⚡ LIMITED TIME Get our FREE €500+ Compliance Starter Kit
Get It Now →

Audit-Ready Restore Testing for ISO 27001, NIS2 and DORA

Igor Petreski
14 min read
Audit-ready restore testing evidence map for ISO 27001 NIS2 and DORA

It is 07:40 on a Monday morning, and Sarah, the CISO of a fast-growing financial technology firm, is watching a crisis form in real time. The CFO cannot open the payment approval platform. The service desk thinks it is a storage issue. The infrastructure team suspects ransomware because several shared folders now show encrypted filenames. The CEO wants to know whether payroll is safe. Legal asks whether regulators must be notified.

Sarah opens the backup dashboard. It is full of green checkmarks.

That should be comforting, but it is not. A successful backup job is not proof of a successful restore. It is like seeing a fire extinguisher on the wall without knowing whether it is charged, accessible, and usable under pressure.

Sarah’s firm is in scope for ISO 27001:2022, treated as an important entity under NIS2, and subject to DORA as a financial entity. The question is no longer whether the organization runs backups. The question is whether it can restore the right systems, to the right point in time, within approved Recovery Time Objectives and Recovery Point Objectives, with evidence strong enough for an auditor, regulator, customer, insurer, and board.

That is where many backup programs fail. They have backup jobs. They have dashboards. They have snapshots. They may even have cloud storage. But when the pressure arrives, they cannot prove that critical systems are recoverable, that restore tests were performed, that failed tests triggered corrective action, and that the evidence maps cleanly to ISO 27001:2022, NIS2, DORA, NIST, and COBIT 2019 expectations.

Backup and restore testing has become a board-level operational resilience issue. NIS2 raises expectations for cybersecurity risk management and business continuity. DORA makes ICT operational resilience a core obligation for financial entities and their critical ICT service providers. ISO 27001:2022 provides the management system structure for scope, risk, control selection, evidence, audit, and continual improvement.

The practical challenge is turning a technical restore test into audit-ready evidence.

Backup is not evidence until restore is proven

A backup job that completes successfully is only a partial signal. It tells you that data was copied somewhere. It does not prove that the data can be restored, that application dependencies are intact, that encryption keys are available, that identity services still work, or that the recovered system supports real business operations.

Auditors know this. Regulators know this. Attackers know this.

A technically mature auditor will not stop at a screenshot showing 97 percent backup job success. They will ask:

  • Which systems are critical or high impact?
  • What RTO and RPO apply to each system?
  • When was the last restore test?
  • Was the test full, partial, application-level, database-level, or file-level?
  • Who validated the business process after restoration?
  • Were failures recorded as nonconformities or improvement actions?
  • How long are logs and restore test records retained?
  • Are backup copies segregated across locations?
  • How does the evidence map to the risk register and Statement of Applicability?

This is why Clarysec policy language is intentionally direct. The Backup and Restore Policy-sme [BRP-SME], section Governance Requirements, policy clause 5.3.3, requires:

Restore tests are conducted at least quarterly, and the results are documented to verify recoverability

That one sentence changes the audit conversation. It moves the organization from “we have backups” to “we verify recoverability on a defined cadence and retain the results.”

The same Backup and Restore Policy-sme, section Enforcement and Compliance, policy clause 8.2.2, reinforces the evidence obligation:

Logs and restore test records are retained for audit purposes

That clause prevents restore testing from becoming undocumented tribal memory. If an infrastructure engineer says, “We tested that in March,” but no record exists, it is not audit-ready evidence.

The same policy also addresses survivability through storage diversity. In section Policy Implementation Requirements, policy clause 6.3.1.1, backups must be:

Stored in at least two locations (local and cloud)

This is a practical baseline. It does not replace a risk assessment, but it reduces the chance that one physical or logical failure domain destroys both production and backup data.

The ISO 27001:2022 evidence chain starts before the test

Organizations often treat backup compliance as an IT operations topic. In ISO 27001:2022 terms, that is too narrow. Backup and restore testing should be embedded in the Information Security Management System, connected to scope, risk, control selection, monitoring, internal audit, and continual improvement.

Clarysec’s Zenith Blueprint: An Auditor’s 30-Step Roadmap [ZB] starts this evidence chain before any restore test is performed.

In the ISMS Foundation & Leadership phase, Step 2, Stakeholder Needs and ISMS Scope, the Zenith Blueprint instructs organizations to define what is inside the ISMS:

Action Item 4.3: Draft an ISMS scope statement. List what is included (business units, locations, systems) and any exclusions. Share this draft with top management for input – they must agree on what parts of the business will be subject to the ISMS. It’s also wise to sanity-check this scope against your earlier stakeholder requirements list: Does your scope cover all areas needed to fulfill those requirements?

For restore testing, scope defines the recovery universe. If the payment platform, identity provider, ERP database, endpoint management server, and cloud object storage are in scope, the restore evidence must include them or justify why not. If a system is excluded, the exclusion must be defensible against stakeholder requirements, contractual obligations, regulatory duties, and business continuity needs.

The next link is risk. In the Risk Management phase, Step 11, Building and Documenting the Risk Register, the Zenith Blueprint describes the risk register as the master record of risks, assets, threats, vulnerabilities, current controls, owners, and treatment decisions.

A backup-related risk entry should look practical, not theoretical.

Risk elementExample entry
AssetPayment approval platform and supporting database
ThreatRansomware encryption or destructive administrator action
VulnerabilityBackups not restored quarterly and application dependencies not validated
ImpactPayroll delay, regulatory exposure, customer trust impact
Current controlsDaily backup jobs, immutable cloud storage, quarterly restore test
Risk ownerHead of Infrastructure
Treatment decisionMitigate through tested backups, documented restore evidence, and BCP updates

This is where backup becomes auditable. It is no longer “we have backups.” It is “we identified a business risk, selected controls, assigned ownership, tested the control, and retained evidence.”

The Zenith Blueprint, Risk Management phase, Step 13, Risk Treatment Planning and Statement of Applicability, closes the traceability loop:

Map Controls to Risks and Clauses (Traceability)

Now that you have both the Risk Treatment Plan and the SoA:

✓ Map controls to risks: In your Risk Register’s treatment plan, you listed certain controls for each risk. You can add a column “Annex A Control Reference” to each risk and list the control numbers.

For backup and restore testing, the Statement of Applicability should connect the risk scenario to ISO/IEC 27001:2022 Annex A controls, especially 8.13 Information backup, 5.30 ICT readiness for business continuity, 8.14 Redundancy of information processing facilities, and 5.29 Information security during disruption.

The SoA should not simply mark these controls as applicable. It should explain why they are applicable, what implementation evidence exists, who owns the control, and how exceptions are handled.

The control map that auditors expect to see

Clarysec’s Zenith Controls: The Cross-Compliance Guide [ZC] does not create separate or proprietary controls. It organizes official standards and frameworks into a practical cross-compliance view so organizations can understand how one operational practice, such as restore testing, supports multiple obligations.

For ISO/IEC 27002:2022 control 8.13 Information backup, Zenith Controls classifies the control as Corrective, tied to Integrity and Availability, aligned to the Recover cybersecurity concept, supporting the Continuity operational capability, and sitting in the Protection security domain. That profile reframes backups as a recovery capability, not merely a storage process.

For ISO/IEC 27002:2022 control 5.30 ICT readiness for business continuity, Zenith Controls classifies the control as Corrective, focused on Availability, aligned to Respond, supporting Continuity, and positioned in the Resilience security domain. This is where restore testing connects directly to operational resilience.

For ISO/IEC 27002:2022 control 8.14 Redundancy of information processing facilities, Zenith Controls identifies a Preventive control focused on Availability, aligned to Protect, supporting Continuity and Asset management, and linked to Protection and Resilience domains. Redundancy and backups are not the same. Redundancy helps prevent interruption. Backups enable recovery after loss, corruption, or attack.

For ISO/IEC 27002:2022 control 5.29 Information security during disruption, Zenith Controls shows a broader profile: Preventive and Corrective, covering Confidentiality, Integrity, and Availability, aligned to Protect and Respond, supporting Continuity, and linked to Protection and Resilience. This matters during ransomware recovery because restoration must not create new security failures, such as restoring vulnerable images, bypassing logging, or reactivating excessive privileges.

ISO/IEC 27001:2022 Annex A controlResilience roleEvidence auditors expect
8.13 Information backupProves data and systems can be recovered after loss, corruption, or attackBackup schedule, restore test records, success criteria, logs, exceptions, retention evidence
5.30 ICT readiness for business continuityShows ICT capabilities support continuity objectivesBIA, RTO/RPO mapping, recovery runbooks, test reports, lessons learned
8.14 Redundancy of information processing facilitiesReduces dependency on a single processing facility or service pathArchitecture diagrams, failover test results, capacity review, dependency mapping
5.29 Information security during disruptionMaintains security during degraded operations and recoveryCrisis access records, emergency change approvals, logging, incident timeline, post-restore security validation

The practical lesson is simple. A restore test is not one control in isolation. It is evidence across a resilience chain.

The hidden audit gap: RTO and RPO without proof

One of the most common continuity audit findings is the gap between documented RTO/RPO and real restore capability.

The business continuity plan may state that the customer portal has a four-hour RTO and a one-hour RPO. The backup platform may run every hour. But during the first realistic restore exercise, the team discovers that the database restore takes three hours, DNS changes require another hour, the application certificate has expired, and the identity integration was never included in the runbook. The real recovery time is eight hours.

The documented RTO was fiction.

Clarysec’s Business Continuity Policy and Disaster Recovery Policy-sme [BCDR-SME], section Governance Requirements, policy clause 5.2.1.4, makes the continuity requirement explicit:

Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) for each system

That matters because “restore critical services quickly” is not measurable. “Restore the payment approval database within four hours with no more than one hour of data loss” is measurable.

The same Business Continuity Policy and Disaster Recovery Policy-sme, section Policy Implementation Requirements, policy clause 6.4.2, turns testing into improvement:

All test results must be documented, and lessons learned must be recorded and used to update the BCP.

A failed restore is not automatically an audit disaster. A failed restore with no documented lesson, owner, correction, and retest is.

For enterprise environments, Clarysec’s Backup and Restore Policy [BRP] provides more formal governance. In section Governance Requirements, policy clause 5.1, it states:

A Master Backup Schedule shall be maintained and reviewed annually. It must specify:

That opening requirement establishes the core governance artifact. A Master Backup Schedule should identify systems, data sets, backup frequency, retention, location, ownership, classification, dependencies, and testing cadence.

The same Backup and Restore Policy, section Governance Requirements, policy clause 5.2, links backup expectations to business impact:

All systems and applications classified as Critical or High impact in the Business Impact Analysis (BIA) must:

This is where BIA and backup governance converge. Critical and high impact systems require stronger recovery assurance, more frequent testing, better dependency mapping, and more disciplined evidence.

One evidence model for ISO 27001:2022, NIS2, DORA, NIST, and COBIT 2019

Compliance teams often struggle with framework duplication. ISO 27001:2022 asks for risk-based control selection and evidence. NIS2 expects cybersecurity risk-management measures, including business continuity. DORA expects ICT operational resilience, response and recovery, backup and restoration procedures, and digital operational resilience testing. NIST and COBIT 2019 use different language again.

The answer is not to build separate backup programs for each framework. The answer is to build one evidence model that can be viewed through multiple audit lenses.

Framework lensWhat backup and restore testing provesEvidence to keep audit-ready
ISO 27001:2022Risks are treated through selected controls, tested, monitored, and improved through the ISMSScope, risk register, SoA, backup schedule, restore records, internal audit results, CAPA log
NIS2Essential or important services can withstand and recover from cyber disruptionBusiness continuity plans, crisis procedures, backup tests, incident response links, management oversight
DORAICT services supporting critical or important functions are resilient and recoverableICT asset mapping, RTO/RPO, restore test reports, third-party dependency evidence, recovery procedures
NIST CSFRecovery capabilities support resilient cybersecurity outcomesRecovery plans, backup integrity checks, communications procedures, lessons learned
COBIT 2019Governance and management objectives are supported by measurable controls and accountable ownershipProcess ownership, metrics, control performance, issue tracking, management reporting

For NIS2, the most direct reference is Article 21 on cybersecurity risk-management measures. Article 21(2)(c) specifically includes business continuity, such as backup management, disaster recovery, and crisis management. Article 21(2)(f) also matters because it addresses policies and procedures to assess the effectiveness of cybersecurity risk-management measures. Restore testing is exactly that: evidence that the measure works.

For DORA, the strongest links are Article 11 on response and recovery, Article 12 on backup policies and procedures, restoration and recovery procedures and methods, and Article 24 on general requirements for digital operational resilience testing. For financial entities, a database restore test alone may be insufficient if the business service depends on cloud identity, payment gateway connectivity, outsourced hosting, or managed monitoring. DORA-style evidence should be service-level, not just server-level.

ISO/IEC 27001:2022 controlDORA connectionNIS2 connection
8.13 Information backupArticle 12 requires backup policies, restoration and recovery procedures and methodsArticle 21(2)(c) includes backup management and disaster recovery as business continuity measures
5.30 ICT readiness for business continuityArticle 11 requires response and recovery capability, and Article 24 requires resilience testingArticle 21(2)(c) includes business continuity and crisis management
8.14 Redundancy of information processing facilitiesArticles 6 and 9 support ICT risk management, protection, prevention, and reduction of single points of failureArticle 21 requires appropriate and proportionate measures to manage risks to network and information systems
5.29 Information security during disruptionArticle 11 response and recovery requires controlled recovery during incidentsArticle 21 risk-management measures require continuity without abandoning security controls

This is the efficiency of a unified compliance strategy. A quarterly restore test for a payment system can support ISO 27001:2022 Annex A evidence, NIS2 continuity expectations, DORA ICT recovery requirements, NIST CSF Recover outcomes, and COBIT 2019 governance reporting, if the evidence is structured correctly.

A practical restore test that becomes audit-ready evidence

Return to Sarah’s Monday morning scenario, but imagine her organization prepared using Clarysec’s toolkit.

The payment approval platform is classified as Critical in the BIA. The approved RTO is four hours. The approved RPO is one hour. The platform depends on a database cluster, identity provider, secrets vault, logging pipeline, DNS, certificates, and outbound email relay.

Sarah’s team builds a quarterly restore test around six steps.

Step 1: Confirm scope and dependencies

Using Zenith Blueprint Step 2, Sarah confirms that the payment platform, database, identity integration, backup infrastructure, and recovery environment are inside the ISMS scope. Legal confirms regulatory relevance. Finance confirms business impact. IT confirms dependencies.

This avoids the classic mistake of restoring only the database while ignoring the authentication service required to access the application.

Using Zenith Blueprint Step 11, the risk register includes the scenario: “Loss or encryption of payment approval platform data prevents payment operations and creates regulatory exposure.”

The current controls include daily backups, immutable cloud storage, multi-location backup copies, quarterly restore testing, and documented recovery runbooks. The risk owner is the Head of Infrastructure. The business owner is Finance Operations. The treatment decision is Mitigate.

Step 3: Map the treatment to the SoA

Using Zenith Blueprint Step 13, the SoA maps the risk to ISO/IEC 27001:2022 Annex A controls 8.13, 5.30, 8.14, and 5.29. The SoA explains that backup testing provides corrective recovery capability, ICT continuity procedures support business continuity, redundancy reduces outage probability, and security during disruption prevents insecure recovery shortcuts.

Step 4: Use policy clauses as test criteria

The team uses Backup and Restore Policy-sme clause 5.3.3 for quarterly restore testing, clause 8.2.2 for evidence retention, and clause 6.3.1.1 for multi-location storage. It uses Business Continuity Policy and Disaster Recovery Policy-sme clause 5.2.1.4 for RTO/RPO targets and clause 6.4.2 for lessons learned and BCP updates.

Test criterionTargetEvidence
Restore cadenceQuarterlyTest calendar and approved schedule
RTO4 hoursStart time, end time, elapsed recovery time
RPO1 hourBackup timestamp and transaction validation
LocationsLocal and cloud backup sources availableBackup repository report
IntegrityDatabase consistency checks passValidation logs
ApplicationFinance user can approve test paymentBusiness validation sign-off
SecurityLogging, access controls, and secrets validated after restoreSecurity checklist and screenshots

Step 5: Run the restore and record facts

The restore is performed in an isolated recovery environment. The team records timestamps, backup set identifiers, restoration steps, errors, validation results, and approvals.

A strong restore test record should include:

Restore test fieldExample
Test IDQ2-2026-PAY-RESTORE
System testedPayment approval platform
Backup set usedPayment platform backup from approved recovery point
Restore locationIsolated recovery environment
RTO target4 hours
RPO target1 hour
Actual recovery time2 hours 45 minutes
Actual recovery point42 minutes
Integrity validationDatabase consistency checks passed
Business validationFinance user approved test payment
Security validationLogging, access controls, secrets, and monitoring confirmed
OutcomePass with condition
Sign-offCISO, Infrastructure Lead, Finance Operations Owner

During the test, the team discovers one issue. The restored application cannot send notification emails because the email relay allowlist does not include the recovery subnet. Core payment approval works, but the workflow is degraded.

Step 6: Record lessons learned and corrective action

This is where many organizations stop too early. Clarysec’s approach pushes the issue into the improvement system.

In the Audit, Review & Improvement phase, Step 29, Continual Improvement, the Zenith Blueprint uses a CAPA Log to track issue description, root cause, corrective action, owner, target date, and status.

CAPA fieldExample
Issue descriptionRestored payment platform could not send email notifications from recovery subnet
Root causeRecovery network not included in email relay allowlist design
Corrective actionUpdate recovery architecture and email relay allowlist procedure
OwnerInfrastructure Lead
Target date15 business days
StatusOpen pending retest

This single restore test now produces an audit-ready evidence chain: policy requirement, scope confirmation, risk mapping, SoA mapping, test plan, execution record, business validation, security validation, issue record, corrective action, and BCP update.

How different auditors inspect the same evidence

A strong evidence package anticipates the auditor’s lens.

An ISO 27001:2022 auditor will usually start with the management system. They will ask whether backup and restore requirements are scoped, risk-based, implemented, monitored, internally audited, and improved. They will expect traceability from risk register to SoA to operational records. They may also connect failed tests and corrective actions to ISO/IEC 27001:2022 clause 10.2 on nonconformity and corrective action.

A DORA reviewer will focus on ICT operational resilience for critical or important functions. They will want to see service-level recovery, third-party ICT dependencies, scenario-based testing, management body oversight, and evidence that restoration procedures are effective.

A NIS2 supervisory perspective will look for appropriate and proportionate cybersecurity risk-management measures. Backup and disaster recovery evidence should show that essential or important services can maintain or restore operations after incidents, with management aware of residual risk.

A NIST-oriented assessor will focus on cybersecurity outcomes across Identify, Protect, Detect, Respond, and Recover. They may ask about immutable backups, privileged access to backup repositories, restoration into clean environments, communications, and lessons learned.

A COBIT 2019 or ISACA-style auditor will emphasize governance, process ownership, metrics, management reporting, and issue tracking. They will be less impressed by a technically elegant restore if ownership and reporting are unclear.

The same evidence can satisfy all of these perspectives, but only if it is complete.

Common restore testing failures that create audit findings

Clarysec repeatedly sees the same preventable evidence gaps.

Failure patternWhy it creates audit riskPractical fix
Backup success is treated as restore successCopy completion does not prove recoverabilityPerform documented restore tests with validation
RTO and RPO are defined but not testedContinuity objectives may be unrealisticMeasure actual recovery time and recovery point during tests
Only infrastructure validates the restoreBusiness process may still be unusableRequire business owner sign-off for critical systems
Test records are scatteredAuditors cannot verify consistencyUse a standard restore test report template and evidence folder
Failed tests are discussed but not trackedNo continual improvement evidenceLog issues in CAPA with owner, due date, and retest
Backups are stored in one logical failure domainRansomware or misconfiguration can destroy recoverabilityUse segregated locations, immutable storage, and access control
Dependencies are excludedRestored applications may not functionMap identity, DNS, secrets, certificates, integrations, and logging
Security is ignored during recoveryRestored services may be vulnerable or unmonitoredInclude post-restore security validation

The goal is not bureaucracy. The goal is reliable recovery under pressure and defensible evidence under audit.

Build a board-level recovery evidence pack

Executives do not need raw backup logs. They need assurance that critical services are recoverable, exceptions are known, and improvement actions are progressing.

For each critical service, report:

  • Service name and business owner
  • Criticality from BIA
  • Approved RTO and RPO
  • Last restore test date
  • RTO and RPO achieved
  • Test result
  • Open corrective actions
  • Third-party dependencies affecting recovery
  • Residual risk statement
  • Next scheduled test
Critical serviceRTO/RPOLast testResultOpen issueManagement message
Payment approval platform4h/1h2026-04-12Pass with conditionEmail relay recovery subnet allowlistCore payment approval restored within target, notification workflow remediation in progress
Customer portal8h/2h2026-03-20FailDatabase restore exceeded RTO by 90 minutesCapacity and restore process improvement required
Identity provider recovery2h/15m2026-04-05PassNoneSupports recovery of dependent critical services

This style of reporting creates a bridge between technical teams, auditors, and leadership. It also supports ISMS management review and resilience oversight under NIS2 and DORA.

Practical audit checklist for the next 30 to 90 days

If your audit is approaching, start with the evidence you already have and close the highest-risk gaps first.

  • Identify all Critical and High impact systems from the BIA.
  • Confirm RTO and RPO for each critical system.
  • Verify each critical system appears in the Master Backup Schedule.
  • Confirm backup locations, including local, cloud, immutable, or segregated repositories.
  • Select at least one recent restore test per critical service or schedule a test immediately.
  • Ensure restore test records show scope, timestamps, backup set, result, RTO/RPO achieved, and validation.
  • Obtain business owner sign-off for application-level recovery.
  • Validate security after restore, including access control, logging, monitoring, secrets, certificates, and vulnerability exposure.
  • Map evidence to the risk register and SoA.
  • Record issues in CAPA, assign owners, and track retest.
  • Summarize results for management review.
  • Prepare a cross-compliance view for ISO 27001:2022, NIS2, DORA, NIST CSF, and COBIT 2019 audit conversations.

If you cannot complete every item before the audit, be transparent. Auditors usually respond better to a documented gap with a corrective action plan than to vague claims of maturity.

Make restore testing your strongest resilience evidence

Backup and restore testing is one of the clearest ways to prove operational resilience. It is tangible, measurable, business-relevant, and directly connected to ISO 27001:2022, NIS2, DORA, NIST, COBIT 2019, board reporting, customer assurance, and insurer expectations.

But only if it is documented properly.

Clarysec helps organizations turn backup operations into audit-ready evidence through the Backup and Restore Policy, Backup and Restore Policy-sme, Business Continuity Policy and Disaster Recovery Policy-sme, Zenith Blueprint, and Zenith Controls.

Your next practical move is simple. Choose one critical service this week. Run a restore test against its approved RTO and RPO. Document the result. Map it to the risk register and SoA. Log every lesson learned.

If you want that process to be repeatable across ISO 27001:2022, NIS2, DORA, NIST, and COBIT 2019, Clarysec’s toolkit gives you the structure to prove recovery without building a compliance maze from scratch.

Frequently Asked Questions

About the Author

Igor Petreski

Igor Petreski

Compliance Systems Architect, Clarysec LLC

Igor Petreski is a cybersecurity leader with over 30 years of experience in information technology and a dedicated decade specializing in global Governance, Risk, and Compliance (GRC).Core Credentials & Qualifications:• MSc in Cyber Security from Royal Holloway, University of London• PECB-Certified ISO/IEC 27001 Lead Auditor & Trainer• Certified Information Systems Auditor (CISA) from ISACA• Certified Information Security Manager (CISM) from ISACA • Certified Ethical Hacker from EC-Council

Share this article

Related Articles

ISO 27001 Audit Evidence for NIS2 and DORA

ISO 27001 Audit Evidence for NIS2 and DORA

Learn how to use ISO/IEC 27001:2022 internal audit and management review as a unified evidence engine for NIS2, DORA, GDPR, supplier risk, customer assurance and board accountability.

ISO 27001 SoA for NIS2 and DORA Readiness

ISO 27001 SoA for NIS2 and DORA Readiness

Learn how to use the ISO 27001 Statement of Applicability as an audit-ready bridge between NIS2, DORA, GDPR, risk treatment, suppliers, incident response, and evidence.

NIS2 2024/2690 ISO 27001 Cloud Provider Map

NIS2 2024/2690 ISO 27001 Cloud Provider Map

A unified NIS2 Implementing Regulation 2024/2690 to ISO/IEC 27001:2022 control mapping for cloud, MSP, MSSP and data centre providers. Includes Clarysec policy clauses, audit evidence, DORA and GDPR alignment, and a practical implementation roadmap.