🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-9-3

Practical guide for SMBs to implement Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-9-3

January 17, 2026
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-9-3 – The cybersecurity requirements for backup and recovery management must include at least the following:

Understanding the Requirement

This control requires a concise, repeatable program for backup and recovery management that ensures critical data and systems can be restored within acceptable timeframes and without integrity loss. The three listed objectives (2-9-3-1, 2-9-3-2 and 2-9-3-3) collectively point to: (1) identifying what must be backed up and how often, (2) protecting backups from tampering, loss and unauthorized access, and (3) verifying and testing recovery to prove restorability. For an SMB this means documented backup schedules, secure storage and retention rules, access controls and periodic restore testing so recovery works when needed.

Technical Implementation

  • Inventory and classify backups: Create a prioritized list of systems and data (finance, customer records, active databases, email) and assign Recovery Point Objectives (RPO) and Recovery Time Objectives (RTO) for each. Start with a one-page matrix so technical staff and management agree on what is critical.

  • Automate and separate copies: Use automated backup tooling (server snapshots, database dumps, file-level backups) to run on schedules aligned to your RPOs. Keep at least three copies using the 3-2-1 rule: primary, local backup (on-site), and an off-site or cloud copy. For higher assurance, keep an immutable or air-gapped copy to protect against ransomware.

  • Encrypt and control access: Encrypt backup data both in transit and at rest, and limit access to backup systems with role-based access controls and multi-factor authentication for admin accounts. Store encryption keys separately from backup storage to reduce single points of failure.

  • Retention and secure deletion: Define retention periods that meet legal and business needs, and implement automated retention enforcement. Securely delete expired backups to reduce data exposure, while ensuring retention meets regulatory requirements.

  • Regular verification and recovery testing: Schedule and document restore tests at least quarterly for critical systems and annually for less-critical items. Tests must validate integrity (data checksums), application functionality after restore, and timing against RTO targets. Record test results and follow up on any issues.

  • Monitoring, logging and incident integration: Monitor backup jobs and alert on failures or anomalies. Centralize logs for backup activity and integrate backup status into incident response playbooks so restore actions are prioritized during an outage.

Example in a Small or Medium Business

Acme Accounting, a 25-person firm, identified client ledgers and tax files as critical assets and set an RPO of 4 hours and an RTO of 8 hours for those systems. They implemented nightly full backups and hourly incremental backups for the primary file server, using a cloud backup vendor plus a local NAS that keeps rolling snapshots for 30 days. Backups are encrypted with enterprise keys stored in the firm's hardware security module, and only two administrators have MFA-protected access to the backup system. Once a quarter the IT lead performs a documented restore test that restores a representative client file to a sandbox VM and validates file integrity and application behavior; results are tracked in a shared log and any discrepancies trigger process changes. They also retain backups for seven years for archived tax files to meet compliance and securely purge expired copies. During a ransomware incident, the documented restore procedures and immutable cloud copy allowed the firm to recover within their RTO with minimal client impact.

Summary

By combining a clear inventory and prioritization of critical data, automated and separated backup copies, encryption and strict access controls, enforced retention and deletion, and regular restore testing, an SMB can meet the backup and recovery management requirements of Control 2-9-3. These policy and technical measures ensure backups are reliable, protected from tampering, and demonstrably restorable within business-acceptable timeframes—minimizing downtime, data loss and compliance risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes