Continuously restoring from a copy of the data you sent to cold storage provides an additional layer of protection.
If an attacker get root they can theoretically disable the continuous restoration, but the more moving parts they have to tweak the more likely that they'll be noticed while the org still has access to decent backups.