Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-18882 | EMG3-009 EMail | SV-20677r2_rule | COBR-1 | Medium |
Description |
---|
All automated information systems are at risk of data loss due to disaster or compromise. Failure to provide adequate protection to the backup and recovery data exposes it to risk of potential theft or damage that may ultimately prevent a successful restoration, should the need become necessary. Adequate protection ensures that backup components can be used to provide transparent or easy recovery from losses or operations outages. Backup files need the same protections against unauthorized access when stored on backup media as when online and actively in use by the email system. Included in this category are physical media, online configuration file copies, and any user data that may need to be restored. |
STIG | Date |
---|---|
Email Services Policy STIG | 2014-03-11 |
Check Text ( C-22536r3_chk ) |
---|
Access EDSP documentation that describes protections for the Backup and Recovery data. If email backup and recovery data and processes are restricted to authorized users and groups, this is not a finding. |
Fix Text (F-19579r3_fix) |
---|
Document the authorized backup and recovery users and groups in the EDSP. Create access restrictions to the authorized staff for email services backup and restore data. |