Essential 8 - Performing regular backups.
This is the final control of the Essential Eight and also the final line of defense in a cyberattack lifecycle. If an attacker penetrates all other 7 controls, the impact could still be reduced if all compromised files can be replaced with a clean backup in a timely manner.
Essential 8 Maturity Level 2 Controls and our Solution.