Enhancing Network Security: Best Practices for Data Backup Procedures
Frequent Automated Backups
Frequent Automated Backups may seem like a simple, regular process that could be postponed or overlooked; however, frequent automated backups form the backbone of data recovery because an organization can only duplicate, protect, and test the data it has in its possession. A rolling weekly backup with daily partial backups that contain the updates since the last partial or full backup protect organizations from data loss. On complex projects, even minimal data loss can cause a significant impact to business operations.
Protect Recovery Data
Encrypting backup data protects an organization’s sensitive information from being immediately visible when a malicious actor gains unauthorized access to backup storage.
Data Separation
Recovery data should be kept completely separate from primary data to protect an organization from malware infections across datasets, hardware failures, and natural disasters. Storing data in multiple secure locations provides redundancy in the event of unanticipated natural disasters. A reasonable solution for most organizations is Network Segmentation, VLANs and Firewalls for data separation. In extreme cases such as Government Defense, Air Gapped Networks provide a stronger solution than VLANs in ensuring data separation, and Data Diodes provide a stronger solution than firewalls when facilitating data transfer in a mature organization with an advanced budget.
Establishing a secure standard for Data Recovery Procedures
According to the CIS Control 11, comprehensive implementation of Data Recovery Procedures should include:
- Establish and Maintain a Data Recovery Process
- Perform Automated Backups
- Protect Recovery Data
- Establish and Maintain an Isolated Instance of Recovery Data
- Test Data Recovery
Through categorized security implementation groups, the CIS Control 11 recommends a minimum standard of 1-4 for smaller organizations and a standard of 1-5 for mid-sized to mature organizations.
Comments
Post a Comment