UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Email backup and recovery data must be protected.


Overview

Finding ID Version Rule ID IA Controls Severity
V-18882 EMG3-009 EMail SV-20677r2_rule COBR-1 Medium
Description
All automated information systems are at risk of data loss due to disaster or compromise. Failure to provide adequate protection to the backup and recovery data exposes it to risk of potential theft or damage that may ultimately prevent a successful restoration, should the need become necessary. Adequate protection ensures that backup components can be used to provide transparent or easy recovery from losses or operations outages. Backup files need the same protections against unauthorized access when stored on backup media as when online and actively in use by the email system. Included in this category are physical media, online configuration file copies, and any user data that may need to be restored.
STIG Date
Email Services Policy STIG 2013-12-11

Details

Check Text ( C-22536r3_chk )
Access EDSP documentation that describes protections for the Backup and Recovery data.

If email backup and recovery data and processes are restricted to authorized users and groups, this is not a finding.
Fix Text (F-19579r3_fix)
Document the authorized backup and recovery users and groups in the EDSP. Create access restrictions to the authorized staff for email services backup and restore data.