Loading
CYBER RESILIENCE SCORECARD

0

Shield Icon Confetti

How mature is your cyber resilience?

Collect points as you move through the 5 steps of cyber resilience.

Estimated time to complete ~ 2 minutes

START NOW
STEP 1 of 5

Protect all data

Yes No Not sure

Do you back up SaaS, on-prem, and cloud data from all your data sources on a modern platform?

Is your UI simple to use so you can manage expansive data estates quickly?

Are your backups centralized to reduce the attack surface?

Can you identify unprotected data?

Progress

0

Shield Icon Confetti
STEP 2 of 5

Ensure data is always recoverable

Yes No Not sure

Have you hardened your platform with MFA, immutability, and RBAC?

Do you adhere to the 3-2-1-1 backup rule?

Have you added a cyber vault to increase resilience for your most important data?

Do you require additional authorization for critical backup and recovery operations (e.g. deleting backups)?

Progress

0

Shield Icon Confetti
STEP 3 of 5

Detect and investigate threats

Yes No Not sure

Do you check your backups for malware or threats?

Does your backup platform alert you accurately to potential threats?

Can your backup platform help investigate attacks and assess impact when primary systems are down?

Does your backup platform share threat data with a SIEM and/or SOAR tool like CrowdStrike, Palo Alto, and Cisco?

Progress

0

Shield Icon Confetti
STEP 4 of 5

Practice application resilience

Yes No Not sure

Do you maintain a digital jump bag so you can quickly start incident response when an incident strikes?

Do you regularly do recovery testing to ensure you can restore your critical applications from backups?

Do you have a clean room solution that helps you speed investigation and remediation for a secure recovery?

Do you have an expert support team you can call during an attack?

Progress

0

Shield Icon Confetti
STEP 5 of 5

Optimize data risk posture

Yes No Not sure

Does your backup platform work with your preferred DSPM tool to assess what data is where and whether it’s backed up?

Does your backup platform help you prioritize the most critical workloads you should be backing up?

Can you use your backup platform to classify sensitive data and assess the impact of an attack?

Do you understand what data might be in unsecured storage (e.g. S3 buckets) in your cloud infrastructure?

Progress

0

Shield Icon Confetti
Loading