2.1.4 The Backups Should be Properly Secured

Information

The backup files will contain all data in the databases. Filesystem permissions and/or encryption should be used to prevent unauthorized users from gaining access to the backups.

Rationale:

Backups should be considered sensitive information. If an unauthorized user can access backups, then they have access to all data in the database. This is true for unencrypted backups and for encrypted backups if the encryption key is stored along with the backup.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Implement encryption, properly restrict filesystem permissions, protect and backup encryption keys.

See Also

https://workbench.cisecurity.org/files/3844

Item Details

Category: CONTINGENCY PLANNING, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|CP-9, 800-53|SC-28, CSCv7|10.4

Plugin: Unix

Control ID: 0aa60e500af7536fed724a410b6e9d3f66b6c62281592fb9689e4ca5b1ad8989