WikiFrameworksCyberSecure CanadaBackup Essential Systems

Backup Essential Systems

Updated: 2026-02-24

Plain English Translation

Organizations must implement regular, reliable backups for any system that houses essential business information. These backups must be supported by proven recovery mechanisms to ensure that, in the event of an incident such as a ransomware attack or hardware failure, the data can be efficiently and effectively restored.

Executive Takeaway

Reliable backups of critical systems ensure business resilience, enabling rapid recovery from cyber incidents, disasters, or accidental data loss.

ImpactHigh
ComplexityMedium

Why This Matters

  • Protects against permanent data loss resulting from ransomware attacks, hardware failures, or human error.
  • Reduces operational downtime by facilitating quick and reliable data recovery, ensuring business continuity.
  • Satisfies regulatory, compliance, and cyber insurance requirements for disaster recovery.

What “Good” Looks Like

  • Automated backups are configured and actively monitored for all systems containing essential business information, and tools like WatchDog Security's Asset Inventory can help maintain an up-to-date scope of essential systems, owners, and data locations.
  • Recovery processes are documented in a formal Business Continuity Plan and tested regularly through live restore drills, and tools like WatchDog Security's Policy Management can help control versions and approvals while WatchDog Security's Compliance Center can help organize evidence of completed restore tests.
  • Backups are stored securely to protect against localized disasters, unauthorized access, and malware encryption.

Section 5.6.2.3 requires organizations to back up systems containing essential business information and ensure that recovery mechanisms can effectively and efficiently restore these systems from backups.

Essential business information includes financial records, customer databases, intellectual property, and critical operational software. Any system required for the organization to function daily should be identified and backed up. Tools like WatchDog Security's Asset Inventory can help teams catalog systems and tag which assets store essential business data for backup scope.

Backup frequency should align with the system's Recovery Point Objective (RPO) and how frequently the data changes. Highly dynamic systems may require hourly backups, while static files may only need daily schedules.

Best practices dictate retaining backups long enough to recover from undetected breaches, often extending beyond 30 to 90 days. Retention policies must align with legal, regulatory, and specific business continuity needs.

Organizations must perform regular live restore tests using a sampling of backup data to verify that the recovery mechanisms function correctly and meet the required Recovery Time Objectives (RTO). Tools like WatchDog Security's Compliance Center can help track restore-test evidence against CSC-05-018 and flag missing or overdue recovery validation.

Effective recovery mechanisms include automated cloud failovers, bare-metal restore capabilities, VM snapshot rollbacks, and tested restoration procedures documented in a Business Continuity Plan.

Yes, backups should ideally be encrypted both in transit and at rest. Decryption keys must be stored securely and access restricted only to authorized personnel to prevent unauthorized data exposure.

Organizations should protect backups from ransomware by utilizing immutable storage (which cannot be altered or deleted) and maintaining offline or air-gapped copies separated from the primary network.

Cloud backups generally meet the offsite compliance requirement. However, to ensure robust disaster recovery and ransomware protection, cloud backups should be coupled with immutable storage or offline copies.

Auditors typically require backup configuration screenshots, failure notification setups, a documented business continuity or disaster recovery plan, and logs or reports proving recent successful restore tests. Tools like WatchDog Security's Compliance Center can help centralize this evidence and link it to CSC-05-018, and WatchDog Security's Trust Center can help share selected artifacts with external stakeholders when needed.

Backup compliance often fails during audits because evidence is scattered across tools and teams, and restore testing results aren’t consistently retained. Tools like WatchDog Security's Compliance Center can map evidence (configs, logs, restore test records) to CSC-05-018 and highlight gaps when scheduled backups or restore drills are missing.

Auditors typically expect controlled documents for backup scope, retention, RTO/RPO targets, and restore procedures, with clear ownership and revision history. Tools like WatchDog Security's Policy Management can help maintain version control, approvals, and attestations for backup and recovery policies so teams can demonstrate governance over time.

CYBERSECURE-CANADA Section 5.6.2.3

"The organization shall backup systems that contain essential business information and ensure that recovery mechanisms effectively and efficiently restore these systems from backups."

VersionDateAuthorDescription
1.0.02026-02-24WatchDog Security GRC TeamInitial publication