🏛️NIST 800-53 CP-9Rule: NIST-CP-009critical

System Backup

Description

Conduct backups of user-level information, system-level information, and system documentation; protect backups from unauthorized modification.

⚠️ Risk Impact

Ransomware specifically targets backups to prevent recovery. Backups stored in the same account/region as production are encrypted in the same attack. Modern adversaries verify backup destruction before triggering encryption.

🔍 How EchelonGraph Detects This

NIST-CP-009Automated scanner rule

EchelonGraph's Tier 1 Cloud Scanner automatically checks for this condition across all connected cloud accounts. Violations are flagged as critical-severity findings with remediation guidance.

🔧 Remediation

Cross-account, cross-region, write-once-read-many (WORM) backups. Test restore quarterly. Apply MFA-required deletion. Use cloud-native immutable backup (S3 Object Lock, GCS Bucket Lock, Azure Blob Lock).

💀 Real-World Attack Scenario

A SaaS company was hit by LockBit 3.0. Production was encrypted; backups stored in the same AWS account were also encrypted (attackers had admin). The company had to negotiate $3.4M ransom. Investigation revealed no MFA-required deletion + no cross-account backup isolation. Subsequent backup architecture used cross-account write-only IAM.

💰 Cost of Non-Compliance

Ransomware with destroyed backups: avg ransom + recovery $5.13M (Coveware 2024). Without ransom paid: avg 23 days downtime. With air-gapped backups: avg 4 days downtime.

📋 Audit Questions

  • 1.Where are backups stored? Same account / region as production?
  • 2.Is MFA required for backup deletion?
  • 3.When was the last successful restore test?
  • 4.Show the immutable-backup configuration (S3 Object Lock, etc.).

🎯 MITRE ATT&CK Mapping

T1490 — Inhibit System RecoveryT1485 — Data Destruction

⚡ Common Pitfalls

  • Backups in same account as production (LockBit's favourite scenario)
  • Restore procedures documented but never tested (45% fail at first real restore)
  • Backup retention met but immutability not enforced

📈 Business Value

Air-gapped, tested backups convert ransomware from existential to operational. The difference between paying $3M ransom + 23 days outage vs $50K incident response + 4 hours restore.

⏱️ Effort Estimate

Manual

40-80 hours initial backup architecture; quarterly DR exercise

With EchelonGraph

EchelonGraph monitors backup configuration; alerts on missing immutability + restore test cadence

🔗 Cross-Framework References

SOC2-CC7.5ISO27001-A.8.13

Automate NIST 800-53 CP-9 compliance

EchelonGraph continuously monitors this control across all your cloud accounts.

Start Free →