UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

COBR-1 Protection of Backup and Restoration Assets


Overview

Procedures are in place assure the appropriate physical and technical protection of the backup and restoration hardware, firmware, and software, such as router tables, compilers, and other security-related system software.

MAC / CONF Impact Subject Area
MACI
MACII
MACIII
High Continuity

Details

Threat
If backup and restoration assets do not have appropriate physical and technical protections in place, there is a risk of mission essential information being accidentally or deliberately modified or destroyed.  A protection strategy for all backup and restoration hardware, firmware, and software, such as router tables, compilers, and other security-related system software mitigates the modification or destruction of information.

Guidance
1. An inventory of all backup and restoration assets shall be documented in an organization or site backup plan.
2. Physical security controls, such as building/room access controls and fire rated safes shall be employed to protect backup and restoration assets.
3. Technical security controls, such as cryptographic key management and least-privilege access controls shall be implemented to protect backup and restoration assets.

References

  • NIST SP 800-34, Contingency Planning Guide for Information Technology Systems, June 2002
  • DoDD 3020.36, Assignment of National Security Emergency Preparedness Responsibilities to DoD Components, 02 November 1988
  • DoD 8910.1-M, DoD Procedures for Management of Information Requirements, 30 June 1998
  • CJCSM 6510.01, Defense-in-Depth: Information Assurance (IA) and Computer Network Defense (CND), 25 March 2003