Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Rule: Backup Recovery Points Manual Deletion Disabled

This rule specifies that manual deletion of backup recovery points should be disabled to ensure data integrity and security.

RuleBackup recovery points manual deletion should be disabled
FrameworkGxP EU Annex 11
Severity
Medium

Backup Recovery Points Manual Deletion: Compliance with GxP & EU Annex 11

Introduction

In regulated industries such as pharmaceuticals, the guidelines such as Good Practice (GxP) and regulations like the EU Annex 11 are critical. These require strict adherence to data integrity and security protocols. Disabling manual deletion of backup recovery points is a crucial part of maintaining compliance with these regulations.

Rule Description

The practice of disabling manual deletion for backup recovery points is implemented to ensure that critical data is not lost or corrupted. In the context of GxP and EU Annex 11, modification, deletion, or tampering with the archived data can lead to non-compliance, which is unacceptably risky from both a regulatory and a business continuity perspective.

Steps for Rule Enforcement

1. Data Backup System Configuration

Ensure that your data backup system allows for policy-based management of backups that can restrict manual deletion.

2. Creation of Immutable Backup Policies

Set up backup policies that create immutable snapshots which cannot be altered or deleted until the specified retention period lapses.

3. User Access Control

Modify user permissions to limit functionality such that manual deletion of backups cannot be carried out by end users.

4. Automated Backup Verification

Implement automatic verification of backups to ensure they can be restored. Alerts should notify administrators of any issues.

5. Monitoring and Auditing

Continuous monitoring and regular auditing are necessary to ensure compliance is maintained. Any attempt at manual deletion should be logged and alerts should be triggered.

Troubleshooting Steps

  • Ensure policies are properly applied and the Data Backup System service is running.
  • Verify user permissions reflect the policy accurately.
  • Check system logs for errors relating to backup policies or failed attempts to delete backup recovery points.
  • If changes are made, test backup immutability by attempting a controlled and documented deletion operation in a non-production environment.

Remediation Steps

Should you discover that manual deletion is still possible, you can take the following steps:

1. Review and Restrict Permissions

Ensure that only authorized personnel have administrative access to backup systems and data repositories.

# CLI command to review permissions (syntax varies by system)
backup-tool permissions list

2. Update Policy Configuration

Strengthen policies to enforce immutability. This often requires administrative privileges and might involve backend configuration.

# CLI command to enforce backup immutability (syntax varies by system)
backup-tool policy set --immutable --retention 90days --target /path/to/backups

3. Test and Validate

After making changes, perform tests to validate that manual deletions are not permitted.

4. Document Changes

Keep detailed records of policy changes and testing procedures to demonstrate compliance efforts.

Note on SEO and Technical Communication

In creating compliant and SEO-friendly documentation, it is critical to use relevant keywords consistently and contextually. Content should not only incorporate compliance-related terminologies like "GxP", "EU Annex 11", "immutable backups", and "data integrity", but it should also be structured in a way conducive to search engines (short paragraphs, bullet points, and proper heading usages).

Striking a balance between thorough, technical accuracy and readability for a broader audience can help to ensure that the content is both informative for specialists and understandable for those less familiar with the topic. This approach also supports improved SEO outcomes by making the content more engaging and easier to digest, encouraging longer visit durations, and serving a more comprehensive array of search queries.

Is your System Free of Underlying Vulnerabilities?
Find Out Now