CP-10: System Recovery and Reconstitution
From NIST's SP800-53:
Provide for the recovery and reconstitution of the system to a known state within [Assignment: organization-defined time period consistent with recovery time and recovery point objectives] after a disruption, compromise, or failure.
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
SP800-53 Control Mapped to NIST Cyber Security Framework
Generated from NISTs SP800-53/CSF Crosswalk mappings.
MITRE ATT&CK Techniques
See which MITRE ATT&CK techniques this control helps to protect against.
ATT&CK ID | Title | Associated Tactics |
---|---|---|
T1561.001 | Disk Content Wipe | Impact |
T1561.002 | Disk Structure Wipe | Impact |
T1491 | Defacement | Impact |
T1565.001 | Stored Data Manipulation | Impact |
T1485 | Data Destruction | Impact |
T1565 | Data Manipulation | Impact |
T1561 | Disk Wipe | Impact |
T1491.002 | External Defacement | Impact |
T1491.001 | Internal Defacement | Impact |
T1490 | Inhibit System Recovery | Impact |
T1486 | Data Encrypted for Impact | Impact |