Skip to content

M1053 Data Backup

Take and store data backups from end user systems and critical servers. Ensure backup and storage systems are hardened and kept separate from the corporate network to prevent compromise.

Item Value
ID M1053
Version 1.1
Created 19 July 2019
Last Modified 31 March 2020
Navigation Layer View In ATT&CK® Navigator

Techniques Addressed by Mitigation

Domain ID Name Use
enterprise T1485 Data Destruction Consider implementing IT disaster recovery plans that contain procedures for taking regular data backups that can be used to restore organizational data.1 Ensure backups are stored off system and is protected from common methods adversaries may use to gain access and destroy the backups to prevent recovery.
enterprise T1486 Data Encrypted for Impact Consider implementing IT disaster recovery plans that contain procedures for regularly taking and testing data backups that can be used to restore organizational data.1 Ensure backups are stored off system and is protected from common methods adversaries may use to gain access and destroy the backups to prevent recovery. Consider enabling versioning in cloud environments to maintain backup copies of storage objects.3
enterprise T1491 Defacement Consider implementing IT disaster recovery plans that contain procedures for taking regular data backups that can be used to restore organizational data.1 Ensure backups are stored off system and is protected from common methods adversaries may use to gain access and destroy the backups to prevent recovery.
enterprise T1491.001 Internal Defacement Consider implementing IT disaster recovery plans that contain procedures for taking regular data backups that can be used to restore organizational data.1 Ensure backups are stored off system and is protected from common methods adversaries may use to gain access and destroy the backups to prevent recovery.
enterprise T1491.002 External Defacement Consider implementing IT disaster recovery plans that contain procedures for taking regular data backups that can be used to restore organizational data.1 Ensure backups are stored off system and is protected from common methods adversaries may use to gain access and destroy the backups to prevent recovery.
enterprise T1561 Disk Wipe Consider implementing IT disaster recovery plans that contain procedures for taking regular data backups that can be used to restore organizational data.1 Ensure backups are stored off system and is protected from common methods adversaries may use to gain access and destroy the backups to prevent recovery.
enterprise T1561.001 Disk Content Wipe Consider implementing IT disaster recovery plans that contain procedures for taking regular data backups that can be used to restore organizational data.1 Ensure backups are stored off system and is protected from common methods adversaries may use to gain access and destroy the backups to prevent recovery.
enterprise T1561.002 Disk Structure Wipe Consider implementing IT disaster recovery plans that contain procedures for taking regular data backups that can be used to restore organizational data.1 Ensure backups are stored off system and is protected from common methods adversaries may use to gain access and destroy the backups to prevent recovery.
enterprise T1490 Inhibit System Recovery Consider implementing IT disaster recovery plans that contain procedures for taking regular data backups that can be used to restore organizational data.1 Ensure backups are stored off system and is protected from common methods adversaries may use to gain access and destroy the backups to prevent recovery. In cloud environments, enable versioning on storage objects where possible, and copy backups to other accounts or regions to isolate them from the original copies.2

References