Backup and Recovery Policy
1. Policy Overview
This policy describes EDMO’s approach to data backup, retention, and recovery using Google Cloud Platform (GCP), incorporating requirements for SOC 2 compliance. Its goal is to protect critical data, ensure business continuity, and maintain high security and compliance standards for all EDMO-managed resources.
2. Scope and Purpose
- Scope:
Applies to all EDMO-managed GCP systems, applications, and data. - Purpose:
- Guarantee safe, recoverable copies of all critical and regulated data.
- Fulfill legal, contractual, and security obligations, including SOC 2 Trust Services Criteria.
3. Definitions
Term | Definition |
Backup | Secure, restorable copy of data, created per policy for contingency needs. |
RPO | Maximum allowed data loss interval (Recovery Point Objective). |
RTO | Maximum time to restore data (Recovery Time Objective). |
Immutable Copy | Backup version that cannot be changed/deleted during defined retention. |
Offsite Backup | Backup in a geographically separate GCP region or platform. |
SOC 2 | A compliance framework requiring documented, auditable internal controls. |
4. Roles and Responsibilities
Role | Responsibilities |
IT Manager | Owns, maintains, and reviews the policy; approves documented procedures. |
Backup Administrator | Implements backups, monitors compliance, and maintains evidence for SOC 2. |
Security Team | Enforces access controls, encryption, and participates in audits and testing. |
System Owners | Identify critical data, define retention, and collaborate on compliance needs. |
All Employees | Follow backup processes and report any data security issues promptly. |
5. Backup Strategy
5.1. 3-2-1-1-0 Framework (SOC 2 Compliant)
- Three copies: Production data plus two backup copies.
- Two storage types: GCP standard multi-region and immutable Backup Vault.
- One offsite copy: Backup replicated to a distinct region.
- One immutable copy: Retained in GCP Backup Vault with tamper-proof retention controls.
Zero errors: Integrity verification and error reporting for all backups.
SOC 2 Alignment:
All controls are documented, with evidence kept for audit, including backup schedules, test logs, and access reviews.
5.2. Backup Frequency and Types
- Critical/regulated data: Hourly incremental, daily full backups.
- Operational data: Daily incremental, weekly full backups.
- Types: Full, incremental, differential; choice documented with rationale.
5.3. Retention and Purging
- Critical/regulated data: Retained no less than 1 year or per compliance contract.
- All retention periods and purging schedules are clearly documented and matched to SOC 2 and regulatory requirements.
- Automated purging: Expired backups securely and permanently deleted, with logs maintained for inspection.
5.4. Security and Access Control
- Encryption: At rest and in transit (AES-256 minimum).
- Access: Role-based (IAM), least privilege, enforced multi-factor authentication for privileged accounts.
- Audit logging: All backup and restore actions are logged and reviewed monthly.
- SOC 2 Controls:
- Access reviews performed quarterly.
- All exceptions or access changes are documented and justified.
5.5. Testing, Monitoring, and Documentation
- Quarterly restore drills and integrity checks for all backup sets, with detailed records.
- Backup job success/failure reports monitored; failed jobs escalated immediately.
- Backups and recovery procedures are fully documented and updated after any significant change, per SOC 2 requirements.
6. Data Classification and Retention
Category | Example Data | Guidelines |
Regulated | Student, financial, sensitive | Highest frequency and longest retention, full SOC 2 audit traceability |
Critical | Applications, AI models | High protection and restoration priority |
Important | Logs, ops data | Appropriate frequency and retention |
Archival | Historical/analytics | Longer-term, compliant storage |
7. Incident Response
- Any backup failure, suspected loss, or breach must be immediately reported to the IT Manager and Security Team.
- Investigation must be logged, with root cause analysis and corrective action documented per SOC 2 requirements.
8. Policy Review and Compliance
- Annual formal policy review and after major infra or compliance change.
- All control evidence (logs, reports, tests, access reviews) kept for at least one SOC 2 audit cycle.
- EDMO’s policy is reviewed and approved by the IT Manager and security/compliance team, with version control and documented change history.
9. Supplementary Measures
- Automation: All backup, monitoring, and reporting procedures are automated where possible.
- Staff Training: Employees involved in backup operations receive annual training in SOC 2 and security procedures.
- Continuous Improvement: Results from drills, incidents, and audits are used to continuously improve backup and recovery controls.
10. Policy Summary Table
Benchmark | EDMO Implementation (SOC 2) |
Redundancy 3-2-1-1-0 | Achieved via multi-region, immutable vault, and offsite replication |
SOC 2 control evidence | All major activities logged, tested, and reviewed |
Security/access | IAM, MFA, encryption, access reviews, audit log retention |
Retention/deletion | Explicit policy with evidence, automated reporting |
Testing & drills | Quarterly, auditable, with results used for process improvement |
Annual policy review | Documented, with SOC 2 alignment and management approval |
Incident handling | Immediate escalation, documentation, and corrective action |
This policy ensures EDMO’s data is not only resilient and secure but also demonstrably compliant with SOC 2.