data.gift
  • Datasets

http://cyfun.data.gift/data/requirement_PR_DS_11_3

http://cyfun.data.gift/data/requirement_PR_DS_11_3
Concept

  • http://cyfun.data.gift/data/CyFun2025

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_delta_BASIC_to_IMPORTANT

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_IMPORTANT

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_ESSENTIAL

    • External link
    • Internal link

  • http://cyfun.data.gift/data/subcategory_PR.DS-11

    • External link
    • Internal link

Properties and relations

Direct links from the subject.

Property Value

type

The subject is an instance of a class.

  • External link
  • Internal link

http://cyfun.data.gift/ontology#Requirement

  • External link
  • Internal link

type

The subject is an instance of a class.

  • External link
  • Internal link

Concept

An idea or notion; a unit of thought.

  • External link
  • Internal link

label

A human-readable name for the subject.

  • External link
  • Internal link

PR.DS-11.3: The organisation shall maintain secure backups of business-critical data in a separate storage location to ensure data availability in case of system failure or data loss. Backup storage shall apply equivalent security controls as the primary environment.

http://cyfun.data.gift/ontology#requirementId

  • External link
  • Internal link

PR.DS-11.3

http://cyfun.data.gift/ontology#foundIn

  • External link
  • Internal link

http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p117

  • External link
  • Internal link

http://cyfun.data.gift/ontology#foundIn

  • External link
  • Internal link

http://cyfun.data.gift/data/loc_CyFun2025_Booklet_IMPORTANT_E_p83

  • External link
  • Internal link

has broader

Relates a concept to a concept that is more general in meaning.

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_PR.DS-11

  • External link
  • Internal link

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to ensure that the organisation can reliably recover its business-critical data in two key scenarios: - Natural disasters or physical damage to the primary site (requiring offsite or cloud-based backups). - Advanced cyberattacks, including ransomware or insider threats, where attackers may attempt to corrupt or delete backups (requiring isolated or tamper-proof backups). This control helps ensure that an organisation can recover its critical data if something goes wrong. It focuses on keeping backups separate and just as secure as the original data, making it especiallyuseful fororganisations that are still building up their cybersecurity capabilities (organisations with less mature security posture). - Backup Strategy to be considered - To meet these objectives, the organisation should implement a diversified and resilient backup approach, such as the 3-2-1 backup rule: - Maintain three copies of business-critical data. - Store these copies on at least two different types of storage media (e.g. local disk and cloud). - Ensure at least one copy is stored offsite or off-premises, in a physically separate location. - To protect against both physical and cyber threats, the organisation should consider the following backup types: - Offsite or Cloud Backups These backups are stored in a geographically separate location and help ensure recoverability in case of natural disasters or physical damage to the primary site. - Immutable Backups These are backups that cannot be altered or deleted for a defined period. They are especially effective against ransomware and insider threats, and can be automated to reduce manual effort. - Offline or Air-Gapped Backups These are backups stored on devices that are completely disconnected from any network, including the internet.This isolation ensures that even ifthe organisation’s network is compromised, the backup remains untouched. - Additional Considerations - GeographicSeparation: Backup locations should be in different physical regions to reduce the risk ofsimul- taneous impact from regional disasters. - Security Parity: All backup locations should implement the same level of security controls as the primary environment (e.g. encryption, access control, monitoring). - RegularTesting: Backup and recovery procedures should be tested regularly to ensure data integrity and operational readiness.

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to ensure that the organisation can reliably recover its business-critical data in two key scenarios: - Natural disasters or physical damage to the primary site (requiring offsite or cloud-based backups). - Advanced cyberattacks, including ransomware or insider threats, where attackers may attempt to corrupt or delete backups (requiring isolated or tamper-proof backups). This control helps ensure that an organisation can recover its critical data if something goes wrong. It focuses on keeping backups separate and just as secure as the original data, making it especiallyuseful fororganisations that are still building up their cybersecurity capabilities (organisations with less mature security posture). - Backup Strategy to be considered - To meet these objectives, the organisation should implement a diversified and resilient backup approach, such as the 3-2-1 backup rule: - Maintain three copies of business-critical data. - Store these copies on at least two different types of storage media (e.g. local disk and cloud). - Ensure at least one copy is stored offsite or off-premises, in a physically separate location. - To protect against both physical and cyber threats, the organisation should consider the following backup types: - Offsite or Cloud Backups These backups are stored in a geographically separate location and help ensure recoverability in case of natural disasters or physical damage to the primary site. - Immutable Backups These are backups that cannot be altered or deleted for a defined period. They are especially effective against ransomware and insider threats, and can be automated to reduce manual effort. - Offline or Air-Gapped Backups These are backups stored on devices that are completely disconnected from any network, including the internet.This isolation ensures that even ifthe organisation’s network is compromised, the backup remains untouched. - Additional Considerations - GeographicSeparation: Backup locations should be in different physical regions to reduce the risk ofsimul- taneous impact from regional disasters. - Security Parity: All backup locations should implement the same level of security controls as the primary environment (e.g. encryption, access control, monitoring). - RegularTesting: Backup and recovery procedures should be tested regularly to ensure data integrity and operational readiness.

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to ensure that the organisation can reliably recover its business-critical data in two key scenarios: • Natural disasters or physical damage to the primary site (requiring offsite or cloud-based backups). • Advanced cyberattacks, including ransomware or insider threats, where attackers may attempt to corrupt or delete backups (requiring isolated or tamper-proof backups). This control helps ensure that an organisation can recover its critical data if something goes wrong. It focuses on keeping backups separate and just as secure as the original data, making it especiallyuseful fororganisations that are still building up their cybersecurity capabilities (organisations with less mature security posture). • Backup Strategy to be considered o To meet these objectives, the organisation should implement a diversified and resilient backup approach, such as the 3-2-1 backup rule: - Maintain three copies of business-critical data. - Store these copies on at least two different types of storage media (e.g. local disk and cloud). - Ensure at least one copy is stored offsite or off-premises, in a physically separate location. • To protect against both physical and cyber threats, the organisation should consider the following backup types: o Offsite or Cloud Backups These backups are stored in a geographically separate location and help ensure recoverability in case of natural disasters or physical damage to the primary site. o Immutable Backups These are backups that cannot be altered or deleted for a defined period. They are especially effective against ransomware and insider threats, and can be automated to reduce manual effort. o Offline or Air-Gapped Backups These are backups stored on devices that are completely disconnected from any network, including the internet.This isolation ensures that even ifthe organisation’s network is compromised, the backup remains untouched. • Additional Considerations o GeographicSeparation: Backup locations should be in different physical regions to reduce the risk ofsimul- taneous impact from regional disasters. o Security Parity: All backup locations should implement the same level of security controls as the primary environment (e.g. encryption, access control, monitoring). o RegularTesting: Backup and recovery procedures should be tested regularly to ensure data integrity and operational readiness.

note

A general note, for any purpose.

  • External link
  • Internal link

<div><p>The goal of this control is to ensure that the organisation can reliably recover its business-critical data in two key scenarios:</p><ul><li>Natural disasters or physical damage to the primary site (requiring offsite or cloud-based backups).</li><li>Advanced cyberattacks, including ransomware or insider threats, where attackers may attempt to corrupt or delete backups (requiring isolated or tamper-proof backups). This control helps ensure that an organisation can recover its critical data if something goes wrong. It focuses on keeping backups separate and just as secure as the original data, making it especiallyuseful fororganisations that are still building up their cybersecurity capabilities (organisations with less mature security posture).</li><li>Backup Strategy to be considered<ul><li>To meet these objectives, the organisation should implement a diversified and resilient backup approach, such as the 3-2-1 backup rule:<ul><li>Maintain three copies of business-critical data.</li><li>Store these copies on at least two different types of storage media (e.g. local disk and cloud).</li><li>Ensure at least one copy is stored offsite or off-premises, in a physically separate location.</li></ul></li></ul></li><li>To protect against both physical and cyber threats, the organisation should consider the following backup types:<ul><li>Offsite or Cloud Backups These backups are stored in a geographically separate location and help ensure recoverability in case of natural disasters or physical damage to the primary site.</li><li>Immutable Backups These are backups that cannot be altered or deleted for a defined period. They are especially effective against ransomware and insider threats, and can be automated to reduce manual effort.</li><li>Offline or Air-Gapped Backups These are backups stored on devices that are completely disconnected from any network, including the internet.This isolation ensures that even ifthe organisation’s network is compromised, the backup remains untouched.</li></ul></li><li>Additional Considerations<ul><li>GeographicSeparation: Backup locations should be in different physical regions to reduce the risk ofsimul- taneous impact from regional disasters.</li><li>Security Parity: All backup locations should implement the same level of security controls as the primary environment (e.g. encryption, access control, monitoring).</li><li>RegularTesting: Backup and recovery procedures should be tested regularly to ensure data integrity and operational readiness.</li></ul></li></ul></div>

notation

A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme.

  • External link
  • Internal link

PR.DS-11.3

alternative label

skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties.

  • External link
  • Internal link

Secure offsite backup storage

preferred label

A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag.

  • External link
  • Internal link

The organisation shall maintain secure backups of business-critical data in a separate storage location to ensure data availability in case of system failure or data loss. Backup storage shall apply equivalent security controls as the primary environment.

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_delta_BASIC_to_IMPORTANT

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_IMPORTANT

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_ESSENTIAL

  • External link
  • Internal link

http://cyfun.data.gift/ontology#level

  • External link
  • Internal link

http://cyfun.data.gift/data/level_IMPORTANT

  • External link
  • Internal link

triple count

The number of triples associated with the subject.

  • External link
  • Internal link

19

in dataset

Specifies the dataset the subject is part of.

  • External link
  • Internal link

http://data.gift/d/datasets/69E8863AA6CE46D9ACD13109

  • External link
  • Internal link

Resultaten 1 - 21 of 21

References

Inverse links to the subject.

Property Subject

http://cyfun.data.gift/ontology#hasRequirement

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_PR.DS-11

  • External link
  • Internal link

has narrower

Relates a concept to a concept that is more specific in meaning.

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_PR.DS-11

  • External link
  • Internal link

Resultaten 1 - 1 of 1

© 2024 redpencil.io. All rights reserved.