Content library
Backups
Protecting recovery data

Other tasks from the same security theme

Task name
Priority
Status
Theme
Policy
Other requirements
Documenting and delegating ownership of own backup processes
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Backups
22
requirements

Examples of other requirements this task affects

12.3: Backup
ISO27 Full
12.3.1: Information backup
ISO27 Full
I24: Varmuuskopiointi
Katakri
PR.IP-4: Backups
NIST
TEK-20: Varmuuskopiointi
Julkri
See all related requirements and other information from tasks own page.
Go to >
Documenting and delegating ownership of own backup processes
1. Task description

In connection with the data systems listing, we describe for which systems we are responsible for the implementation of the backup. The organization’s own backup processes are documented and an owner is assigned to each. The documentation includes e.g.:

  • which system is used for backing up data?
  • how are the backups protected (encryption, physical location)?
  • how long are the backups retained?
Regular testing, evaluation, and recovery instructions for backups
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Backups
29
requirements

Examples of other requirements this task affects

12.3: Backup
ISO27 Full
12.1.1: Documented operating procedures
ISO27 Full
12.3.1: Information backup
ISO27 Full
PR.IP-4: Backups
NIST
TEK-20: Varmuuskopiointi
Julkri
See all related requirements and other information from tasks own page.
Go to >
Regular testing, evaluation, and recovery instructions for backups
1. Task description

The media used for backups and the restoration of backups are tested regularly to ensure that they can be relied on in an emergency.

Accurate and complete instructions are maintained for restoring backups. The policy is used to monitor the operation of backups and to prepare for backup failures.

Varmuuskopioiden rekisteröinti ja käsittelyn seuranta (TL III)
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Backups
2
requirements

Examples of other requirements this task affects

TEK-20.2: Varmuuskopiointi - varmuuskopioiden rekisteröinti ja käsittelyn seuranta - TL III
Julkri
I-20: TIETOJENKÄSITTELY-YMPÄRISTÖN SUOJAUS KOKO ELINKAAREN AJAN – VARMUUSKOPIOINTI
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Varmuuskopioiden rekisteröinti ja käsittelyn seuranta (TL III)
1. Task description

Varmuuskopioista on rekisterit ja varmuuskopioiden käsittely kirjataan sähköiseen lokiin, tietojärjestelmään, asianhallintajärjestelmään, manuaaliseen diaariin tai tietoon (esimerkiksi dokumentin osaksi).

Procedures and log for data restoration efforts
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Backups
3
requirements

Examples of other requirements this task affects

A.11.3: Control and logging of data restoration
ISO 27018
2.9.3: Test backups regularly
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Procedures and log for data restoration efforts
1. Task description

The organization should have a clear, written step-by-step procedure for carrying out data restoration efforts. There should also be a log of data restorations carried out. The log should contain:

  • the person responsible
  • date and time of the restoration
  • a description of the restored data
  • data that was restored manually
Salassa pidettävää tietoa sisältävien varmuuskopioiden suojaus (ST III-II)
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Backups
1
requirements

Examples of other requirements this task affects

I24: Varmuuskopiointi
Katakri
See all related requirements and other information from tasks own page.
Go to >
Salassa pidettävää tietoa sisältävien varmuuskopioiden suojaus (ST III-II)
1. Task description

Varmuuskopioinnin tavoitteena on rajata menetettävän tiedon määrää ja pystyä palauttamaan tiedot tarpeeksi nopeasti ja luotettavasti.

Suojaustasoilla III-II toteutetaan seuraavat toimenpiteet varmuuskopioiden suojaamiseksi:

  • Varmuuskopiot käsitellään ja säilytetään niiden elinkaaren ajan vähintään ko. suojaustason järjestelmissä
  • Käsiteltäessä samalla varmistusjärjestelmällä tarkastusoikeuden varaavien eri omistajien tietoja, tarkastusoikeuden mahdollistavat erottelumenettelyt on toteutettava ko. suojaustason mukaisesti varmistusjärjestelmän liittymien ja tallennemedioiden osalta
  • Varmuuskopioiden siirtämiseen sovelletaan samoja toimintatapoja kuin muun tietoaineiston siirtämiseen
  • Varmistusmediat hävitetään ko. suojaustason mukaisesti
  • Varmuuskopioista on rekisterit ja varmuuskopioiden käsittely kirjataan sähköiseen lokiin, tietojärjestelmään, asianhallintajärjestelmään, manuaaliseen diaariin tai asiakirjaan
Salassa pidettävää tietoa sisältävien varmuuskopioiden suojaus (ST IV)
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Backups
1
requirements

Examples of other requirements this task affects

I24: Varmuuskopiointi
Katakri
See all related requirements and other information from tasks own page.
Go to >
Salassa pidettävää tietoa sisältävien varmuuskopioiden suojaus (ST IV)
1. Task description

Varmuuskopioinnin tavoitteena on rajata menetettävän tiedon määrää ja pystyä palauttamaan tiedot tarpeeksi nopeasti ja luotettavasti.

Suojaustasolla IV toteutetaan seuraavat toimenpiteet varmuuskopioiden suojaamiseksi:

  • Varmuuskopiot käsitellään ja säilytetään niiden elinkaaren ajan vähintään ko. suojaustason järjestelmissä
  • Käsiteltäessä samalla varmistusjärjestelmällä tarkastusoikeuden varaavien eri omistajien tietoja, tarkastusoikeuden mahdollistavat erottelumenettelyt on toteutettava ko. suojaustason mukaisesti varmistusjärjestelmän liittymien ja tallennemedioiden osalta
  • Varmuuskopioiden siirtämiseen sovelletaan samoja toimintatapoja kuin muun tietoaineiston siirtämiseen
  • Varmistusmediat hävitetään ko. suojaustason mukaisesti
Determining responsibilities for backing up important information assets
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Backups
19
requirements

Examples of other requirements this task affects

12.3: Backup
ISO27 Full
12.3.1: Information backup
ISO27 Full
I24: Varmuuskopiointi
Katakri
PR.IP-4: Backups
NIST
TEK-20: Varmuuskopiointi
Julkri
See all related requirements and other information from tasks own page.
Go to >
Determining responsibilities for backing up important information assets
1. Task description

With adequate backups, all important data and programs can be restored after a disaster or media failure. An important first step in a functional backup strategy is to identify who is responsible for backing up each piece of data. Determining the responsibility for backup is the responsibility of the owners of the information assets (systems, hardware).

If the backup is the responsibility of the partner, we will find out:

  • how comprehensively does the partner back up the data?
  • how the data can be recovered if necessary?
  • how the backups are agreed in the contracts?

If the backup is our own responsibility, we will find out:

  • whether the data backup process exists and is documented?
  • whether the coverage and implementation cycle of the backup is at the level required by the importance of the data?
Preparing for quick data recovery after faults
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Backups
13
requirements

Examples of other requirements this task affects

12.3: Backup
ISO27 Full
12.3.1: Information backup
ISO27 Full
17.1.2: Implementing information security continuity
ISO27 Full
PR.PT-5: Mechanisms
NIST
TEK-22: Tietojärjestelmien saatavuus
Julkri
See all related requirements and other information from tasks own page.
Go to >
Preparing for quick data recovery after faults
1. Task description

Restorability refers to how quickly personal data are restored to be available and accessible in the event of a physical or technical failure.

Backup master images of operating systems and installation software
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Backups
1
requirements

Examples of other requirements this task affects

2.9.2: Include backups of software to ensure recovery
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Backup master images of operating systems and installation software
1. Task description

Backup master images of operating systems and installation software to ensure recovery capabilities from a software perspective.

Protecting backups against intentional and unintentional deletion and manipulation
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Backups
1
requirements

Examples of other requirements this task affects

2.9.4: Protect backups against intentional and unintentional deletion, manipulation and reading
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Protecting backups against intentional and unintentional deletion and manipulation
1. Task description

Copies of backups must be kept separate from the organization's production environment. Access to these copies should be restricted to only employees and system processes involved in data restoration.

Backups, which are inaccessible through the organization's networks, should be created regularly.

These security measures ensures the integrity and availability of the backups.

Performing automated backups of enterprise assets
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Backups
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Performing automated backups of enterprise assets
1. Task description

The organization enhances data protection by employing backup automation software to routinely back up enterprise assets, defining a clear backup frequency and retention policy, using redundant solutions for increased availability, and regularly monitoring and testing backup integrity.

Protecting recovery data
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Backups
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Protecting recovery data
1. Task description

The organization secures recovery data by implementing robust encryption techniques, enforcing strict access controls, and conducting regular security audits. Data masking and anonymization are applied for additional protection, while checksums and hashing maintain data integrity.

Defining a backup strategy
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Backups
14
requirements

Examples of other requirements this task affects

12.3: Backup
ISO27 Full
12.3.1: Information backup
ISO27 Full
TEK-20: Varmuuskopiointi
Julkri
8.13: Information backup
ISO27k1 Full
A1.2: Recovery of infrastructure according to objectives
SOC 2
See all related requirements and other information from tasks own page.
Go to >
Defining a backup strategy
1. Task description

With adequate backups, all important data and programs can be restored after a disaster or media failure. To determine your backup strategy, it is important to map / decide on at least the following:

  • What systems are on our responsibility to back up?
  • How critical is each data asset and how often, based on this, they need to be backed up and to what extent (partial or complete copy)?
  • Where are backups stored and how are they protected?
  • How long will backups need to be retained?
  • What system is used for doing the back up?
  • How backup media is destroyed reliably

Universal cyber compliance language model: Comply with confidence and least effort

In Cyberday, all frameworks’ requirements are mapped into universal tasks, so you achieve multi-framework compliance effortlessly.

Security frameworks tend to share the common core. All frameworks cover basic topics like risk management, backup, malware, personnel awareness or access management in their respective sections.
Cyberday’s universal cyber security language technology creates you a single security plan and ensures you implement the common parts of frameworks just once. You focus on implementing your plan, we automate the compliance part - for current and upcoming frameworks.
Start your free trial
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.
No items found.