1.5 Ensure backup data is stored and transferred securely

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Backups of router configuration should be secured.

Rationale:
If an attacker has access to your router configuration files they have gained a lot of sensitive information about your network topology, defenses, weaknesses, critical servers and possibly your VPN keys and login information.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

A discussion of securing your backup services is beyond the scope of this Benchmark, but at a minimum you should consider the following:
- Never transfer configuration files using plain text protocols such as Telnet or FTP. Use SSH or SCP instead.
- Restrict access to backups to the least number of administrative users possible.
- Store offline backups in a physically secure, fire resistant, air tight safe.
- Log access and changes to backups.
- Secure any server that stores backups using the appropriate Center for Internet Security Benchmark.
- Disable all unused services on the backup server.

See Also

https://workbench.cisecurity.org/files/2278