ISO 27001 A.8.13: Information backup
What This Control Requires
Backup copies of information, software and systems shall be maintained and regularly tested in accordance with the agreed topic-specific policy on backup.
In Plain Language
Backups are your last line of defence. When ransomware encrypts your production databases, when a developer drops the wrong table, when a disk array fails catastrophically - backups are the difference between a bad day and a business-ending disaster. But backups only matter if they actually work. An untested backup is just a hope, and auditors know the difference. You need comprehensive coverage of all critical data and systems, automated execution for consistency, protection against the very threats you are backing up against (especially ransomware), and regular restoration tests that prove recovery works. Your backup strategy should be driven by your recovery point objectives (RPOs) and recovery time objectives (RTOs) from your business impact analysis. A system that cannot tolerate more than an hour of data loss needs a very different backup approach than one where a day is acceptable.
How to Implement
Write a backup policy that defines what gets backed up, how often, where backups are stored, how long they are retained, and how they are tested. Tie everything back to your RTOs and RPOs. Follow the 3-2-1 rule as your baseline: at least 3 copies of data, on 2 different types of media, with 1 copy off-site or in the cloud. For ransomware protection, extend to 3-2-1-1: add 1 immutable or air-gapped copy that an attacker who has compromised your network simply cannot touch. Set backup schedules based on RPO requirements. Critical databases may need continuous replication or frequent transaction log backups. File servers can typically get by with daily incrementals and weekly full backups. System configurations should be backed up after every change. Email and collaboration platforms need at least daily backups. Protect the backups themselves. Encrypt at rest and in transit. Keep backup credentials completely separate from production credentials. Use immutable storage (write-once-read-many) for critical backups. Implement backup-specific access controls that are independent of production access. Monitor backup systems for unauthorised access or modifications. Test restoration regularly - this is where most organisations fall down. Restore individual files and databases monthly. Recover critical systems quarterly. Run a full disaster recovery exercise annually. Document every test: what was restored, how long it took, and what went wrong. Fix failures immediately. Monitor backup health continuously. Alert on failed jobs and investigate promptly. Track completion rates and storage utilisation. Plan for growth before you run out of backup space. Report metrics to management and include backup testing in change management for any infrastructure changes.
Evidence Your Auditor Will Request
- Documented backup policy with schedules, retention, and testing requirements
- Backup job completion reports showing successful execution
- Backup restoration test records with documented results
- Off-site or immutable backup storage configuration
- Backup monitoring and alerting configuration
Common Mistakes
- Backups have never been tested for successful restoration
- Backup failures are not detected or addressed in a timely manner
- Backups are not protected from ransomware and could be encrypted or deleted by an attacker
- No off-site backup copy exists for disaster recovery scenarios
- Backup retention periods do not align with business and regulatory requirements
Related Controls Across Frameworks
| Framework | Control ID | Relationship |
|---|---|---|
| SOC 2 | A1.2 | Equivalent |
| GDPR | Art.32(1)(c) | Related |
| NIS2 | Art.21(2)(c) | Related |
Frequently Asked Questions
How do we protect backups from ransomware?
How often should we test backup restoration?
Track ISO 27001 compliance in one place
AuditFront helps you manage every ISO 27001 control, collect evidence, and stay audit-ready.
Start Free Assessment