Backup

What is Backup?

Backup is the strategic replication of organisational data, applications, and system states to a secure secondary location. The Primary Implementation Requirement involves automated, encrypted copying under Annex A 8.13, delivering the Business Benefit of resilient data recovery, continuity, and protection against catastrophic information loss.

What is Backup?

Backup refers to a copy of data, applications, or systems that is made and stored in a separate, secure location. The purpose of a backup is to ensure the availability and integrity of information by allowing for recovery in the event of data loss, corruption, or a system failure.

Types & Examples

  • Full Backup: A complete copy of all selected data. While this is the most straightforward method, it requires significant storage space and time.
  • Incremental Backup: A backup of only the data that has changed since the last backup of any type. This is faster and uses less space than a full backup but can be more complex to restore.
  • Differential Backup: A backup of all data that has changed since the last full backup. It’s a middle-ground approach that is quicker to restore than incremental backups.

ISO 27001 Context

The ISO 27001 standard requires organisations to establish a robust backup policy and implement technical controls (ISO 27001 Annex A 8.13 Information Backup) to protect against data loss. Backups are a core component of business continuity and disaster recovery planning, ensuring that critical information can be restored quickly and efficiently after a disruptive event.

How to implement Backup

Implementing a robust backup regime is a non-negotiable requirement for ISO 27001 compliance, specifically within the framework of Annex A 8.13. As a Lead Auditor, I have seen many organisations fail their audits not because they lacked backups, but because they lacked the technical depth and evidence of restoration. Following this 10-step technical roadmap ensures your organisational data remains resilient, integral, and available following any security incident or system failure.

1. Formalise the Backup Policy and Scope

Establish the “Rules of Engagement” (ROE) by defining exactly what data requires protection and the frequency of those operations. This ensures that all critical information assets identified in your Asset Register are covered by your recovery strategy.

     
  • Define Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO) for every business-critical system.
  •  
  • Document the “Rules of Engagement” for data owners regarding their responsibilities in the backup lifecycle.
  •  
  • Map every item in your Asset Register to a specific backup profile.

2. Provision Secure and Redundant Infrastructure

Provision your storage architecture to include off-site or cloud-based replication. By separating the backup data from the primary production environment, you mitigate the risk of a single point of failure during a regional disaster or ransomware event.

     
  • Utilise immutable storage solutions to prevent the unauthorised deletion or modification of backup sets.
  •  
  • Ensure geographic separation between production data and backup storage locations.
  •  
  • Provision cloud-native backup tools for SaaS and IaaS environments to ensure holistic coverage.

3. Implement Access Controls and Multi-Factor Authentication

Implement strict Identity and Access Management (IAM) roles to protect the backup management console. Unauthorised access to your backups is a primary target for attackers seeking to cripple your recovery capabilities.

     
  • Assign dedicated IAM roles for backup administrators, separate from general system administration.
  •  
  • Enforce Multi-Factor Authentication (MFA) for all accounts with permissions to modify backup schedules or delete data.
  •  
  • Audit management access logs monthly to detect anomalous login attempts.

4. Configure Automation and Encryption Standards

Configure automated schedules to remove human error from the protection process. Simultaneously, ensure all data is encrypted at rest and in transit to maintain confidentiality, even if the backup media is compromised.

     
  • Apply AES-256 encryption or higher for all backup sets stored in the cloud or on physical media.
  •  
  • Configure automated verification scripts to check the completion status of every scheduled job.
  •  
  • Rotate cryptographic keys regularly in accordance with your encryption policy.

5. Audit Integrity through Sandbox Restoration Testing

Audit the integrity of your backups by performing regular restoration tests in an isolated sandbox environment. A backup that has not been tested for restoration is a significant security risk and will result in a non-conformity during an audit.

     
  • Execute a full restoration test at least quarterly for critical systems.
  •  
  • Document the success or failure of restoration tests as evidence for your ISO 27001 auditor.
  •  
  • Monitor the time taken to restore data to ensure it aligns with your documented RTO.

6. Enforce Retention and BCP Alignment

Enforce data retention schedules to comply with legal, regulatory, and organisational requirements. Finally, ensure your backup procedures are fully integrated into your broader Business Continuity Plans (BCP) and Disaster Recovery (DR) documentation.

     
  • Automate the secure disposal of expired backup sets to prevent “data bloat” and legal liability.
  •  
  • Link backup restoration procedures directly to your Disaster Recovery Plan (DRP).
  •  
  • Review the entire backup regime annually to ensure alignment with changing business requirements.

Backup FAQ

What is a backup in the context of ISO 27001?

A backup is a copy of information, software, or system images maintained to recover data following a loss, corruption, or hardware failure. Within an ISO 27001 ISMS, Annex A 8.13 mandates that backup copies are maintained and tested regularly to ensure 100% availability and integrity of business-critical information.

   

How often should backups be tested for ISO 27001 compliance?

   

Backups must be tested at defined intervals, typically monthly or quarterly, to verify restoration capabilities. ISO 27001 auditors require documented evidence of successful restoration tests, as statistics indicate that 60% of organisations that suffer a major data loss without functional backups fail within six months of the event.

   

What are the storage requirements for ISO 27001 backups?

   

ISO 27001 requires that backups are stored in a separate physical or logical location from the primary data to protect against regional disasters. These copies must be encrypted using standards such as AES-256 and protected by the same level of security controls as the original production data.

   

Is the 3-2-1 backup rule required for ISO 27001?

   

The 3-2-1 backup rule is a recommended industry best practice that supports ISO 27001 compliance by ensuring redundancy. This strategy involves keeping 3 copies of data, using 2 different media types, with 1 copy stored off-site, effectively mitigating risks associated with ransomware and local system failures.

   

What information must be included in an ISO 27001 backup log?

   

An ISO 27001 backup log must provide a complete audit trail of data protection activities. The records should include:        

               
  • The date and time the backup was performed.
  •            
  • The scope of the data included in the backup set.
  •            
  • The success or failure status of the operation.
  •            
  • The identity of the individual or automated system responsible for the task.
  •        
   

Stuart Barker - High Table - ISO27001 Director

About the author

Stuart Barker
🎓 MSc Security 🛡️ Lead Auditor 30+ Years Exp 🏢 Ex-GE Leader

Stuart Barker

ISO 27001 Ninja

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management. Holding an MSc in Software and Systems Security, he combines academic rigor with extensive operational experience, including a decade leading Data Governance for General Electric (GE).

As a qualified ISO 27001 Lead Auditor, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. His toolkits represent an auditor-verified methodology designed to minimise operational friction while guaranteeing compliance.

Shopping Basket
Scroll to Top