Skip to main content
โ† All controls
CP-9 / CP-9(8) / A.8.13 / CIS-11.3 NIST SP 800-53 Rev 5

Offline / immutable backups + quarterly restore test

Demonstrate that the organization maintains ransomware-resistant backup copies isolated from production systems and validates their recoverability through documented quarterly restoration exercises.

Description

What this control does

This control requires organizations to maintain backup copies that are either physically disconnected from production networks (offline) or stored in write-once-read-many (WORM) formats that prevent modification or deletion (immutable). These backups are protected from ransomware, insider threats, and automated deletion cascades. A formal quarterly restore test process validates recoverability by attempting to restore data from these protected backups to a test environment, measuring success rate, recovery time, and data integrity to ensure business continuity capabilities remain functional.

Control objective

What auditing this proves

Demonstrate that the organization maintains ransomware-resistant backup copies isolated from production systems and validates their recoverability through documented quarterly restoration exercises.

Associated risks

Risks this control addresses

  • Ransomware encrypts production systems and simultaneously destroys or encrypts online backups through lateral movement, rendering recovery impossible
  • Insider threat actors with privileged access delete or corrupt backup repositories to cover tracks or cause operational damage
  • Automated deletion scripts or misconfigurations propagate to connected backup storage, eliminating recovery points
  • Backups fail to restore due to undetected corruption, incompatible versioning, or incomplete data capture discovered only during actual disaster scenarios
  • Restoration procedures become outdated as infrastructure evolves, resulting in extended downtime when recovery is attempted under crisis conditions
  • Backup media degrades over time without verification, causing silent data loss that renders archives unusable when needed
  • Cloud-based backup systems remain API-connected to production accounts, allowing attackers with compromised credentials to delete backup versions

Testing procedure

How an auditor verifies this control

  1. Obtain and review the backup policy document defining offline/immutable requirements, isolation methods, retention schedules, and quarterly testing procedures
  2. Request an inventory of all backup systems, repositories, and media designated as offline or immutable, including technology type (tape, air-gapped storage, S3 Object Lock, etc.)
  3. Verify configuration exports or technical documentation confirming immutability settings (WORM enabled, Object Lock retention periods, write-blocking hardware) for each designated backup repository
  4. Select a random sample of three quarterly restore test reports from the past 12 months and review for completeness: date performed, systems tested, data scope, success metrics, recovery time, issues identified, and resolution
  5. Interview backup administrators to confirm the physical or logical isolation mechanism: validate that offline backups are disconnected after writes complete or that immutable backups cannot be modified via production network access
  6. Observe a live restoration exercise or review video/screenshot evidence of the most recent quarterly test showing backup media retrieval, restore initiation, data validation, and success confirmation
  7. Cross-reference the backup inventory against disaster recovery plans and critical system asset lists to confirm that all mission-critical systems are included in offline/immutable backup scope
  8. Review access control logs or change management records for backup systems over the past quarter to confirm no unauthorized modifications to immutability settings or retention policies occurred
Evidence required Configuration exports showing immutability settings (S3 Bucket Object Lock policies, tape library WORM settings, air-gap network diagrams). Quarterly restore test reports containing test date, systems restored, success/failure status, recovery time metrics, and sign-off by responsible personnel. Access logs or change tickets demonstrating segregation of backup administrative privileges and absence of unauthorized retention policy changes.
Pass criteria All critical systems maintain offline or immutable backups per defined policy, quarterly restore tests were performed in each of the last four quarters with documented success criteria met, and technical configurations demonstrably prevent modification or deletion of protected backup copies.

Where this control is tested

Audit programs including this control