and license plates. Other elements can be manually redacted in the editor.
  3. Store anonymized outputs in a separate bucket with controlled versioning and SHA-256 checksums.
  4. Save process metadata and execution reports in an immutable repository. No detection logs containing personal data are stored.
  5. Maintain retention policies: shorter for anonymized materials, longer for originals if required by legal basis.
  6. Perform periodic recovery tests and retention metadata audits for DPO oversight.

Normative References and Sources

  • GDPR: Articles 5, 17, 32 - EUR-Lex, Regulation (EU) 2016/679, link.
  • ISO/IEC 27040:2015 Information technology - Security techniques - Storage security, ISO, link.
  • NIST SP 800-209 Security Guidelines for Storage Infrastructure, 2020, link.
  • NIST FIPS 180-4 Secure Hash Standard, 2015, link.
  • AWS S3 Object Lock documentation, link.
  • Amazon S3 FAQ - 99.999999999% durability, link.
  • Azure Blob Storage - Immutable Storage, Microsoft Docs, link.
  • Linux fs-verity kernel documentation, link.
  • NetApp SnapLock - Technical Report, link.