CP-10: System Recovery and Reconstitution

From NIST's SP800-53:

Provide for the recovery and reconstitution of the system to a known state within [Assignment: organization-defined time period consistent with recovery time and recovery point objectives] after a disruption, compromise, or failure.

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

SP800-53 Control Mapped to NIST Cyber Security Framework

Generated from NISTs SP800-53/CSF Crosswalk mappings.

Control ID Description
RC.RP-1 Recovery plan is executed during or after a cybersecurity incident
RS.RP-1 Response plan is executed during or after an incident

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against.

ATT&CK ID Title Associated Tactics
T1561.001 Disk Content Wipe Impact
T1561.002 Disk Structure Wipe Impact
T1491 Defacement Impact
T1565.001 Stored Data Manipulation Impact
T1485 Data Destruction Impact
T1565 Data Manipulation Impact
T1561 Disk Wipe Impact
T1491.002 External Defacement Impact
T1491.001 Internal Defacement Impact
T1490 Inhibit System Recovery Impact
T1486 Data Encrypted for Impact Impact