Malware Defenses

Use behavior-based anti-malware software.


Login

Data Recovery

Establish and maintain a data recovery process. In the process, address the scope of data recovery activities, recovery prioritization, and the security of backup data. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.


Login

Data Recovery

Perform automated backups of in-scope enterprise assets. Run backups weekly, or more frequently, based on the sensitivity of the data.


Login

Data Recovery

Protect recovery data with equivalent controls to the original data. Reference encryption or data separation, based on requirements.


Login

Data Recovery

Establish and maintain an isolated instance of recovery data. Example implementations include, version controlling backup destinations through offline, cloud, or off-site systems or services.


Login

Data Recovery

Test backup recovery quarterly, or more frequently, for a sampling of in-scope enterprise assets.


Login

Network Infrastructure Management

Ensure network infrastructure is kept up-to-date. Example implementations include running the latest stable release of software and/or using currently supported network-as-a-service (NaaS) offerings. Review software versions monthly, or more frequently, to verify software support.


Login

Network Infrastructure Management

Establish and maintain a secure network architecture. A secure network architecture must address segmentation, least privilege, and availability, at a minimum.


Login

Network Infrastructure Management

Securely manage network infrastructure. Example implementations include version-controlled-infrastructure-as-code, and the use of secure network protocols, such as SSH and HTTPS.


Login

Network Infrastructure Management

Establish and maintain architecture diagram(s) and/or other network system documentation. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.


Login