Benchmark: 16 Business Continuity
Description
For the availability of computerised systems supporting critical processes, provisions should be made to ensure continuity of support for those processes in the event of a system breakdown (e.g. a manual or alternative system). The time required to bring the alternative arrangements into use should be based on risk and appropriate for a particular system and the business process it supports. These arrangements should be adequately documented and tested.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-aws-complianceStart the Powerpipe server:
steampipe service startpowerpipe serverOpen http://localhost:9033 in your browser and select 16 Business Continuity.
Run this benchmark in your terminal:
powerpipe benchmark run aws_compliance.benchmark.gxp_eu_annex_11_operational_phase_16Snapshot and share results via Turbot Pipes:
powerpipe benchmark run aws_compliance.benchmark.gxp_eu_annex_11_operational_phase_16 --shareControls
- Backup plan min frequency and min retention check
 - Backup recovery points should be encrypted
 - Backup recovery points manual deletion should be disabled
 - Backup recovery points should not expire before retention period
 - DynamoDB tables should be in a backup plan
 - DynamoDB table point-in-time recovery should be enabled
 - DynamoDB table should be protected by backup plan
 - EBS volumes should be in a backup plan
 - EBS volumes should be protected by a backup plan
 - EC2 instance should have EBS optimization enabled
 - EC2 instances should be protected by backup plan
 - EFS file systems should be in a backup plan
 - EFS file systems should be protected by backup plan
 - ElastiCache Redis cluster automatic backup should be enabled with retention period of 15 days or greater
 - ELB classic load balancers should have cross-zone load balancing enabled
 - FSx file system should be protected by backup plan
 - RDS Aurora clusters should be protected by backup plan
 - RDS DB instance backup should be enabled
 - RDS DB instances should be in a backup plan
 - RDS DB instance should be protected by backup plan
 - AWS Redshift clusters should have automatic snapshots enabled
 - S3 bucket cross-region replication should be enabled
 - S3 bucket versioning should be enabled