Skip to content

3.8.9 — Protect Your Backups

Protect the confidentiality of backup CUI at storage locations.

Backups that contain CUI must be protected with the same rigor as your production CUI data. The assessor checks:

  1. Encryption at rest. Backup data is encrypted using FIPS-validated cryptography (AES-256). This applies whether backups are stored on local drives, tape, or in the cloud. If someone steals a backup drive, the data must be unreadable.

  2. Access restricted. Only designated backup administrators can access backup data — not every IT person, not every sysadmin. RBAC on your backup tool and storage location limits who can browse, restore, or export backup contents.

  3. Storage location secured. Physical backups (drives, tapes) are in locked storage. Cloud backups are in a secured tenant with appropriate access controls and encryption. Off-site storage facilities are vetted and secured.

  4. Backup integrity tested. Backups must actually work. Regular restore tests verify that encrypted backups can be successfully restored — an untested backup is just optimism.

The assessor will ask: where are your backups, are they encrypted, who can access them, and when did you last test a restore? If any answer is unsatisfying, that’s a finding.


Your assessor needs a “yes” to every row:

#QuestionWhat “yes” looks like
1Is backup CUI confidentiality protected at storage locations?Encrypted (AES-256 FIPS-validated); access restricted to backup admins (RBAC); storage location secured (locked room or encrypted cloud); restore tested periodically

Documents they’ll review: Media protection policy; backup procedures; encryption configuration for backup storage; access control records for backup systems; restore test records; system security plan

People they’ll talk to: Personnel with backup responsibilities; information security personnel; backup administrators

Live demos they’ll ask for: “Show me your backup encryption configuration.” “Who can access backup data? Show me the RBAC settings.” “Where are backups stored — physically and in the cloud?” “When was the last restore test?”


These are the actual questions. Have answers ready.

  • “Are your backups encrypted? Show me the configuration.”
  • “Is the encryption FIPS-validated?”
  • “Who can access backup data? Show me the access controls.”
  • “Where are backups stored? Is the location secured?”
  • “When did you last test a backup restore? Show me the record.”
  • “If an attacker compromised your backup storage, would they get readable CUI?”
  • “Are cloud backups encrypted with keys you control?”

Unencrypted backups. Production CUI is encrypted but backups aren’t — creating an unprotected copy of everything. Enable encryption in your backup tool and verify it’s FIPS-validated.

Access too broad. Every IT team member can browse backup data. If a sysadmin can restore any file from the backup, they effectively have access to all CUI — even data they shouldn’t see in production. Restrict backup access to designated backup administrators.

Cloud backups unverified. Using a cloud backup service but haven’t verified encryption settings, key management, or access controls. Check your provider’s configuration — don’t assume it’s secure by default.

No restore testing. Backups run nightly but nobody has tested a restore in a year. A backup you can’t restore isn’t a backup — it’s wasted storage. Test quarterly and document results.

Off-site storage unsecured. Physical backup tapes at an off-site facility with unknown security controls. Vet your off-site storage provider and ensure they meet your security requirements.



RequirementWhy it matters here
3.13.11 — Encrypt CUI at RestEncryption at rest applied to backup storage
3.8.1 — Lock Up CUIPhysical protection for backup media
3.8.6 — Encrypt Media in TransitEncryption for backups transported off-site
3.8.3 — Destroy It ProperlySanitization of backup media at end of life

🔒

Step-by-step guides for Microsoft 365, AWS, Azure, and GCP are available to Ancitus clients.

Start a conversation →

CMMC Practice ID: MP.L2-3.8.9 | SPRS Weight: 1 point | POA&M Eligible: Yes