Under active development Content is continuously updated and improved

CP-10(2)System Recovery and Reconstitution | Transaction Recovery

IL4 Mod
IL4 High
IL5
IL6

>Control Description

Implement transaction recovery for systems that are transaction-based.

>DoD Impact Level Requirements

No specific parameter values or requirements for this impact level.

>Discussion

Transaction-based systems include database management systems and transaction processing systems. Mechanisms supporting transaction recovery include transaction rollback and transaction journaling.

>Programmatic Queries

Beta

Related Services

AWS RDS
AWS DMS
AWS Lambda

CLI Commands

Create RDS backup for transaction recovery
aws rds create-db-snapshot --db-instance-identifier prod-db --db-snapshot-identifier cp-10-2-snapshot
Restore database to point in time
aws rds restore-db-instance-to-point-in-time --source-db-instance-identifier prod-db --target-db-instance-identifier cp-10-2-restored --restore-time 2024-01-15T10:30:00Z
Get transaction log backups
aws rds describe-db-instances --db-instance-identifier prod-db --query 'DBInstances[0].[BackupRetentionPeriod,LatestRestorableTime]'
Enable automated backups with transaction logs
aws rds modify-db-instance --db-instance-identifier prod-db --backup-retention-period 35 --enable-iam-database-authentication

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of CP-10(2) (Transaction Recovery)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring CP-10(2)?
  • How frequently is the CP-10(2) policy reviewed and updated, and what triggers policy changes?
  • What governance structure ensures CP-10(2) requirements are consistently applied across all systems?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce CP-10(2) requirements.
  • What automated tools, systems, or technologies are deployed to implement CP-10(2)?
  • How is CP-10(2) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce CP-10(2) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of CP-10(2)?
  • What audit logs, records, reports, or monitoring data validate CP-10(2) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of CP-10(2) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate CP-10(2) compliance?

Ask AI

Configure your API key to use AI features.