Skip to main content

πŸ’Ό CP-6(2) Alternate Storage Site | Recovery Time and Recovery Point Objectives

  • Contextual name: πŸ’Ό CP-6(2) Alternate Storage Site | Recovery Time and Recovery Point Objectives
  • ID: /frameworks/nist-sp-800-53-r5/cp/06/02
  • Located in: πŸ’Ό CP-6 Alternate Storage Site

Description​

Configure the alternate storage site to facilitate recovery operations in accordance with recovery time and recovery point objectives.

Similar​

  • Sections
    • /frameworks/aws-fsbp-v1.0.0/auto-scaling/02
    • /frameworks/aws-fsbp-v1.0.0/auto-scaling/06
    • /frameworks/aws-fsbp-v1.0.0/dynamodb/01
    • /frameworks/aws-fsbp-v1.0.0/dynamodb/02
    • /frameworks/aws-fsbp-v1.0.0/ec2/20
    • /frameworks/aws-fsbp-v1.0.0/efs/02
    • /frameworks/aws-fsbp-v1.0.0/elasticache/01
    • /frameworks/aws-fsbp-v1.0.0/elb/09
    • /frameworks/aws-fsbp-v1.0.0/elb/10
    • /frameworks/aws-fsbp-v1.0.0/elb/13
    • /frameworks/aws-fsbp-v1.0.0/es/06
    • /frameworks/aws-fsbp-v1.0.0/es/07
    • /frameworks/aws-fsbp-v1.0.0/lambda/05
    • /frameworks/aws-fsbp-v1.0.0/opensearch/06
    • /frameworks/aws-fsbp-v1.0.0/rds/05
    • /frameworks/aws-fsbp-v1.0.0/rds/11
    • /frameworks/aws-fsbp-v1.0.0/rds/14
    • /frameworks/aws-fsbp-v1.0.0/rds/15
    • /frameworks/aws-fsbp-v1.0.0/redshift/03
    • /frameworks/aws-fsbp-v1.0.0/s3/13
  • Internal
    • ID: dec-c-793f294a

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [AutoScaling.2] Amazon EC2 Auto Scaling group should cover multiple Availability Zones
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [AutoScaling.6] Auto Scaling groups should use multiple instance types in multiple Availability Zones
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [DynamoDB.1] DynamoDB tables should automatically scale capacity with demand
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [DynamoDB.2] DynamoDB tables should have point-in-time recovery enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [EC2.20] Both VPN tunnels for an AWS Site-to-Site VPN connection should be up
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [EFS.2] Amazon EFS volumes should be in backup plans
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [ElastiCache.1] ElastiCache (Redis OSS) clusters should have automatic backups enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [ELB.9] Classic Load Balancers should have cross-zone load balancing enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [ELB.10] Classic Load Balancer should span multiple Availability Zones
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [ELB.13] Application, Network and Gateway Load Balancers should span multiple Availability Zones
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [ES.6] Elasticsearch domains should have at least three data nodes
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [ES.7] Elasticsearch domains should be configured with at least three dedicated master nodes
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [Lambda.5] VPC Lambda functions should operate in multiple Availability Zones
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [Opensearch.6] OpenSearch domains should have at least three data nodes
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [RDS.5] RDS DB instances should be configured with multiple Availability Zones11
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [RDS.11] RDS instances should have automatic backups enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [RDS.14] Amazon Aurora clusters should have backtracking enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [RDS.15] RDS DB clusters should be configured for multiple Availability Zones
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [Redshift.3] Amazon Redshift clusters should have automatic snapshots enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [S3.13] S3 general purpose buckets should have Lifecycle configurations11

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό CP-6(2) Recovery Time and Recovery Point Objectives (H)2

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (2)​

PolicyLogic CountFlags
πŸ“ AWS RDS Instance Multi-AZ Deployment is not enabled 🟒1🟒 x6
πŸ“ AWS S3 Bucket Lifecycle Configuration is not enabled 🟒1🟒 x6