Skip to main content
← All controls
A.5.29 / A.5.30 / A.17.1.1 / A.17.1.2 / A.17.1.3 / CP-9 / CP-10 ISO/IEC 27001:2022 Annex A NIS2

Do you have backups + disaster recovery + crisis management capability (Art 21.2.c)?

Demonstrate that the organization maintains documented, tested, and operationally ready backup systems, disaster recovery procedures, and crisis management structures capable of preserving data, restoring critical functions, and coordinating incident response in compliance with NIS2 Article 21.2(c) requirements.

Description

What this control does

This control mandates the implementation of three interconnected capabilities as required by NIS2 Article 21.2(c): backup systems to preserve data integrity and availability, disaster recovery procedures to restore critical operations after disruptive incidents, and crisis management structures to coordinate organizational response during active cyber incidents or operational failures. The control ensures business continuity through tested technical redundancy (backups), documented recovery workflows (DR), and governance frameworks (crisis management) that enable rapid escalation, decision-making, and communication. NIS2 specifically requires these capabilities to be documented, regularly tested, and proportionate to the entity's risk profile and criticality.

Control objective

What auditing this proves

Demonstrate that the organization maintains documented, tested, and operationally ready backup systems, disaster recovery procedures, and crisis management structures capable of preserving data, restoring critical functions, and coordinating incident response in compliance with NIS2 Article 21.2(c) requirements.

Associated risks

Risks this control addresses

  • Ransomware or destructive malware rendering production systems and accessible backups simultaneously unusable due to inadequate air-gapping or immutability controls
  • Extended service outages exceeding recovery time objectives when disaster recovery plans are untested, outdated, or lack critical infrastructure dependencies
  • Data loss beyond recovery point objectives due to backup failures, corruption, or insufficient retention policies
  • Disorganized crisis response causing delayed containment, ineffective stakeholder communication, and regulatory notification failures during active cyber incidents
  • Inability to restore operations after physical disasters, cloud provider failures, or supply chain disruptions due to single points of failure in recovery architecture
  • Legal and regulatory penalties under NIS2 for failure to implement mandatory business continuity measures
  • Reputational damage and customer attrition when critical services remain unavailable beyond acceptable timeframes

Testing procedure

How an auditor verifies this control

  1. Obtain and review the documented backup policy including scope, frequency, retention periods, storage locations, encryption requirements, and responsibilities
  2. Obtain and review the disaster recovery plan documenting recovery procedures, RTO/RPO definitions, system dependencies, failover sequences, and contact information
  3. Obtain and review the crisis management framework including escalation matrices, decision-making authorities, communication templates, and regulatory notification procedures
  4. Verify backup implementation by examining configuration exports from backup systems showing scheduling, versioning, immutability settings, and off-site/air-gapped storage
  5. Sample recent backup logs and restoration test records to confirm backups execute successfully, are restorable, and meet documented RPO requirements
  6. Review disaster recovery test reports from the past 12 months documenting test scenarios, participant roles, recovery durations, gaps identified, and remediation actions
  7. Interview crisis management team members to verify awareness of roles, validate availability of communication tools during crises, and confirm understanding of escalation thresholds
  8. Trace a critical system through all three capabilities: verify its inclusion in backup scope, presence in DR runbooks with specific recovery steps, and representation in crisis scenario documentation
Evidence required Collect backup policy documents, disaster recovery plans, and crisis management frameworks with version control and approval records. Obtain backup system configuration exports showing schedules and immutability settings, restoration test reports with timestamps and success metrics, disaster recovery test after-action reports including measured RTOs, and crisis management exercise documentation with participant lists and lessons learned. Capture evidence of regulatory alignment such as NIS2 risk assessment mappings to recovery objectives.
Pass criteria The control passes when documented backup, disaster recovery, and crisis management capabilities exist with evidence of regular testing (at least annually for DR and crisis exercises), successful backup restorations within defined RPO/RTO parameters, and operational readiness demonstrated through documented exercises that include identified gaps and completed remediation actions.