The entity authorizes, designs, develops or acquires, implements, operates, approves, maintains, and monitors environmental protections, software, data back- up processes, and recovery infrastructure to meet its objectives.
Points of focus:
- Identifies Environmental Threats
- Designs Detection Measures
- Implements and Maintains Environmental Protection Mechanisms
- Implements Alerts to Analyze Anomalies
- Responds to Environmental Threat Events
- Communicates and Reviews Detected Environmental Threat Events
- Determines Data Requiring Backup
- Performs Data Backup
- Addresses Offsite Storage
- Implements Alternate Processing Infrastructure
In connection with the data systems listing, we describe for which systems we are responsible for the implementation of the backup. The organization’s own backup processes are documented and an owner is assigned to each. The documentation includes e.g.:
The media used for backups and the restoration of backups are tested regularly to ensure that they can be relied on in an emergency.
Accurate and complete instructions are maintained for restoring backups. The policy is used to monitor the operation of backups and to prepare for backup failures.
For example, data processing equipment, as well as other important equipment, should be placed in the premises safely and with consideration. Placement should restrict unauthorized access to devices.
Equipment should be serviced at intervals recommended by the supplier and in accordance with the supplier's specifications.
The operation of basic services (such as electricity, telecommunications, water supply, sewerage, heating, ventilation and air conditioning) will be monitored to ensure that their capacity covers business growth.
Restorability refers to how quickly personal data are restored to be available and accessible in the event of a physical or technical failure.
The organization should take into account environmental threats that may affect the usability of systems as part of the risk assessment process and also as part of the information security incident process.
Environmental threats include, for example:
With adequate backups, all important data and programs can be restored after a disaster or media failure. To determine your backup strategy, it is important to map / decide on at least the following:
Alarm systems monitor the level of key environmental conditions (e.g. temperature and humidity) that can adversely affect the operation of data processing equipment. There should also be a functioning fire alarm system in the environment.
Maintenance performed on the equipment is recorded in a log, which contains information e.g.:
In Cyberday, all frameworks’ requirements are mapped into universal tasks, so you achieve multi-framework compliance effortlessly.