Answer yes if your organisation takes regular backups of its production data that cannot be altered, deleted or tampered with for a specified time period. Backups must be taken in line with best practice guidelines, for example by following the '3-2-1' rule and segregating the backups from your main environment. Describe your backup processes including segregation, frequency, and any other controls in place.
A common way for businesses to experience a data breach is through confidential data being recovered from digital media that is being thrown out or repurposed. In fact, a common method used by malicious actors who are targeting a company will be to do thorough bin searches to see if there is any information they can use in a later attack.
It is therefore essential that you ensure any media is securely wiped or destroyed before being thrown away. Either an internal robust and auditable secure media destruction process should be evidenced, with the appropriate procedures, tools and logs/audits in place, or an auditable third party contract for the secure destruction of media, supported by certificates of destruction, should be in operation.
You can either implement an internal and auditable secure media destruction process if your IT team have the tools and expertise to do so, or you can contract this work out to a third party who specialises in the secure destruction of media.
It is important that if this work is contracted out to a third party, that the third party supplier provides certificates of destruction.
If you would like to contribute to this article or provide feedback, please email knowledge@riskledger.com. Contributors will be recognised on our contributors page.