From: Mapping the coverage of security controls in cyber insurance proposal forms
CSC10: data recovery | Questions |
---|---|
10.1 Each system is automatically backed every week | 14 |
10.2 Perform test data restoration process regularly | 5 |
10.3 Backups protected via physical security or encryption where stored | 9 |
10.4 Key systems have a backup not continuously | 0 |
addressable via operating system calls | Â |