Under active development Content is continuously updated and improved

CP-9(8)System Backup | Cryptographic Protection

IL4 Mod
IL4 High
IL5
IL6

>Control Description

Implement cryptographic mechanisms to prevent unauthorized disclosure and modification of organization-defined backup information.

>DoD Impact Level Requirements

FedRAMP Parameter Values

CP-9 (08) [all backup files]

Additional Requirements and Guidance

CP-9 (8) Guidance: Note that this enhancement requires the use of cryptography which must be compliant with Federal requirements and utilize FIPS validated or NSA approved cryptography (see SC-13.)

>Discussion

The selection of cryptographic mechanisms is based on the need to protect the confidentiality and integrity of backup information. The strength of mechanisms selected is commensurate with the security category or classification of the information. Cryptographic protection applies to system backup information in storage at both primary and alternate locations.

Organizations that implement cryptographic mechanisms to protect information at rest also consider cryptographic key management solutions.

>Programmatic Queries

Beta

Related Services

AWS KMS
AWS Backup
AWS S3

CLI Commands

Create customer-managed KMS key for backups
aws kms create-key --description cp-9-8-backup-key --key-usage ENCRYPT_DECRYPT
Create backup plan with encryption
aws backup create-backup-plan --backup-plan '{"BackupPlanName":"cp-9-8-encrypted","Rules":[{"RuleName":"encrypted-daily","TargetBackupVault":"default","EnableContinuousBackup":true}]}'
Enable S3 encryption with KMS
aws s3api put-bucket-encryption --bucket backup-bucket --server-side-encryption-configuration '{"Rules":[{"ApplyServerSideEncryptionByDefault":{"SSEAlgorithm":"aws:kms","KMSMasterKeyID":"arn:aws:kms:us-east-1:123456789012:key/key-id"}}]}'
List encrypted backups
aws backup list-backups --by-resource-type EC2 --query 'Backups[*].[RecoveryPointArn,Status,EncryptionKeyArn]'

>Related Controls

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of CP-9(8) (Cryptographic Protection)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring CP-9(8)?
  • How frequently is the CP-9(8) policy reviewed and updated, and what triggers policy changes?
  • What governance structure ensures CP-9(8) requirements are consistently applied across all systems?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce CP-9(8) requirements.
  • What automated tools, systems, or technologies are deployed to implement CP-9(8)?
  • How is CP-9(8) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce CP-9(8) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of CP-9(8)?
  • What audit logs, records, reports, or monitoring data validate CP-9(8) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of CP-9(8) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate CP-9(8) compliance?

Ask AI

Configure your API key to use AI features.