UCF STIG Viewer Logo

System information backups will be created, updated, and protected.


Overview

Finding ID Version Rule ID IA Controls Severity
V-1076 1.013 SV-32245r1_rule Low
Description
Recovery of a damaged or compromised system in a timely basis is difficult without a system information backup. A system backup will usually include sensitive information such as user accounts that could be used in an attack. As a valuable system resource, the system backup should be protected and stored in a physically secure location.
STIG Date
Windows Server 2008 R2 Domain Controller Security Technical Implementation Guide 2019-06-18

Details

Check Text ( C-32877r1_chk )
Interview the SA to determine if system recovery backup procedures are in place that comply with DoD requirements.

Any of the following would be a finding:

-The site does not maintain emergency system recovery data.
-The emergency system recovery data is not protected from destruction and stored in a locked storage container.
-The emergency system recovery data has not been updated following the last system modification.

Fix Text (F-29349r1_fix)
Implement backup procedures that comply with the following requirements:

-Maintain emergency system recovery data.
-The emergency system recovery data is protected from destruction and stored in a locked storage container.
-The emergency system recovery data is updated following the last system modification.