The Problem Kasten v9 Solves — and Why It Took This Long
The 3-2-1-1-0 backup strategy — three copies, two media types, one offsite, one immutable, zero errors verified — has been the enterprise backup standard since before Kubernetes existed. Applying it to Kubernetes workloads has been structurally harder than applying it to traditional VMs or file servers, for a specific reason: Kubernetes application state is distributed across persistent volumes, secrets, ConfigMaps, custom resources, and Kubernetes object manifests. A complete backup must capture all of these components consistently, then replicate them to multiple destinations that may have different APIs, authentication requirements, and consistency guarantees.
Veeam Kasten for Kubernetes has been the market-leading solution for Kubernetes-native backup since Veeam’s acquisition of Kasten.io. The previous generation (v8.x) required operators to create separate policies for each backup destination: one policy for the immutable Vault copy, a second for on-premises object storage, a third for a regional sovereign cloud. Policy proliferation created operational complexity — when a Kubernetes application’s deployment configuration changed, engineers had to update multiple backup policies in sync, and drift between policies caused silent protection gaps.
Kasten v9.0 collapses this into a single policy with multiple export targets. According to the v9.0 announcement published May 11, 2026: “Modern resilience strategies like sovereignty mandates and regional failover used to require chained policies and brittle scripting. Now it’s one policy with multiple targets.” The operational implication is significant: a single policy change propagates to all destinations simultaneously, audit trails cover all copies in a single view, and there is no possibility of destination-specific policy drift causing a protection gap.
What’s New in Kasten v9.0 — The Features That Matter for Enterprise Resilience
The multi-destination export capability is the headline, but three other v9.0 features address specific enterprise pain points that previous versions handled inadequately.
Veeam Vault on AWS — a fully managed, immutable object storage service — is now a native, first-class export target in Kasten v9. The significance is practical: immutability on AWS previously required configuring S3 Object Lock manually, managing bucket lifecycle rules, and ensuring that Kasten’s export credentials did not have delete permissions. Veeam Vault wraps this complexity in a managed service with predictable pricing, eliminating manual bucket configuration and the associated misconfiguration risk. For enterprises with cyber insurance policies that require immutable backup copies, Veeam Vault on AWS now satisfies that requirement with a documented, auditable configuration.
Incremental VM Backups for OpenShift Virtualization (in preview) adds Changed Block Tracking (CBT) support for VM workloads running on OpenShift. Previously, Kasten backed up OpenShift VMs with full snapshots on every cycle — an approach that works but generates large export sizes and long backup windows for VMs with significant data. CBT enables delta-only backups that transfer only the blocks changed since the last backup, reducing backup window duration by 60 to 90 percent for stable production VMs. For a VM with 500 GB of data where only 5 GB changes per day, CBT reduces each backup transfer from 500 GB to approximately 5 GB — a 100x reduction in transfer volume. This feature is particularly relevant for organizations running hybrid Kubernetes clusters where some workloads are containerized and others are VMs that have not been containerized.
Hardened Containers per NIST SP 800-190 — all Kasten pods now run with read-only root filesystems, a hardening standard released in September 2017 and widely incorporated into FedRAMP and CMMC compliance frameworks. NIST Special Publication 800-190 on container security guidance identifies writable root filesystems as a significant attack surface. A compromised container with a writable root filesystem can install tools, modify configuration, and escalate privileges. Read-only root filesystems prevent this class of attack at the infrastructure layer. For enterprises requiring NIST 800-190 compliance as part of FedRAMP, CMMC, or internal security policy, this change makes Kasten v9 compliant without additional configuration.
Advertisement
What Platform Engineers and Backup Administrators Should Do
1. Migrate Existing Multi-Policy Backup Configurations to Single Multi-Destination Policies in v9
The most immediate operational improvement in v9 is policy consolidation. Any existing Kasten deployment with separate policies for different destinations should be migrated to the v9 multi-destination model after upgrading. The migration path is: document all existing policies and their destinations, create a new consolidated policy per application with all destinations specified, validate that the first backup run produces copies in all expected locations, then archive the old policies. Do not run old single-destination policies alongside new multi-destination policies for the same applications — the overlapping runs will generate redundant backup data and inflate storage costs. Policy consolidation also simplifies audit reporting: compliance teams reviewing backup coverage for a Kubernetes namespace can view a single policy rather than cross-referencing three to five separate policy documents.
2. Activate Veeam Vault for All Cyber Insurance-Required Immutable Copies
Enterprise cyber insurance policies written since 2024 increasingly include an immutability clause: backup copies must be stored in a format that cannot be modified or deleted by ransomware for a minimum retention period (typically 30 to 90 days). If your current Kasten deployment satisfies this through manual S3 Object Lock configuration, audit that configuration against the following criteria: (a) Kasten’s export IAM role must not have s3:DeleteObject permissions on the immutable bucket; (b) the Object Lock default retention period must match your insurance policy’s minimum; (c) the Object Lock mode must be Compliance (not Governance, which allows administrators to override immutability). Veeam Vault on AWS handles all three requirements in its managed service model, removing the audit burden from your team and onto Veeam’s SOC2 attestation. Migrating to Veeam Vault reduces the scope of your own immutability audit from a multi-step IAM and bucket configuration review to a single managed service verification.
3. Use Label-Based Policies for Dynamic Protection Coverage as Kubernetes Clusters Scale
One of the most common Kubernetes backup gaps is deployment lag: a new application gets deployed to production, but no one adds it to the backup policy for three to five days until a weekly review catches the omission. In v9, Kasten’s label-based policies automatically protect workloads matching a specified label selector (e.g., tier=production) without manual policy updates per application. Configure your cluster’s deployment pipeline to apply a tier=production label to all production-bound workloads as part of the CI/CD release process. Any deployment that reaches production with this label is automatically included in the backup policy. Any workload missing the label is automatically excluded — and visible in Kasten’s compliance dashboard as an unprotected resource, creating an active audit trail that catches omissions before they become recovery incidents. In environments running 50+ applications across 5+ namespaces, label-based policy coverage typically reduces unprotected-application incidents by 80 to 90 percent compared to manual policy assignment per application.
The Bigger Picture: Kubernetes Data Protection as a Compliance Requirement, Not an Option
Kasten v9’s timing is not accidental. The sovereign cloud conversation has shifted from optional compliance consideration to contractual requirement in several major enterprise verticals. SiliconAngle’s May 2026 analysis of sovereign cloud trends documents that large enterprises in financial services, healthcare, and government contracting are now specifying sovereign cloud data residency requirements in procurement contracts — not just in regulatory filings. Kubernetes backup that simultaneously satisfies an immutability requirement (for cyber insurance), a data residency requirement (for sovereign cloud compliance), and a local recovery requirement (for operational RTO targets) used to require three separate tools or three separate policy chains. Kasten v9 makes it one.
The Red Hat ACM integration — which provides fleet-wide backup visibility across Kubernetes clusters within the existing ACM console — extends this operational consolidation across multi-cluster environments. For enterprises running 10 to 50 Kubernetes clusters across hybrid and multi-cloud environments, backup coverage visibility across all clusters in a single console pane eliminates the per-cluster audit process that previously consumed significant platform engineering time. The combination of single-policy multi-destination backup, Veeam Vault immutability, and ACM fleet visibility makes Kasten v9 the first Kubernetes backup release that addresses the full scope of enterprise data protection requirements without requiring supplementary tools.
Frequently Asked Questions
Does Kasten v9 support non-AWS sovereign cloud destinations in the multi-destination export?
Yes. The multi-destination export in v9 supports any S3-compatible object storage as a destination target, including Azure Blob Storage, Google Cloud Storage, MinIO, and sovereign cloud providers using S3-compatible APIs. The Veeam Vault managed service is AWS-specific, but sovereign cloud copies can be directed to any S3-compatible endpoint. For organizations with sovereign cloud requirements that mandate on-premises storage, Kasten v9 also supports NFS and vSphere object store destinations alongside cloud targets.
What is the upgrade path from Kasten v8 to v9, and is it disruptive?
Kasten v9 upgrades follow the standard Helm chart upgrade process — updating the Helm chart version and applying the new values configuration. The upgrade is non-disruptive to running applications: Kasten operates as a Kubernetes-native workload and the upgrade does not require downtime for protected applications. However, the multi-destination policy configuration is additive — existing single-destination policies continue to function after the upgrade and must be manually migrated to the multi-destination model. Veeam recommends validating the first backup run of newly configured multi-destination policies before archiving old single-destination policies.
How does Kasten v9 handle backup of AI vector databases like PGVector?
Kasten v9 introduces dedicated logical blueprints for PGVector — the PostgreSQL extension used for AI embedding storage — with customizable reference implementations. Traditional Kubernetes volume snapshots of PostgreSQL-backed PGVector databases can produce inconsistent backups if a write is in progress during the snapshot. Kasten’s logical blueprints for PGVector execute a consistent snapshot at the application layer (using pg_start_backup / pg_stop_backup semantics) before triggering the volume snapshot, ensuring that the backup represents a transactionally consistent state of the vector database.
Sources & Further Reading
- Announcing Veeam Kasten for Kubernetes v9.0: Enterprise Resilience for Modern Workloads — The NAS Guy
- Veeam Kasten v9.0: Enterprise Resilience for Kubernetes — Veeam Blog
- Sovereign Cloud and Enterprise AI — SiliconAngle
- eBPF in 2026: The Kernel Revolution Powering Cloud-Native Security — DEV Community
- Veeam Kasten for Kubernetes: What’s New — Veeam
















