UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

System information backups will be created, updated, and protected.


Overview

Finding ID Version Rule ID IA Controls Severity
V-1076 1.013 SV-32245r1_rule Low
Description
Recovery of a damaged or compromised system in a timely basis is difficult without a system information backup. A system backup will usually include sensitive information such as user accounts that could be used in an attack. As a valuable system resource, the system backup should be protected and stored in a physically secure location.
STIG Date
Windows Server 2008 R2 Member Server Security Technical Implementation Guide 2017-06-09

Details

Check Text ( C-32877r1_chk )
Interview the SA to determine if system recovery backup procedures are in place that comply with DoD requirements.

Any of the following would be a finding:

-The site does not maintain emergency system recovery data.
-The emergency system recovery data is not protected from destruction and stored in a locked storage container.
-The emergency system recovery data has not been updated following the last system modification.

Fix Text (F-29349r1_fix)
Implement backup procedures that comply with the following requirements:

-Maintain emergency system recovery data.
-The emergency system recovery data is protected from destruction and stored in a locked storage container.
-The emergency system recovery data is updated following the last system modification.