10.2: Perform Complete System Backups

Sub-control 10.2 states that you must ensure that all of the organization’s key systems are backed up as a complete system, through processes such as imaging, to enable the quick recovery of an entire system.

Asset Type Security Function Implementation Groups
Data Protect 1, 2, 3

Dependencies

  • Sub-control 1.4: Maintain Detailed Asset Inventory
  • Sub-control 1.5: Maintain Asset Inventory Information
  • Sub-control 5.1: Establish Secure Configurations

Inputs

  1. Key Systems: The list of “key systems” identified by the organization, as derived from the endpoint inventory (sub-control 1.4).

  2. Backup configuration policy: The organization’s backup/imaging configuration policy.

Assumptions

  • Backup software (either OS or 3d party) is installed and appropriately configured on the “key systems” identified in I1.

Operations

  1. For each endpoint in the list of “key systems”, examine its backup configuration against the available backup configuration policy. Note which endpoints are configured appropriately and inappropriately.

Measures

Measure Definition
M1 = List of "key system" endpoints

A list of "key system" endpoints.

M2 = Count of items in M1

A count of the total number of items in M1.

M3 = List of appropriately configured “key systems” A list of “key systems” that are configured correctly.
M4 = Count of items in M3 A count of the total number of items in M3.
M5 = List of inappropriately configured “key systems” A list of “key systems” that are configured incorrectly.
M6 = Count of items in M5 A count of the total number of items in M5.

Metrics

Coverage

Metric Calculation
The percentage of key systems that are successfully backed up as a complete system. M4 / M2