Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Rule: EFS File Systems Should be Protected by Backup Plan

Ensure that EFS file systems are safeguarded by a backup plan.

RuleEFS file systems should be protected by backup plan
FrameworkCISA-cyber-essentials
Severity
High

Rule Description:

EFS (Elastic File System) is a scalable, fully managed file storage service provided by Amazon Web Services (AWS). It is essential to have a backup plan in place for EFS file systems to protect against data loss or system failures. This rule aims to ensure that a proper backup and recovery mechanism is implemented to safeguard the EFS file systems in compliance with CISA Cyber Essentials guidelines.

Remediation Steps:

  1. 1.

    Identify the EFS file systems:

    • List all the EFS file systems in your AWS account by executing the following AWS CLI command:
      aws efs describe-file-systems
      
  2. 2.

    Define the backup strategy:

    • Determine the backup frequency and retention period that aligns with your business requirements and complies with CISA Cyber Essentials guidelines.
  3. 3.

    Configure EFS automated backups:

    • Enable automated backups for each EFS file system by running the following AWS CLI command:
      aws efs update-file-system --file-system-id <FileSystemId> --backup-policy '{
        "Status": "ENABLED",
        "AutomaticBackupRetentionDays": <RetentionDays>
      }'
      
      Replace
      <FileSystemId>
      with the ID of the EFS file system and
      <RetentionDays>
      with the desired number of days to retain the backups.
  4. 4.

    Monitor backup status:

    • Regularly verify the status of EFS backups to ensure they are successfully taking place. Use the following AWS CLI command:
      aws efs describe-backup-policy --file-system-id <FileSystemId>
      
      Replace
      <FileSystemId>
      with the ID of the EFS file system.
  5. 5.

    Perform recovery tests:

    • Periodically conduct recovery tests to validate the backup and restore process. This will ensure that the backup data can be effectively utilized in case of a disaster or data loss event.
  6. 6.

    Monitor backup costs:

    • Keep track of the backup costs associated with EFS file systems as per your backup retention configuration. Adjust the retention period if required to manage costs efficiently.
  7. 7.

    Review and update backup plan:

    • Regularly review the backup strategy and adjust it based on the changing requirements of your organization. Ensure that the backup plan remains compliant with CISA Cyber Essentials guidelines.

Troubleshooting Steps (if backup issues occur):

  1. 1.

    Check IAM permissions:

    • Ensure that the AWS Identity and Access Management (IAM) user or role used to execute the AWS CLI commands has the necessary permissions to enable and manage EFS backups.
  2. 2.

    Verify EFS file system details:

    • Confirm that the correct EFS file system ID is used in the AWS CLI commands for backup configuration and monitoring.
  3. 3.

    Check available backup storage:

    • Validate that sufficient backup storage is available in the AWS account to accommodate the EFS automated backups. Consider increasing the storage if necessary.
  4. 4.

    Review CloudWatch Events:

    • Inspect CloudWatch Events for any error or failure notifications related to EFS backups. Resolve the identified issues accordingly.
  5. 5.

    Contact AWS Support:

    • If the troubleshooting steps mentioned above do not resolve the backup issues, reach out to AWS Support for further assistance. Provide them with relevant details and error messages encountered during the backup process.

SEO Benefits:

Having a comprehensive backup plan for EFS file systems ensures data protection and system resilience, aligning with CISA Cyber Essentials guidelines. Implementing this rule helps prevent data loss and minimizes downtime in the event of system failures or disasters. Following the remediation steps provides a step-by-step guide for users, which boosts the user experience and increases the visibility of your content in search engine results. By incorporating relevant keywords and accurate descriptions, this content accelerates SEO by attracting organic traffic and improving search engine rankings.

Is your System Free of Underlying Vulnerabilities?
Find Out Now