Make copies of key system software, configuration, and data to enable rapid system restoration.
Employ disk imaging, system backup, or file synchronization tools to create copies of key data on a protected backup repository. This is typically done to capture/restore an entire system or major subsystems.
|Although adversaries may attempt to delete or change important artifacts, there may be a window of time to retrieve them before that happens.
|There is an opportunity to test what an adversary might do if destroyed data is selectively replaced by the defender.
|There is an opportunity to test what an adversary might do if encrypted data is selectively replaced by the defender.
|There is an opportunity to disrupt an adversary's defacement activity by quickly restoring altered content.
|A defender can backup system information on a regular basis and send it to an alternate location for storage.
|A defender can ensure data is backed up on a regular basis and backups are stored offline from the system. If an adversary is detected destroying or altering data, the defender could selectively restore data from backup to see how the adversary reacts.
|Backup data on public facing websites and retain the files offline. In the event of data damage or loss, restore the data from backup.
|Backup data on an end-user system and store offline. If an adversary alters or deletes data on the system, restore the data using the backup copy.
|In an adversary engagement situation, if an adversary deletes or alters files on a machine they are controlling, restore the data to it original state and location to see how the adversary reacts.
|Data Encrypted for Impact