Backup Data Exposure

high

backup-exposure

Database backups stored insecurely expose sensitive data

Information Disclosure

MITRE ATT&CK techniques

IDNameTactic
T1530 Data from Cloud Storage Object Collection

Common Weakness Enumeration

Mitigating controls

ctrl-backup-1
Encrypt all backup data at rest
ctrl-backup-2
Implement strict access controls on backups
ctrl-backup-3
Store backups in separate security zone
ctrl-backup-4
Regularly test backup restoration procedures

References