This rule ensures that DynamoDB tables have a backup plan for protection.
Rule | DynamoDB table should be protected by backup plan |
Framework | CISA-cyber-essentials |
Severity | ✔ High |
DynamoDB Backup Plan for CISA Cyber Essentials Compliance
Overview
Ensuring DynamoDB tables are protected with a comprehensive backup plan is crucial for maintaining data integrity and availability. This is especially significant for compliance with the Cyber Essentials outlined by the Cybersecurity & Infrastructure Security Agency (CISA). A backup plan fortifies your data against accidental deletions, data corruption, and malicious attacks.
Backup Rule Details
Rule Description
Amazon DynamoDB is a fully managed NoSQL database service that provides fast and predictable performance with seamless scalability. For CISA cyber essentials, DynamoDB tables must have a backup plan that includes:
Rule Importance
Regular backups help in recovering critical data in case of loss due to various reasons such as human error, application errors, and malicious activities. Compliance with the CISA cyber essentials ensures that an organization is taking necessary steps to protect its data from cyber threats.
Troubleshooting Steps
If backup plans are not functioning properly, consider the following troubleshooting steps:
Code Snippets and CLI Commands
Enable PITR Using AWS CLI
aws dynamodb update-continuous-backups \ --table-name YOUR_TABLE_NAME \ --point-in-time-recovery-specification PointInTimeRecoveryEnabled=true
Replace
YOUR_TABLE_NAME
with the name of your DynamoDB table.Create an On-Demand Backup using AWS CLI
aws dynamodb create-backup \ --table-name YOUR_TABLE_NAME \ --backup-name YOUR_BACKUP_NAME
Replace
YOUR_TABLE_NAME
with your table's name and YOUR_BACKUP_NAME
with a unique backup name.Create a Backup Plan Using AWS Backup
Using AWS Backup, a centralized backup plan can be created to manage backups across AWS services.
Monitoring and Alerts with Amazon CloudWatch
You can create monitoring and alerting for backup-related events using Amazon CloudWatch.
Step-by-Step Guide for Remediation
Step 1: Verify Backup Configuration
Check that the DynamoDB tables have backups configured properly with the necessary retention period as per the compliance requirements.
Step 2: Enable PITR
Ensure Point-In-Time Recovery is enabled to provide continuous backups and allow for restoration to any second in the last 35 days.
Step 3: Schedule Regular Backups
Set up a regular backup schedule using AWS Backup to create frequent backups.
Step 4: Monitor Backup Activity
Set up monitoring and alerting in CloudWatch for backup and restore operations to ensure you are immediately aware of any failures.
Step 5: Test Recovery Process
Regularly test recovery by restoring backups to a test environment to ensure that the data integrity and recovery process meets the required RTOs and RPOs.
By following these steps, your DynamoDB tables will adhere to a robust backup plan that aligns with CISA’s cyber essentials, enhancing your data protection strategy and compliance posture.