Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Rule: Backup Recovery Points Manual Deletion Disabled

This rule ensures that manual deletion of backup recovery points is disabled to maintain data integrity.

RuleBackup recovery points manual deletion should be disabled
FrameworkSOC 2
Severity
Medium

Rule Description

The rule states that backup recovery points manual deletion should be disabled in order to comply with SOC 2 guidelines. This means that individuals should not be allowed to manually delete recovery points from the backup system as it may lead to data loss and non-compliance with the security standards.

Troubleshooting Steps

If there are any issues or concerns related to the manual deletion of backup recovery points, follow the steps below for troubleshooting:

  1. 1.

    Verify Security Controls: Ensure that the necessary security controls are in place to prevent unauthorized access to the backup system and restrict users from manually deleting recovery points.

  2. 2.

    Review Logging and Monitoring: Examine the logs and monitoring systems to identify any suspicious activities or attempts to delete backup recovery points manually. This will help in identifying any potential security breaches or non-compliance incidents.

  3. 3.

    Check User Access Permissions: Review user roles and permissions to ensure that only authorized personnel have the necessary privileges to access and manage the backup system. Confirm that users without appropriate permissions cannot delete recovery points.

  4. 4.

    Review Backup System Configuration: Review the configuration settings of the backup system to ensure that there are no accidental or unintended settings that might allow manual deletion of recovery points.

  5. 5.

    Investigate User Reports: Address any user reports or complaints regarding missing or deleted backup recovery points promptly. Investigate the reports to determine the cause and take necessary remediation steps.

Necessary Codes or Configurations

In order to disable backup recovery points manual deletion, the specific configuration or codes will depend on the backup system or software being used. Here is a generic example:

  1. 1.
    Access the backup system configuration settings.
  2. 2.
    Locate the option related to manual deletion of recovery points.
  3. 3.
    Disable or uncheck the checkbox/button that allows manual deletion.
  4. 4.
    Save the changes to apply the new configuration.

Please note that the exact steps and configuration options may vary depending on the backup system you are using. Refer to the backup system's documentation or consult with the vendor for specific instructions.

Step-by-step Guide for Remediation

To disable backup recovery points manual deletion, follow the step-by-step guide below:

  1. 1.
    Identify the backup system being used in your organization.
  2. 2.
    Access the administrative interface or control panel of the backup system.
  3. 3.
    Navigate to the settings or configuration section of the backup system.
  4. 4.
    Locate the option that controls manual deletion of recovery points.
  5. 5.
    Disable or uncheck the option that allows manual deletion of recovery points.
  6. 6.
    Save the changes to apply the new configuration.
  7. 7.
    Verify that the manual deletion of recovery points is disabled by attempting to delete a recovery point through the backup system's user interface with an account that does not have the necessary permissions. The system should prevent the deletion and display an appropriate error message.
  8. 8.
    Monitor the backup system regularly to ensure that manual deletion of recovery points remains disabled.
  9. 9.
    Document the changes made and update the organization's security or compliance documentation accordingly.
  10. 10.
    Communicate the updated configuration or policy to relevant personnel involved in managing the backup system.

Remember to consult with your organization's IT or security team, adhere to any specific guidelines, and refer to the documentation provided by the backup system vendor for accurate and advanced instructions.

Note: The provided guide and instructions are not exhaustive and should be adapted to the specific backup system and organizational requirements.

Is your System Free of Underlying Vulnerabilities?
Find Out Now