National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

NIST Special Publication 800-53 (Rev. 4)

Security and Privacy Controls for Federal Information Systems and Organizations

CP-10 INFORMATION SYSTEM RECOVERY AND RECONSTITUTION

Family:
CP - CONTINGENCY PLANNING
Class:
Priority:
P1 - Implement P1 security controls first.
Baseline Allocation:
Low Moderate High
CP-10 CP-10 (2) CP-10 (2) (4)

Control Description

The organization provides for the recovery and reconstitution of the information system to a known state after a disruption, compromise, or failure.

Supplemental Guidance

Recovery is executing information system contingency plan activities to restore organizational missions/business functions. Reconstitution takes place following recovery and includes activities for returning organizational information systems to fully operational states. Recovery and reconstitution operations reflect mission and business priorities, recovery point/time and reconstitution objectives, and established organizational metrics consistent with contingency plan requirements. Reconstitution includes the deactivation of any interim information system capabilities that may have been needed during recovery operations. Reconstitution also includes assessments of fully restored information system capabilities, reestablishment of continuous monitoring activities, potential information system reauthorizations, and activities to prepare the systems against future disruptions, compromises, or failures. Recovery/reconstitution capabilities employed by organizations can include both automated mechanisms and manual procedures.

Related to: CA-2CA-6CA-7CP-2CP-6CP-7CP-9SC-24

Control Enhancements

CP-10(1) INFORMATION SYSTEM RECOVERY AND RECONSTITUTION | CONTINGENCY PLAN TESTING
[Withdrawn: Incorporated into CP-4].
CP-10(2) INFORMATION SYSTEM RECOVERY AND RECONSTITUTION | TRANSACTION RECOVERY
The information system implements transaction recovery for systems that are transaction-based.
Supplemental Guidance: Transaction-based information systems include, for example, database management systems and transaction processing systems. Mechanisms supporting transaction recovery include, for example, transaction rollback and transaction journaling.
CP-10(3) INFORMATION SYSTEM RECOVERY AND RECONSTITUTION | COMPENSATING SECURITY CONTROLS
[Withdrawn: Addressed through tailoring procedures].
CP-10(4) INFORMATION SYSTEM RECOVERY AND RECONSTITUTION | RESTORE WITHIN TIME PERIOD
The organization provides the capability to restore information system components within [Assignment: organization-defined restoration time-periods] from configuration-controlled and integrity-protected information representing a known, operational state for the components.
Supplemental Guidance: Restoration of information system components includes, for example, reimaging which restores components to known, operational states.
Related to: CM-2
CP-10(5) INFORMATION SYSTEM RECOVERY AND RECONSTITUTION | FAILOVER CAPABILITY
[Withdrawn: Incorporated into SI-13].
CP-10(6) INFORMATION SYSTEM RECOVERY AND RECONSTITUTION | COMPONENT PROTECTION
The organization protects backup and restoration hardware, firmware, and software.
Supplemental Guidance: Protection of backup and restoration hardware, firmware, and software components includes both physical and technical safeguards. Backup and restoration software includes, for example, router tables, compilers, and other security-relevant system software.
Related to: AC-3AC-6PE-3

References

Federal Continuity Directive 1 http://www.fema.gov/pdf/about/offices/fcd1.pdf
NIST Special Publication 800-34 https://csrc.nist.gov/publications/search?keywords-lg=800-34