This rule ensures that manual deletion of backup recovery points is disabled to maintain data integrity.
Rule | Backup recovery points manual deletion should be disabled |
Framework | NIST Cybersecurity Framework (CSF) v1.1 |
Severity | ✔ Medium |
Backup Recovery Points Manual Deletion Rule for NIST CSF v1
Rule Description
The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) Version 1 outlines a set of best practices for improving cybersecurity. Within this framework, it is recommended to protect information and assets from data loss by maintaining secure and reliable backup solutions. Disabling manual deletion of backup recovery points is a measure that helps in preventing data loss due to accidental or malicious actions. The rule ensures that backups are immutable for a defined retention period, safeguarding critical data against unauthorized changes or deletions.
Troubleshooting
Troubleshooting Steps
In the event that backups cannot be made or recovery points are being deleted, follow these steps:
Verify Backup Permissions:
Check System Logs:
Review Backup Policies:
Validate Retention Policies:
Update Software:
Necessary Codes or Commands
There are no specific codes for the NIST CSF, but backup software and cloud platforms typically provide CLI commands to manage backup settings.
Remediation Steps
Disabling Manual Deletion
Follow these steps to implement the rule to disable manual deletion of backup recovery points:
Define Backup Retention Policy:
Configure Immutable Backup Settings:
Monitor Compliance:
Perform Regular Audits:
Documentation:
Example CLI Command for AWS
Using AWS as an example, to set a backup plan with immutable backups, you can use the AWS CLI:
aws backup create-backup-plan --backup-plan file://my-backup-plan.json
Where
my-backup-plan.json
is a JSON file that contains the backup plan which includes rules for backup retention and immutability.This command should be customized based on your organization's specific backup plan structure and AWS region. Make sure your AWS CLI is configured with the appropriate permissions before executing this command.
Implementing such rules contributes positively to SEO by ensuring the website's security and integrity, hence maintaining user trust. Regularly updated and compliant cybersecurity practices may be highlighted in website statements to increase confidence in the brand, possibly affecting the site's standing and visibility positively.