UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

System Recovery Backup procedures must be configured to comply with DoD requirements.


Overview

Finding ID Version Rule ID IA Controls Severity
V-25375 OSX00675 M6 SV-37320r1_rule CODB-1 Low
Description
Recovery of a damaged or compromised system in a timely basis is difficult without a system information backup. A system backup will usually include sensitive information, such as user accounts that could be used in an attack. As a valuable system resource, the system backup should be protected and stored in a physically secure location.
STIG Date
MAC OSX 10.6 Workstation Security Technical Implementation Guide 2013-04-09

Details

Check Text ( C-36010r1_chk )
Interview the SA to determine if system recovery backup procedures are in place complying with DoD requirements.

Any of the following would be a finding:

• The site does not maintain emergency system recovery data.
• The emergency system recovery data is not protected from destruction and stored in a locked storage container.
• The emergency system recovery data has not been updated following the last system modification.
Fix Text (F-31261r1_fix)
Implement data backup procedures complying with DoD requirements.