RC.RP-03.350
Does your organization verify restoration assets for integrity issues and indicators of compromise before using them in recovery operations?
Explanation
This question assesses whether your organization performs integrity checks on backup data, system images, or other restoration assets before using them to recover from incidents. These checks should include scanning for malware, verifying file integrity through checksums or hashes, and confirming the absence of unauthorized modifications that could reintroduce compromises into restored systems. Evidence could include documented restoration procedures that specify integrity verification steps, logs from integrity verification tools showing pre-restoration checks, or screenshots of security scanning results performed on restoration assets prior to deployment.
Implementation Example
Check restoration assets for indicators of compromise, file corruption, and other integrity issues before use
ID: RC.RP-03.350
Context
- Function
- RC: RECOVER
- Category
- RC.RP: Incident Recovery Plan Execution
- Sub-Category
- The integrity of backups and other restoration assets is verified before using them for restoration

