Backup of Configuration and Related Files

Details

It is important to include configuration, log, key, certificates, and customized files in backups.

Rationale:

Including all configuration, log, key, certificates, and customized files in any backup will ensure the backup can fully restore an instance.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Add any omitted files to the backup.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Contingency Planning.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles