🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build a Step-by-Step Backup and Recovery Policy to Achieve Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-9-1 Compliance

Step-by-step guidance to create a backup and recovery policy that meets ECC–2:2024 Control 2-9-1 requirements, with practical steps, technical configurations, and audit-ready evidence for small businesses.

April 07, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Backup and recovery are foundational requirements under the Compliance Framework's Essential Cybersecurity Controls (ECC – 2 : 2024), specifically Control 2-9-1; this post provides a practical, auditable, step-by-step policy you can implement today to meet that control, protect critical data, and prove compliance during an assessment.

What Control 2-9-1 Requires (summary)

Control 2-9-1 mandates that organizations establish documented backup and recovery procedures that ensure the confidentiality, integrity and availability of business-critical data and systems. Key objectives typically include defining scope, assigning responsibilities, setting Recovery Point Objectives (RPO) and Recovery Time Objectives (RTO), securing backup media, scheduling and retention, performing periodic testing of restores, and keeping audit evidence (logs, test reports, runbooks) to demonstrate compliance.

Step 1 — Scope, Classification and Targets

Begin by cataloging assets to be backed up and classifying them by business impact. For each asset define an RPO and RTO (for example: critical DBs RPO = 15–60 minutes, RTO = 1–4 hours; user documents RPO = 24 hours, RTO = 24–72 hours). Record data types (databases, VMs, file shares, configuration data), retention requirements (e.g., 30 days for operational, 7 years for financial/legal), and any legal hold obligations. For a small business: classify your CRM DB and accounting files as "critical" and set hourly backups and a 4-hour RTO; staff home drives can be daily with a 30-day retention.

Step 2 — Architecture, Storage and Security Controls

Design a hybrid architecture to satisfy availability and immutability requirements: local fast backups for quick restores (NAS snapshots or hypervisor-level backups), and off-site immutable copies for disaster and ransomware protection (cloud object storage with object lock or air-gapped tape). Use encryption at rest (AES-256) and in transit (TLS 1.2+). In AWS, enable S3 Object Lock in Compliance mode, S3 Versioning, lifecycle rules (move to Glacier after X days), and consider MFA Delete for extra protection. Small-business example: nightly incremental backups to a local NAS + asynchronous replication to an S3 bucket with Object Lock; maintain one tape or cold-storage copy monthly stored offsite.

Step 3 — Implementation and Automation

Implement backups with tested tools and automated schedules: for files and servers consider restic/duplicity/rsync + snapshots; for VMs and Windows servers use Veeam or native VSS-aware solutions; for MySQL/Postgres use WAL shipping or logical backups plus binlog archiving. Example cron for daily restic backup: 0 2 * * * /usr/local/bin/restic -r s3:s3.amazonaws.com/your-bucket backup /data --tag daily. Manage encryption keys with an HSM or cloud KMS and rotate per policy; store key access controls separately from backup media. Configure monitoring and alerts (email/Slack/SMS) for failed jobs and integrate logs into your SIEM for audit trails.

Step 4 — Test, Verify and Maintain

Testing is mandatory for Control 2-9-1. Define a test cadence: weekly automated integrity checks, monthly restore tests of a representative dataset, and annual full DR rehearsal. Validate backups using checksums (SHA-256) and software-provided integrity checks; perform a blind restore to a staging environment to confirm application and database consistency (e.g., restore DB + app files, start services, run smoke tests). Record times observed vs RTO/RPO targets and keep test artifacts (screenshots, logs, runbook checklists) for assessors.

Step 5 — Roles, Documentation and Audit Evidence

Document a clear policy and runbooks: backup schedule, owners (Backup Admin, Restore Approver, IT Manager), access control matrix, escalation paths, and change management procedures for modification of backup plans. Maintain evidence for compliance: backup job logs, encryption key rotation logs, results of restore tests, RPO/RTO measurement logs, and the policy signed by management. For small businesses, a concise runbook that lists exact restore commands, credentials for the restore admin (stored in the company vault), and a test checklist is often the most audit-friendly artifact.

Compliance Tips and Best Practices

Follow the 3-2-1-1 rule: at least 3 copies, on 2 different media, 1 offsite, and 1 immutable copy. Use immutable storage or object locking to prevent ransomware encryption of backups. Keep backup credentials and encryption keys segregated from the environment they protect. Automate retention and lifecycle to meet regulatory retention periods but also include legal hold procedures to prevent premature deletion. Log everything: job outcomes, restores, test results and configuration changes—these logs are primary evidence in an audit against the Compliance Framework.

Risk of Not Implementing Control 2-9-1

Without a compliant backup and recovery policy, organizations face extended downtime, permanent data loss, regulatory fines, and reputational harm. A small business example: a ransomware event that encrypts production servers could cost days of lost revenue and customer trust if backups are not available or themselves encrypted; recovery from a clean tape or immutable cloud copy might be the difference between recovery and closure. Lack of documentation and test evidence also results in failed compliance assessments and costly remediation projects.

Conclusion

To achieve ECC – 2 : 2024 Control 2-9-1 compliance, implement a documented, tested, and auditable backup and recovery policy: classify assets, set RPO/RTO, deploy hybrid/immutable storage with encryption, automate and monitor jobs, and run regular restore tests while maintaining clear documentation and artifacts for auditors. Start with a simple, repeatable policy for your most critical systems and iterate—regular testing and good evidence are what turn a backup solution into a compliance-ready control.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes