Skip to main content

Table 8 Sub-controls for the Data Recovery control

From: Mapping the coverage of security controls in cyber insurance proposal forms

CSC10: data recovery

Questions

10.1 Each system is automatically backed every week

14

10.2 Perform test data restoration process regularly

5

10.3 Backups protected via physical security or encryption where stored

9

10.4 Key systems have a backup not continuously

0

addressable via operating system calls

Â