STIGhub
STIGs
RMF Controls
Compare
← All Controls
CP-9
Contingency Planning
Rev 5
System Backup
CCI Identifiers (12)
CCI-000534
Defines the frequency of conducting user-level information backups to support recovery time objectives and recovery point objectives.
CCI-000535
Conduct backups of user-level information contained in organization-defined system components per organization-defined frequency that is consistent with recovery time and recovery point objectives.
CCI-000536
Defines the frequency of conducting system-level information backups to support recovery time objectives and recovery point objectives.
CCI-000537
Conduct backups of system-level information contained in the system per organization-defined frequency that is consistent with recovery time and recovery point objectives.
CCI-000538
Defines the frequency of conducting system documentation backups, including security-related documentation, to support recovery time objectives and recovery point objectives.
CCI-000539
Conduct backups of system documentation, including security-related documentation, per an organization-defined frequency that is consistent with recovery time and recovery point objectives.
CCI-000540
The organization protects the confidentiality, integrity, and availability of backup information at storage locations.
CCI-004023
Protect integrity of backup information.
CCI-004024
Protect the availability of backup information.
CCI-004020
Defines the system components to conduct backups of user level information.
CCI-004021
Conduct backups of system documentation, including privacy-related documentation, per an organization-defined frequency that is consistent with recovery time and recovery point objectives.
CCI-004022
Protect the confidentiality of backup information.
Linked STIG Checks (52)
Across 39 STIGs. Click to expand.
▶
Application Security and Development Security Technical Implementation Guide
3 checks
▶
Arista MLS DCS-7000 Series NDM Security Technical Implementation Guide
1 check
▶
Arista MLS EOS 4.2x NDM Security Technical Implementation Guide
1 check
▶
Arista MLS EOS 4.X NDM Security Technical Implementation Guide
1 check
▶
Cisco ACI NDM Security Technical Implementation Guide
1 check
▶
Cisco ASA NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS Router NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS Switch NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS XE Router NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS XE Switch NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS XR Router NDM Security Technical Implementation Guide
1 check
▶
Cisco ISE NDM Security Technical Implementation Guide
1 check
▶
Cisco NX OS Switch NDM Security Technical Implementation Guide
1 check
▶
F5 BIG-IP Device Management Security Technical Implementation Guide
2 checks
▶
F5 BIG-IP TMOS NDM Security Technical Implementation Guide
1 check
▶
ForeScout CounterACT NDM Security Technical Implementation Guide
2 checks
▶
Forescout Network Device Management Security Technical Implementation Guide
2 checks
▶
Fortinet FortiGate Firewall NDM Security Technical Implementation Guide
2 checks
▶
HP FlexFabric Switch NDM Security Technical Implementation Guide
1 check
▶
HPE Aruba Networking AOS NDM Security Technical Implementation Guide
2 checks
▶
HYCU Protege Security Technical Implementation Guide
2 checks
▶
IBM DataPower Network Device Management Security Technical Implementation Guide
1 check
▶
IBM MQ Appliance v9.0 NDM Security Technical Implementation Guide
1 check
▶
IBM z/OS ACF2 Security Technical Implementation Guide
1 check
▶
Ivanti Connect Secure NDM Security Technical Implementation Guide
2 checks
▶
Ivanti Sentry 9.x NDM Security Technical Implementation Guide
1 check
▶
Juniper EX Series Switches Network Device Management Security Technical Implementation Guide
1 check
▶
Juniper Router NDM Security Technical Implementation Guide
1 check
▶
Microsoft SCOM Security Technical Implementation Guide
1 check
▶
NetApp ONTAP DSC 9.x Security Technical Implementation Guide
1 check
▶
Network Device Management Security Requirements Guide
2 checks
▶
Riverbed NetIM NDM Security Technical Implementation Guide
1 check
▶
Riverbed NetProfiler Security Technical Implementation Guide
1 check
▶
Symantec Edge SWG NDM Security Technical Implementation Guide
1 check
▶
Symantec ProxySG NDM Security Technical Implementation Guide
1 check
▶
Trend Micro TippingPoint NDM Security Technical Implementation Guide
2 checks
▶
VMware NSX 4.x Manager NDM Security Technical Implementation Guide
1 check
▶
VMware NSX Manager Security Technical Implementation Guide
2 checks
▶
VMware NSX-T Manager NDM Security Technical Implementation Guide
2 checks