UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

System information backups must be created, updated, and protected.


Overview

Finding ID Version Rule ID IA Controls Severity
V-1076 WN08-00-000003 SV-48019r1_rule Low
Description
Recovery of a damaged or compromised system in a timely manner is difficult without a system information backup. A system backup will usually include sensitive information such as user accounts that could be used in an attack. As a valuable system resource, the system backup must be protected and stored in a physically secure location.
STIG Date
Windows 8 / 8.1 Security Technical Implementation Guide 2016-12-19

Details

Check Text ( C-44757r2_chk )
Determine if system recovery backup procedures are in place that comply with DoD requirements.

Any of the following would be a finding:

-The site does not maintain emergency system recovery data.
-The emergency system recovery data is not protected from destruction and stored in a locked storage container.
-The emergency system recovery data has not been updated following the last system modification.
Fix Text (F-41157r1_fix)
Implement system recovery procedures that include maintaining emergency system recovery data, protecting that data from destruction and storing it in a locked storage container, and updating it following each and every system modification.