Backup and Recovery
The processes and technologies for creating copies of data and system configurations at regular intervals and restoring them when needed due to data loss, corruption, accidental deletion, or disaster scenarios.
Backup and recovery is a fundamental operational control that protects organizations against data loss from a wide range of threats: hardware failures, software bugs, human error, ransomware attacks, natural disasters, and malicious insiders. A comprehensive backup strategy considers what data needs to be backed up (databases, file systems, configurations, application state), how frequently backups should occur (based on the Recovery Point Objective, or RPO, determined by the business impact analysis), where backups should be stored (on-site, off-site, cloud, or a combination), how long backups should be retained (based on business and regulatory requirements), and how quickly data can be restored (Recovery Time Objective, or RTO).
Backup and recovery is addressed by multiple compliance frameworks. ISO 27001 Annex A control A.8.13 specifically addresses information backup, requiring that backup copies of information, software, and system images be maintained and regularly tested according to an agreed backup policy. SOC 2's Availability criteria require that system recovery is tested to ensure it meets defined objectives. NIS2 mandates business continuity measures including backup management and disaster recovery. GDPR's integrity and availability requirements (Article 5(1)(f)) are supported by backup capabilities that protect against accidental or unlawful destruction or loss of personal data. In technology due diligence, backup strategy and testing frequency are key operational maturity indicators.
Modern backup strategies follow the 3-2-1 rule as a baseline: maintain at least three copies of data, on at least two different media types, with at least one copy stored off-site. For ransomware resilience, organizations increasingly adopt a 3-2-1-1-0 approach, adding one immutable or air-gapped copy and zero untested backups. Regular restoration testing is essential — backups that cannot be successfully restored provide false assurance. Testing should cover both individual file or record restoration and full system recovery scenarios. Cloud-native applications may use provider-managed backup services, database point-in-time recovery, and infrastructure-as-code for rapid environment reconstruction. Organizations should document their backup policies, monitor backup job success and failure, alert on backup failures, and include backup and recovery procedures in their disaster recovery plans.
Related frameworks
Related terms
Business Continuity Plan
A comprehensive document that outlines the procedures and strategies an organization will follow to maintain or rapidly resume critical business functions during and after a significant disruption, covering people, processes, technology, and communication.
Business Continuity
The capability of an organization to continue delivering products and services at acceptable predefined levels following a disruptive incident. Business continuity planning covers the strategies, plans, and procedures needed to ensure operational resilience.
Business Impact Analysis
A systematic process for evaluating the potential effects of disruptions to critical business operations, identifying recovery priorities, and determining the resources needed to maintain or restore essential functions within acceptable timeframes.
Disaster Recovery
The strategies, plans, and procedures for restoring IT infrastructure, systems, and data following a catastrophic disruption such as a natural disaster, cyberattack, hardware failure, or other event that renders primary systems unavailable.
Encryption
The process of converting data into an encoded format that can only be read by authorized parties who possess the correct decryption key. Encryption protects data confidentiality both at rest (stored data) and in transit (data being transmitted over networks).
Assess your compliance posture
Run a free self-assessment for ISO 27001, SOC 2, GDPR, NIS2, or Tech DD and see exactly where you stand.
Start free assessment