UCF STIG Viewer Logo

System Recovery Backup procedures must be configured to comply with DoD requirements.


Overview

Finding ID Version Rule ID IA Controls Severity
V-25375 OSX00675 M6 SV-37320r1_rule CODB-1 Low
Description
Recovery of a damaged or compromised system in a timely basis is difficult without a system information backup. A system backup will usually include sensitive information, such as user accounts that could be used in an attack. As a valuable system resource, the system backup should be protected and stored in a physically secure location.
STIG Date
MAC OSX 10.6 Workstation Security Technical Implementation Guide Draft 2013-01-10

Details

Check Text ( C-36010r1_chk )
Interview the SA to determine if system recovery backup procedures are in place complying with DoD requirements.

Any of the following would be a finding:

• The site does not maintain emergency system recovery data.
• The emergency system recovery data is not protected from destruction and stored in a locked storage container.
• The emergency system recovery data has not been updated following the last system modification.
Fix Text (F-31261r1_fix)
Implement data backup procedures complying with DoD requirements.