Time
9 hours 24 minutes
Difficulty
Intermediate
CEU/CPE
9

Video Transcription

00:00
Hey, everyone, welcome back to the course. So in the last video, we just took a overview of control number 10. So again, that's the data recovery capabilities and this video, we're just going to take a look at how control number 10 maps up to the Miss cybersecurity framework.
00:13
So sub control 10.1, ensuring we have got regular automated backups. So again we may be doing different types of backups for maybe do a full backups differential. Backups, Whatever the case, might be your organization. We have specific policies and procedures around the backups, but they definitely need to be automated.
00:32
And the other thing I'll mention there is. Make sure you store the backups on different medium. Don't just have him going to one. Uh, let's just say, for example, one cloud provider. You want to make sure that you're storing on different mediums. So that way, if you get hit with, like ransom, where you've always got a backup, you can go to
00:47
some control. 10.2 performing complete system backup. So going along the different types of backups we want to make sure we're doing at least full backups. Every so often that's really going to depend on your particular organisations needs
01:00
some control. 10.3. We want to test the data on the backup media. Make sure that we've actually got good data on there. Make sure the integrity is maintained. So that maps up to a couple of nous cybersecurity framework items pr ds Dash six n p r i p Dash four
01:17
Some controlled 10.4 ensure our backups are protected. Right, So that's where we go into PR DS DS Dash one we're talking about the data at rest is protected to our backups. Are that data at rest?
01:30
Some control 10.5 It's during the backups have at least one non continuously addressable destination. I mentioned that earlier ride just a moment of so a moment ago.
01:41
We want to make sure that we don't have one single location. The backups are going to want to store them in multiple locations, so we always have a backup to get from.
01:51
So this video we just took a very high level overview of how the, uh
01:55
control number 10 maps to the new cybersecurity framework
01:57
in the next video were to take a look at our *** Data backup and Recovery lab. And it's gonna be very, very short lab. Just want to forewarn you on. That is very simple lab to do. But again, there is a step by step guide you confined in the resource of section of the course for the lab will do in the next video.

Up Next

CIS Top 20 Critical Security Controls

This course will provide students with an overview of the CIS Top 20 Critical Security Controls v7.1. Students in this course will learn each CIS control and why it is important to an organization.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor