UCF STIG Viewer Logo

Email backup and recovery data must be protected.


Overview

Finding ID Version Rule ID IA Controls Severity
V-18882 EMG3-009 EMail SV-20677r3_rule COBR-1 Medium
Description
All automated information systems are at risk of data loss due to disaster or compromise. Failure to provide adequate protection to the backup and recovery data exposes it to risk of potential theft or damage that may ultimately prevent a successful restoration, should the need become necessary. Adequate protection ensures that backup components can be used to provide transparent or easy recovery from losses or operations outages. Backup files need the same protections against unauthorized access when stored on backup media as when online and actively in use by the email system. Included in this category are physical media, online configuration file copies, and any user data that may need to be restored.
STIG Date
Email Services Policy STIG 2015-08-07

Details

Check Text ( C-22536r3_chk )
Access EDSP documentation that describes protections for the Backup and Recovery data.

If email backup and recovery data and processes are restricted to authorized users and groups, this is not a finding.
Fix Text (F-19579r3_fix)
Document the authorized backup and recovery users and groups in the EDSP. Create access restrictions to the authorized staff for email services backup and restore data.