DoD 8500

157 controls available

Sort by:|157 results
ContinuityMAC 3Medium

An alternate site is identified that permits the partial restoration of mission or business essential functions.

ContinuityMAC 1MAC 2High

An alternate site is identified that permits the restoration of all mission or business essential functions.

ContinuityMAC 1MAC 2MAC 3High

Procedures are in place assure the appropriate physical and technical protection of the backup and restoration hardware, firmware, and software, such as router tables, compilers, and other security-related system software.

ContinuityMAC 3Low

Data backup is performed at least weekly.

ContinuityMAC 2Medium

Data backup is performed daily, and recovery media are stored off-site at a location that affords protection of the data in accordance with its mission assurance category and confidentiality level.

ContinuityMAC 1Medium

Data backup is accomplished by maintaining a redundant secondary system, not co-located, that can be activated without loss of data or disruption to the operation.

ContinuityMAC 3Low

A disaster plan exists that provides for the partial resumption of mission or business essential functions within 5 days of activation. (Disaster recovery procedures include business recovery plans, system contingency plans, facility disaster recovery plans, and plan acceptance.)

ContinuityMAC 2Medium

A disaster plan exists that provides for the resumption of mission or business essential functions within 24 hours of activation. (Disaster recovery procedures include business recovery plans, system contingency plans, facility disaster recovery plans, and plan acceptance.)

ContinuityMAC 1Medium

A disaster plan exists that provides for the smooth transfer of all mission or business essential functions to an alternate site for the duration of an event with little or no loss of operational continuity. (Disaster recovery procedures include business recovery plans, system contingency plans, facility disaster recovery plans, and plan acceptance.)

ContinuityMAC 2MAC 3Medium

Enclave boundary defense at the alternate site provides security measures equivalent to the primary site.

ContinuityMAC 1High

Enclave boundary defense at the alternate site must be configured identically to that of the primary site.

ContinuityMAC 2MAC 3Low

The continuity of operations or disaster recovery plans are exercised annually.

ContinuityMAC 1Medium

The continuity of operations or disaster recovery plans or significant portions are exercised semi-annually.

ContinuityMAC 3Low

Mission and business essential functions are identified for priority restoration planning.

ContinuityMAC 1MAC 2Medium

Mission and business-essential functions are identified for priority restoration planning along with all assets supporting mission or business-essential functions (e.g., computer-based services, data and applications, communications, physical infrastructure).

ContinuityMAC 3Low

Maintenance support for key IT assets is available to respond within 24 hours of failure.

ContinuityMAC 1MAC 2Medium

Maintenance support for key IT assets is available to respond 24 X 7 immediately upon failure.

ContinuityMAC 3Low

Electrical power is restored to key IT assets by manually activated power generators upon loss of electrical power from the primary source.

ContinuityMAC 2Medium

Electrical systems are configured to allow continuous or uninterrupted power to key IT assets. This may include an uninterrupted power supply coupled with emergency generators.

ContinuityMAC 1Medium

Electrical systems are configured to allow continuous or uninterrupted power to key IT assets and all users accessing the key IT assets to perform mission or business-essential functions. This may include an uninterrupted power supply coupled with emergency generators or other alternate power source.

ContinuityMAC 2MAC 3Low

Maintenance spares and spare parts for key IT assets can be obtained within 24 hours of failure.

ContinuityMAC 1Medium

Maintenance spares and spare parts for key IT assets are available 24 X 7 immediately upon failure.

ContinuityMAC 1MAC 2MAC 3High

Back-up copies of the operating system and other critical software are stored in a fire rated container or otherwise not collocated with the operational software.

ContinuityMAC 1MAC 2MAC 3High

Recovery procedures and technical system features exist to ensure that recovery is done in a secure and verifiable manner. Circumstances that can inhibit a trusted recovery are documented and appropriate mitigating procedures have been put in place.

Security Design and ConfigurationMAC 1MAC 2MAC 3Medium

An annual IA review is conducted that comprehensively evaluates existing policies and processes to ensure procedural consistency and to ensure that they fully support the goal of uninterrupted operations.

Showing 125 of 157|Per page: