Skip to main content
← All controls
CP-9 / CP-9(1) / CP-4 / A.12.3.1 / CIS-11.3 NIST SP 800-53 Rev 5 SOC 2

Are backups taken, secured, and tested (at least one full restore in the last 12 months)?

Demonstrate that the organization maintains a functional backup and recovery capability, with backups occurring on schedule, stored securely, and validated through documented full restore testing within the preceding 12 months.

Description

What this control does

This control ensures that critical business systems and data are backed up on a defined schedule, that backup media and storage locations are protected against unauthorized access and environmental hazards, and that restore procedures are validated through at least one full restoration exercise annually. Backups must be encrypted in transit and at rest, stored in geographically separate locations where applicable, and tested to confirm recoverability within defined recovery time objectives (RTOs). This control directly supports business continuity and disaster recovery capabilities required under SOC 2 availability and confidentiality criteria.

Control objective

What auditing this proves

Demonstrate that the organization maintains a functional backup and recovery capability, with backups occurring on schedule, stored securely, and validated through documented full restore testing within the preceding 12 months.

Associated risks

Risks this control addresses

  • Ransomware attack encrypts production systems and accessible backup repositories, rendering all data irrecoverable
  • Hardware failure, natural disaster, or data center outage destroys primary systems without viable backup to restore from
  • Backup processes silently fail for extended periods without detection, leaving no restorable data when needed
  • Untested backups contain corrupted, incomplete, or misconfigured data that cannot be successfully restored during actual incidents
  • Backup media stored alongside production systems are destroyed in the same physical incident
  • Unencrypted or inadequately secured backups expose confidential customer data to unauthorized access or exfiltration
  • Retention policies fail to maintain required historical data, causing compliance violations or inability to meet legal holds

Testing procedure

How an auditor verifies this control

  1. Obtain and review the organization's backup policy documenting backup frequency, retention periods, storage locations, encryption requirements, and testing schedules.
  2. Request a current inventory of all systems and datasets subject to backup requirements, including databases, file servers, application servers, virtual machines, and SaaS configurations.
  3. Select a representative sample of critical systems from the inventory and obtain backup logs or job reports covering the most recent 90-day period.
  4. Verify through log review that scheduled backups completed successfully for sampled systems without errors, gaps, or extended failures.
  5. Examine backup storage configurations to confirm encryption at rest and in transit, access controls restricting backup administrator privileges, and physical or logical separation from production environments.
  6. Request documentation of the most recent full restore test conducted within the last 12 months, including test plan, systems restored, success criteria, duration, issues identified, and remediation.
  7. Interview the backup administrator or IT operations manager to confirm the restore test procedure, validate that restored data was verified for integrity and completeness, and review any lessons learned.
  8. Review monitoring and alerting configurations to confirm that backup job failures trigger timely notifications to responsible personnel.
Evidence required Auditor collects backup policy documents, system inventory lists, backup job logs or reports spanning 90 days for sampled systems, screenshots or configuration exports showing encryption settings and access controls for backup repositories, and complete restore test documentation including test plan, execution logs, verification results, and sign-off from the most recent annual full restore exercise. Additional evidence includes alert configuration screenshots and email notifications demonstrating monitoring of backup job status.
Pass criteria The control passes if all sampled systems show successful scheduled backups within defined intervals over the review period, backup storage demonstrates encryption and access restrictions, and documented evidence confirms at least one complete full restore test was successfully executed and validated within the preceding 12 months.