Skip to main content

💼 CP-9 System Backup

  • Contextual name: 💼 CP-9 System Backup
  • ID: /frameworks/nist-sp-800-53-r5/cp/09
  • Located in: 💼 CP Contingency Planning

Description

a. Conduct backups of user-level information contained in [Assignment: organization-defined system components] [Assignment: organization-defined frequency consistent with recovery time and recovery point objectives]; b. Conduct backups of system-level information contained in the system [Assignment: organization-defined frequency consistent with recovery time and recovery point objectives]; c. Conduct backups of system documentation, including security- and privacy-related documentation [Assignment: organization-defined frequency consistent with recovery time and recovery point objectives]; and
d. Protect the confidentiality, integrity, and availability of backup information.

Similar

  • Sections
    • /frameworks/aws-fsbp-v1.0.0/dynamodb/02
    • /frameworks/aws-fsbp-v1.0.0/efs/02
    • /frameworks/aws-fsbp-v1.0.0/elasticache/01
    • /frameworks/aws-fsbp-v1.0.0/fsx/02
    • /frameworks/aws-fsbp-v1.0.0/rds/11
    • /frameworks/aws-fsbp-v1.0.0/rds/14
    • /frameworks/aws-fsbp-v1.0.0/redshift/03
    • /frameworks/aws-fsbp-v1.0.0/redshift/06
    • /frameworks/aws-fsbp-v1.0.0/s3/13
  • Internal
    • ID: dec-c-e8e4c9c8

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlags
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [DynamoDB.2] DynamoDB tables should have point-in-time recovery enabled11
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [EFS.2] Amazon EFS volumes should be in backup plans
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [ElastiCache.1] ElastiCache (Redis OSS) clusters should have automatic backups enabled
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [FSx.2] FSx for Lustre file systems should be configured to copy tags to backups
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [RDS.11] RDS instances should have automatic backups enabled
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [RDS.14] Amazon Aurora clusters should have backtracking enabled
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [Redshift.3] Amazon Redshift clusters should have automatic snapshots enabled
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [Redshift.6] Amazon Redshift should have automatic upgrades to major versions enabled
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [S3.13] S3 general purpose buckets should have Lifecycle configurations11

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 FedRAMP High Security Controls → 💼 CP-9 System Backup (L)(M)(H)548
💼 FedRAMP Low Security Controls → 💼 CP-9 System Backup (L)(M)(H)7
💼 NIST CSF v2.0 → 💼 PR.DS-01: The confidentiality, integrity, and availability of data-at-rest are protected117
💼 NIST CSF v2.0 → 💼 PR.DS-10: The confidentiality, integrity, and availability of data-in-use are protected111
💼 NIST CSF v2.0 → 💼 PR.DS-11: Backups of data are created, protected, maintained, and tested9
💼 NIST CSF v2.0 → 💼 RC.RP-03: The integrity of backups and other restoration assets is verified before using them for restoration3

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags
💼 CP-9(1) System Backup _ Testing for Reliability and Integrity
💼 CP-9(2) System Backup _ Test Restoration Using Sampling
💼 CP-9(3) System Backup _ Separate Storage for Critical Information
💼 CP-9(4) System Backup _ Protection from Unauthorized Modification
💼 CP-9(5) System Backup _ Transfer to Alternate Storage Site
💼 CP-9(6) System Backup _ Redundant Secondary System
💼 CP-9(7) System Backup _ Dual Authorization for Deletion or Destruction
💼 CP-9(8) System Backup _ Cryptographic Protection1

Policies (3)

PolicyLogic CountFlags
📝 AWS DynamoDB Table Point In Time Recovery is not enabled 🟢1🟢 x6
📝 AWS S3 Bucket Lifecycle Configuration is not enabled 🟢1🟢 x6
📝 Google Cloud SQL Instance Automated Backups are not configured 🟢1🟢 x6