Backup Data Exposure
highbackup-exposure
Database backups stored insecurely expose sensitive data
Information Disclosure
MITRE ATT&CK techniques
| ID | Name | Tactic |
|---|---|---|
| T1530 | Data from Cloud Storage Object | Collection |
Common Weakness Enumeration
Mitigating controls
ctrl-backup-1- Encrypt all backup data at rest
ctrl-backup-2- Implement strict access controls on backups
ctrl-backup-3- Store backups in separate security zone
ctrl-backup-4- Regularly test backup restoration procedures