1.1 The business need for Safeguarded Copy1.1.1 Ransomware and cyberattacks1.1.2 Regulatory requirements1.1.3 Data protection methods1.2 The components and concepts of Safeguarded Copy1.2.1 Volume groups1.2.2 Safeguarded child pools1.2.3 Safeguarded policies1.2.4 Copy Services Manager integration1.2.5 Putting it all together1.3 Overall strategy considerations for Safeguarded Copy1.3.1 Disaster recovery replication1.3.2 Backup infrastructure architecture1.3.3 Storage Management Hardening1.3.4 Monitoring1.3.5 Validation1.3.6 Automation