Security Control 8:
Data Recovery Capability

Minimize the damage from an attack: Implement a trustworthy plan for removing all traces of an attack. Automatically back up all information required to fully restore each system, including the operating system, application software, and data. Back up all systems at least weekly; back up sensitive systems more often. Regularly test the restoration process.

Key: REQ = Required, REC = Recommended, OPT = Optional

IDDetailsHighMedLow

8.1

Ensure that each system (operating system, application software, and data) is automatically backed up on at least a weekly basis, and more often for systems storing sensitive information.

REQ REQ REC

8.2

Data on backup media should be tested on a regular basis by performing a data restoration process to ensure that the backup is properly working.

REQ REQ REC

8.3

Key personnel should be trained on both the backup and restoration processes.

[additional details]

To be ready in case a major incident occurs, alternative personnel should also be trained on the restoration process just in case the primary IT point of contact is not available.

REQ REQ REC

8.4

Ensure that backups are properly protected via physical security or encryption when they are stored locally, as well as when they are moved across the network.

REQ REQ REC

Additional Reading