SlideShare une entreprise Scribd logo
1  sur  56
Information
Security
Business Continuity &
Disaster Recovery Planning
Narudom Roongsiriwong, CISSP
Objectives
 Running a business continuity and
disaster recovery planning project
 Developing business continuity
and disaster recovery plans
 Testing business continuity and
disaster recovery plans
 Training users
 Maintaining business continuity
and disaster recovery plans
Business Continuity and Disaster
Planning Basics
What Is a Disaster

Any natural or man-made event that disrupts
the operations of a business
in such a significant way that a considerable and
coordinated effort is required to achieve a
recovery.
Natural Disasters
 Geological:
earthquakes, volcanoes, tsunamis, landslides,
and sinkholes
 Meteorological: hurricanes, tornados, wind
storms, hail, ice storms, snow
storms, rainstorms, and lightning
 Other: avalanches, fires, floods, meteors and
meteorites, and solar storms
 Health: widespread illnesses, quarantines, and
pandemics
Natural Disaster in 2012
Man-made Disasters
 Labor: strikes, walkouts, and slow-downs that
disrupt services and supplies
 Social-political:
war, terrorism, sabotage, vandalism, civil
unrest, protests, demonstrations, cyber
attacks, and blockades
 Materials: fires, hazardous materials spills
 Utilities: power failures, communications
outages, water supply shortages, fuel
shortages, and radioactive fallout from power
How Disasters Affect
Businesses
 Direct damage to facilities and equipment
 Transportation infrastructure damage


Delays deliveries, supplies, customers, employees
going to work

 Communications outages
 Utilities outages
How BCP and DRP
Support Security
 Security pillars: C-I-A




Confidentiality
Integrity
Availability

 BCP and DRP directly support availability
BCP and DRP
Differences and Similarities
 BCP






Activities required to
ensure the
continuation of critical
business processes in
an organization
Alternate
personnel, equipment
, and facilities
Often includes non-IT
aspects of business

 DRP




Assessment, salvage, r
epair, and eventual
restoration of
damaged facilities and
systems
Often focuses on IT
systems
Industry Standards Supporting
BCP and DRP
 ISO 27001: Requirements for Information
Security Management Systems. Section 14
addresses business continuity management.
 ISO 27002: Code of Practice for Business
Continuity Management.
Industry Standards Supporting
BCP and DRP (cont.)
 NIST 800-34






Contingency Planning
Guide for Information
Technology Systems.
Seven step process for
BCP and DRP projects
From U.S. National
Institute for Standards
and Technology

 NFPA 1600




Standard on Disaster /
Emergency
Management and
Business Continuity
Programs
From U.S. National
Fire Protection
Association
Industry Standards Supporting
BCP and DRP (cont.)
 NFPA 1620: The Recommended Practice for
Pre-Incident Planning.
 HIPAA: Requires a documented and tested
disaster recovery plan


U.S. Health Insurance Portability and
Accountability Act
Benefits of BCP and DRP
Planning






Reduced risk
Process improvements
Improved organizational maturity
Improved availability and reliability
Marketplace advantage
The Role of Prevention
 Not prevention of the disaster itself


Prevention of surprise and
disorganized response

 Reduction in impact of a disaster






Better equipment bracing
Better fire detection and suppression
Contingency plans that provide [near]
continuous operation of critical
business processes
Prevention of extended periods of
downtime
Running a BCP / DRP Project

Phase I: Project
Initiation

Phase II:
Current State
Assessment

Phase III:
Design and
Development

Phase V:
Maintaining
BCP & DRP

Phase IV:
Implementation
Phase I: Project Initiation
Project Initiation
 Establish the organization’s continuity
planning scope and objectives criteria
 Gain and demonstrate management support
 Form the continuity planning project team
(CPPT), and define their roles and
responsibilities
 Define and obtain continuity
project resource requirements
 Understand and leverage current and
anticipated disaster avoidance preparations
Project Initiation Phase
Activities and Tasks
Activity/Task
Prepare project charter and obtain
management approval
Prepare and finalize project plan,
including work steps, deliverables, and
milestones
Prepare and finalize project budget
Management presentation and approval
to move to next phase

Deliverables
Project
charter
Project work
plan
Budget
Phase II: Current State Assessment
Survey In-scope
Business Processes
 Develop interview / intake template
 Interview a rep from each department



Identify all important processes
Identify dependencies on
systems, people, equipment

 Collate data into database or spreadsheets


Gives a big picture, all-company view
Performing a Business
Impact Assessment
 Survey critical processes
 Perform risk analyses and threat assessment
 Determine Maximum Tolerable Downtime
(MTD)
 Establish key recovery targets
Threat and Risk Analysis
 Identify threats, vulnerabilities, risks, for each
key process



Rank according to probability, impact, cost
Identify mitigating controls
Determine Maximum
Tolerable Downtime (MTD)
 For each business process
 Identify the maximum time that each business
process can be inoperative before significant
damage or long-term viability is threatened
 Probably an educated guess for many
processes
 Obtain senior management input to validate
data
 Publish into the same database / spreadsheet
listing all business processes
Develop Statements of Impact
 For each process, describe the impact
on the rest of the organization if the process is
incapacitated
 Examples




Inability to process payments
Inability to produce invoices
Inability to access customer data for support
purposes
Record Other Key Metrics
 Examples




Cost to operate the process
Cost of process downtime
Profit derived from the process

 Useful for upcoming Criticality Analysis
Ascertain Current Continuity
and Recovery Capabilities
 For each business process




Identify documented continuity capabilities
Identify documented recovery capabilities
Identify undocumented capabilities
 What if the disaster happened tomorrow
Develop Key Recovery Targets
 Recovery time objective (RTO)


Period of time from disaster onset to
resumption of business process

 Recovery point objective (RPO)




Maximum period of data loss from onset
of disaster counting backwards
Amount of work that will have to be done over

 Obtain senior management buyoff on RTO/RPO
 Publish into the same database / spreadsheet
listing all business processes
Sample Recovery Point
Objectives
RPO

Technologies required

8-14 days

New equipment, data recovery from backup

4-7 days

Cold systems, data recovery from backup

2-3 days

Warm systems, data recovery from backup

12-24 hours Warm systems, recovery from high speed
backup media
Sample Recovery
Point Objectives (cont.)
RPO

Technologies required

6-12 hours

Hot systems, recovery from high speed
backup media
Hot systems, data replication
Clustering, data replication
Clustering, near real time data replication

3-6 hours
1-3 hours
< 1 hour
Criticality Analysis
 Rank processes by criticality criteria






MTD (maximum tolerable downtime)
RTO (recovery time objective)
RPO (recovery point objective)
Cost of downtime or other metrics
Qualitative criteria
 Reputation, market share, goodwill
Improve System and
Process Resilience
 For the most critical processes (based upon
ranking in the criticality analysis)





Identify the biggest risks
Identify cost of mitigation
Can several mitigating controls be combined
Do mitigating controls follow best / common
practices
Develop Business Continuity
and Recovery Plans
Select Recovery Team
Members
 Selection criteria









Location of residence, relative to work
and other key locations
Skills and experience (determines effectiveness)
Ability and willingness to respond
Health and family (determines probability to
serve)
Identify backups
 Other team members, external resources
Emergency Response
 Personnel safety: includes first-aid, searching
for personnel, etc.
 Evacuation: evacuation procedures to prevent
any hazard to workers.
 Asset protection: includes buildings, vehicles,
and equipment.
Emergency Response (cont.)
 Damage assessment: this could involve
outside structural engineers to assess damage
to buildings and equipment.
 Emergency notification: response team
communication, and keeping management
and organization staff informed.
Damage Assessment and
Salvage
 Determine damage to
buildings, equipment, utilities



Requires inside experts
Usually requires outside experts
 Civil engineers to inspect buildings
 Government building inspectors

 Salvage




Identify working and salvageable assets
Cannibalize for parts or other uses
Notification
 Many parties need to know the condition of
the organization


Employees, suppliers, customers, regulators,
authorities, shareholders, community

 Methods of communication



Telephone call trees, web site, signage, media
Alternate means of communication must be
identified
Personnel Safety
 The number one concern in any disaster
response operation





Emergency evacuation
Accounting for all personnel
Administering first-aid
Emergency supplies
 Water, food, blankets, shelters
 On-site employees could be stranded for
several days
Communications
 Communications essential during emergency
operations
 Considerations


Avoid common infrastructure
 Don't have emergency communications through the
same wires as normal communications







Diversify mobile services
Consider two-way radios
Consider satellite phones
Consider amateur radio
Public Utilities and
Infrastructure
 Often interrupted during a disaster








Electricity: UPS (Uninterruptible Power
Supply), generator
Water: building could be closed if no
water is available for fire suppression
Natural gas: heating
Wastewater: if disabled, building could be closed
Steam heat
Logistics and Supplies










Food and drinking water
Blankets and sleeping cots
Sanitation (toilets, showers, etc.)
Tools
Spare parts
Waste bins
Information
Communications
Fire protection (extinguishers, sprinklers, smoke
alarms, fire alarms)
Business Resumption Planning
 Alternate work locations
 Alternate personnel
 Communications


Emergency, support of business processes

 Standby assets and equipment
 Access to procedures, business records
Restoration and Recovery





Repairs to facilities, equipment
Replacement equipment
Restoration of utilities
Resumption of business operations in primary
business facilities
Improving System Resilience
and Recovery
 Off-site media storage


Assurance of data recovery

 Server clusters



Improved availability
Geographic clusters: members far apart

 Data replication



Application, DMBS, OS, or Hardware
Maintains current data on multiple servers even in
remote places
Training Staff





Everyday operations
Recovery procedures
Emergency procedures
Resumption procedures
Testing Business Continuity
and Disaster Recovery Plans
Testing Business Continuity
and Disaster Recovery Plans
 Five levels of testing






Document review
Walkthrough
Simulation
Parallel test
Cutover test
Document Review
 Review of recovery, operations, resumption
plans and procedures
 Performed by individuals
 Provide feedback to document owners
Walkthrough
 Performed by teams
 Group discussion of recovery, operations,
resumption plans and procedures
 Brainstorming and discussion brings out new
issues, ideas
 Provide feedback to document owners
Simulation
 Walkthrough of recovery, operations,
resumption plans and procedures in a scripted
“case study” or “scenario”
 Performed by teams
 Places participants in a mental disaster setting
that helps them discern real issues more
easily
Parallel Test
 Full or partial workload is applied to recovery
systems
 Performed by teams
 Tests actual system readiness and accuracy of
procedures
 Production systems continue to operate and
support actual business processes
Cutover Test
 Production systems are shut down or
disconnected; recovery systems assume full
actual workload
 Risk of interrupting real business
 Gives confidence in DR (Disaster Recovery)
system if it works
Maintaining Business Continuity
and Disaster Recovery Plans
Maintaining Business Continuity
and Disaster Recovery Plans
 Events that necessitate review and
modification of DRP and BCP procedures:







Changes in business processes and procedures
Changes to IT systems and applications
Changes in IT architecture
Additions to IT applications
Changes in service providers
Changes in organizational structure
Q&A

Contenu connexe

Tendances

Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop FinalBill Lisse
 
Disaster Recovery Plan
Disaster Recovery Plan Disaster Recovery Plan
Disaster Recovery Plan Emilie Gray
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planningalanlund
 
Disaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity PlanDisaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity PlanMarcelo Silva
 
Disaster Recovery Planning PowerPoint Presentation Slides
Disaster Recovery Planning PowerPoint Presentation SlidesDisaster Recovery Planning PowerPoint Presentation Slides
Disaster Recovery Planning PowerPoint Presentation SlidesSlideTeam
 
Business Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery NotesBusiness Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery NotesAlan McSweeney
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcpAdv Prashant Mali
 
Best Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingBest Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingAxcient
 
Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IThhuihhui
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planninggcleary
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery PlanDavid Donovan
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity PlanningDipankar Ghosh
 
Assess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAssess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAnand Subramaniam
 

Tendances (20)

Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop Final
 
Bcp drp
Bcp drpBcp drp
Bcp drp
 
Disaster Recovery Plan
Disaster Recovery Plan Disaster Recovery Plan
Disaster Recovery Plan
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Disaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity PlanDisaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity Plan
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Disaster Recovery Planning PowerPoint Presentation Slides
Disaster Recovery Planning PowerPoint Presentation SlidesDisaster Recovery Planning PowerPoint Presentation Slides
Disaster Recovery Planning PowerPoint Presentation Slides
 
Business Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery NotesBusiness Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery Notes
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
 
Introduction to Business Continuity Management
Introduction to Business Continuity ManagementIntroduction to Business Continuity Management
Introduction to Business Continuity Management
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
 
Best Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingBest Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and Testing
 
Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IT
 
Business Continuity Planning Presentation
Business Continuity Planning PresentationBusiness Continuity Planning Presentation
Business Continuity Planning Presentation
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
 
BCP Awareness
BCP Awareness BCP Awareness
BCP Awareness
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Assess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAssess Your Business Continuity Management Process
Assess Your Business Continuity Management Process
 
9 Bcp+Drp
9 Bcp+Drp9 Bcp+Drp
9 Bcp+Drp
 

En vedette

An Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery PlanningAn Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery PlanningNEBizRecovery
 
Disaster Recovery Presentation
Disaster Recovery PresentationDisaster Recovery Presentation
Disaster Recovery PresentationTimSchaefer
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesSpiceworks
 
Disaster management-ppt
Disaster management-pptDisaster management-ppt
Disaster management-pptVinod Kumari
 
Disaster management ppt
Disaster management pptDisaster management ppt
Disaster management pptAniket Pingale
 

En vedette (6)

An Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery PlanningAn Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery Planning
 
Disaster Recovery Presentation
Disaster Recovery PresentationDisaster Recovery Presentation
Disaster Recovery Presentation
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
Disaster management-ppt
Disaster management-pptDisaster management-ppt
Disaster management-ppt
 
Disaster management
Disaster managementDisaster management
Disaster management
 
Disaster management ppt
Disaster management pptDisaster management ppt
Disaster management ppt
 

Similaire à Business continuity & disaster recovery planning (BCP & DRP)

TCG Svcs Pres 2011
TCG Svcs Pres 2011TCG Svcs Pres 2011
TCG Svcs Pres 2011mcourton
 
Chapter 3Business Continuity PlanningPlanning for Busi.docx
Chapter 3Business Continuity PlanningPlanning for Busi.docxChapter 3Business Continuity PlanningPlanning for Busi.docx
Chapter 3Business Continuity PlanningPlanning for Busi.docxwalterl4
 
Cyber Security and Business Continuity an Integrated Discipline
Cyber Security and Business Continuity an Integrated DisciplineCyber Security and Business Continuity an Integrated Discipline
Cyber Security and Business Continuity an Integrated DisciplineGraeme Parker
 
Oil Spill Crisis Action Team Back Up, Relief 052410
Oil Spill Crisis Action Team Back Up, Relief 052410Oil Spill Crisis Action Team Back Up, Relief 052410
Oil Spill Crisis Action Team Back Up, Relief 052410arainold
 
05 integrated management system telkom 2016 penanganan bencana - tanggap da...
05 integrated management system   telkom 2016 penanganan bencana - tanggap da...05 integrated management system   telkom 2016 penanganan bencana - tanggap da...
05 integrated management system telkom 2016 penanganan bencana - tanggap da...wisnu wardhana, i nyoman
 
Study to Identify and Rectify Potential Risks in General Engineering Services...
Study to Identify and Rectify Potential Risks in General Engineering Services...Study to Identify and Rectify Potential Risks in General Engineering Services...
Study to Identify and Rectify Potential Risks in General Engineering Services...Sheetal Singh
 
Disaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA frameworkDisaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA frameworkDavid Sweigert
 
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...BCM Institute
 
Risk mgmt key to security certifications v2
Risk mgmt key to security certifications v2Risk mgmt key to security certifications v2
Risk mgmt key to security certifications v2Jorge Sebastiao
 
Continuity Planning 101
Continuity Planning 101Continuity Planning 101
Continuity Planning 101tjrettig
 
Disaster Biz Resumpt
Disaster Biz ResumptDisaster Biz Resumpt
Disaster Biz ResumptJimGroark
 
INDUSTRIAL SAFETY
INDUSTRIAL SAFETYINDUSTRIAL SAFETY
INDUSTRIAL SAFETYshone john
 
Chapter 4 Selecting a StrategyRecovery strategyMa.docx
Chapter 4 Selecting a StrategyRecovery strategyMa.docxChapter 4 Selecting a StrategyRecovery strategyMa.docx
Chapter 4 Selecting a StrategyRecovery strategyMa.docxketurahhazelhurst
 
BCP Overview
BCP OverviewBCP Overview
BCP Overviewmcourton
 
ISACA Belgium CERT view 2011
ISACA Belgium CERT view 2011ISACA Belgium CERT view 2011
ISACA Belgium CERT view 2011Marc Vael
 

Similaire à Business continuity & disaster recovery planning (BCP & DRP) (20)

TCG Svcs Pres 2011
TCG Svcs Pres 2011TCG Svcs Pres 2011
TCG Svcs Pres 2011
 
Chapter 3Business Continuity PlanningPlanning for Busi.docx
Chapter 3Business Continuity PlanningPlanning for Busi.docxChapter 3Business Continuity PlanningPlanning for Busi.docx
Chapter 3Business Continuity PlanningPlanning for Busi.docx
 
Cyber Security and Business Continuity an Integrated Discipline
Cyber Security and Business Continuity an Integrated DisciplineCyber Security and Business Continuity an Integrated Discipline
Cyber Security and Business Continuity an Integrated Discipline
 
Business Continuation Recovery Plan
Business Continuation Recovery PlanBusiness Continuation Recovery Plan
Business Continuation Recovery Plan
 
Oil Spill Crisis Action Team Back Up, Relief 052410
Oil Spill Crisis Action Team Back Up, Relief 052410Oil Spill Crisis Action Team Back Up, Relief 052410
Oil Spill Crisis Action Team Back Up, Relief 052410
 
05 integrated management system telkom 2016 penanganan bencana - tanggap da...
05 integrated management system   telkom 2016 penanganan bencana - tanggap da...05 integrated management system   telkom 2016 penanganan bencana - tanggap da...
05 integrated management system telkom 2016 penanganan bencana - tanggap da...
 
Study to Identify and Rectify Potential Risks in General Engineering Services...
Study to Identify and Rectify Potential Risks in General Engineering Services...Study to Identify and Rectify Potential Risks in General Engineering Services...
Study to Identify and Rectify Potential Risks in General Engineering Services...
 
Disaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA frameworkDisaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA framework
 
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
 
Apdip disaster mgmt
Apdip disaster mgmtApdip disaster mgmt
Apdip disaster mgmt
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
 
Risk mgmt key to security certifications v2
Risk mgmt key to security certifications v2Risk mgmt key to security certifications v2
Risk mgmt key to security certifications v2
 
Continuity Planning 101
Continuity Planning 101Continuity Planning 101
Continuity Planning 101
 
Qatar Proposal
Qatar ProposalQatar Proposal
Qatar Proposal
 
Disaster Biz Resumpt
Disaster Biz ResumptDisaster Biz Resumpt
Disaster Biz Resumpt
 
INDUSTRIAL SAFETY
INDUSTRIAL SAFETYINDUSTRIAL SAFETY
INDUSTRIAL SAFETY
 
Chapter 4 Selecting a StrategyRecovery strategyMa.docx
Chapter 4 Selecting a StrategyRecovery strategyMa.docxChapter 4 Selecting a StrategyRecovery strategyMa.docx
Chapter 4 Selecting a StrategyRecovery strategyMa.docx
 
BCP Overview
BCP OverviewBCP Overview
BCP Overview
 
ISACA Belgium CERT view 2011
ISACA Belgium CERT view 2011ISACA Belgium CERT view 2011
ISACA Belgium CERT view 2011
 

Plus de Narudom Roongsiriwong, CISSP

How Good Security Architecture Saves Corporate Workers from COVID-19
How Good Security Architecture Saves Corporate Workers from COVID-19How Good Security Architecture Saves Corporate Workers from COVID-19
How Good Security Architecture Saves Corporate Workers from COVID-19Narudom Roongsiriwong, CISSP
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryNarudom Roongsiriwong, CISSP
 
Application Security Verification Standard Project
Application Security Verification Standard ProjectApplication Security Verification Standard Project
Application Security Verification Standard ProjectNarudom Roongsiriwong, CISSP
 
Top 10 Bad Coding Practices Lead to Security Problems
Top 10 Bad Coding Practices Lead to Security ProblemsTop 10 Bad Coding Practices Lead to Security Problems
Top 10 Bad Coding Practices Lead to Security ProblemsNarudom Roongsiriwong, CISSP
 

Plus de Narudom Roongsiriwong, CISSP (20)

Biometric Authentication.pdf
Biometric Authentication.pdfBiometric Authentication.pdf
Biometric Authentication.pdf
 
Security Shift Leftmost - Secure Architecture.pdf
Security Shift Leftmost - Secure Architecture.pdfSecurity Shift Leftmost - Secure Architecture.pdf
Security Shift Leftmost - Secure Architecture.pdf
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat Modeling
 
Security Patterns for Software Development
Security Patterns for Software DevelopmentSecurity Patterns for Software Development
Security Patterns for Software Development
 
How Good Security Architecture Saves Corporate Workers from COVID-19
How Good Security Architecture Saves Corporate Workers from COVID-19How Good Security Architecture Saves Corporate Workers from COVID-19
How Good Security Architecture Saves Corporate Workers from COVID-19
 
Secure Software Design for Data Privacy
Secure Software Design for Data PrivacySecure Software Design for Data Privacy
Secure Software Design for Data Privacy
 
Blockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for DummiesBlockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for Dummies
 
DevSecOps 101
DevSecOps 101DevSecOps 101
DevSecOps 101
 
National Digital ID Platform Technical Forum
National Digital ID Platform Technical ForumNational Digital ID Platform Technical Forum
National Digital ID Platform Technical Forum
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
 
Secure Your Encryption with HSM
Secure Your Encryption with HSMSecure Your Encryption with HSM
Secure Your Encryption with HSM
 
Application Security Verification Standard Project
Application Security Verification Standard ProjectApplication Security Verification Standard Project
Application Security Verification Standard Project
 
Coding Security: Code Mania 101
Coding Security: Code Mania 101Coding Security: Code Mania 101
Coding Security: Code Mania 101
 
Top 10 Bad Coding Practices Lead to Security Problems
Top 10 Bad Coding Practices Lead to Security ProblemsTop 10 Bad Coding Practices Lead to Security Problems
Top 10 Bad Coding Practices Lead to Security Problems
 
OWASP Top 10 Proactive Control 2016 (C5-C10)
OWASP Top 10 Proactive Control 2016 (C5-C10)OWASP Top 10 Proactive Control 2016 (C5-C10)
OWASP Top 10 Proactive Control 2016 (C5-C10)
 
Securing the Internet from Cyber Criminals
Securing the Internet from Cyber CriminalsSecuring the Internet from Cyber Criminals
Securing the Internet from Cyber Criminals
 
Secure Code Review 101
Secure Code Review 101Secure Code Review 101
Secure Code Review 101
 
Secure Software Development Adoption Strategy
Secure Software Development Adoption StrategySecure Software Development Adoption Strategy
Secure Software Development Adoption Strategy
 
Secure PHP Coding
Secure PHP CodingSecure PHP Coding
Secure PHP Coding
 

Dernier

Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandSharisaBethune
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524najka9823
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCRalexsharmaa01
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCRashishs7044
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 

Dernier (20)

Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal Brand
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 

Business continuity & disaster recovery planning (BCP & DRP)

  • 1. Information Security Business Continuity & Disaster Recovery Planning Narudom Roongsiriwong, CISSP
  • 2. Objectives  Running a business continuity and disaster recovery planning project  Developing business continuity and disaster recovery plans  Testing business continuity and disaster recovery plans  Training users  Maintaining business continuity and disaster recovery plans
  • 3. Business Continuity and Disaster Planning Basics
  • 4. What Is a Disaster Any natural or man-made event that disrupts the operations of a business in such a significant way that a considerable and coordinated effort is required to achieve a recovery.
  • 5. Natural Disasters  Geological: earthquakes, volcanoes, tsunamis, landslides, and sinkholes  Meteorological: hurricanes, tornados, wind storms, hail, ice storms, snow storms, rainstorms, and lightning  Other: avalanches, fires, floods, meteors and meteorites, and solar storms  Health: widespread illnesses, quarantines, and pandemics
  • 7. Man-made Disasters  Labor: strikes, walkouts, and slow-downs that disrupt services and supplies  Social-political: war, terrorism, sabotage, vandalism, civil unrest, protests, demonstrations, cyber attacks, and blockades  Materials: fires, hazardous materials spills  Utilities: power failures, communications outages, water supply shortages, fuel shortages, and radioactive fallout from power
  • 8. How Disasters Affect Businesses  Direct damage to facilities and equipment  Transportation infrastructure damage  Delays deliveries, supplies, customers, employees going to work  Communications outages  Utilities outages
  • 9. How BCP and DRP Support Security  Security pillars: C-I-A    Confidentiality Integrity Availability  BCP and DRP directly support availability
  • 10. BCP and DRP Differences and Similarities  BCP    Activities required to ensure the continuation of critical business processes in an organization Alternate personnel, equipment , and facilities Often includes non-IT aspects of business  DRP   Assessment, salvage, r epair, and eventual restoration of damaged facilities and systems Often focuses on IT systems
  • 11. Industry Standards Supporting BCP and DRP  ISO 27001: Requirements for Information Security Management Systems. Section 14 addresses business continuity management.  ISO 27002: Code of Practice for Business Continuity Management.
  • 12. Industry Standards Supporting BCP and DRP (cont.)  NIST 800-34    Contingency Planning Guide for Information Technology Systems. Seven step process for BCP and DRP projects From U.S. National Institute for Standards and Technology  NFPA 1600   Standard on Disaster / Emergency Management and Business Continuity Programs From U.S. National Fire Protection Association
  • 13. Industry Standards Supporting BCP and DRP (cont.)  NFPA 1620: The Recommended Practice for Pre-Incident Planning.  HIPAA: Requires a documented and tested disaster recovery plan  U.S. Health Insurance Portability and Accountability Act
  • 14. Benefits of BCP and DRP Planning      Reduced risk Process improvements Improved organizational maturity Improved availability and reliability Marketplace advantage
  • 15. The Role of Prevention  Not prevention of the disaster itself  Prevention of surprise and disorganized response  Reduction in impact of a disaster     Better equipment bracing Better fire detection and suppression Contingency plans that provide [near] continuous operation of critical business processes Prevention of extended periods of downtime
  • 16. Running a BCP / DRP Project Phase I: Project Initiation Phase II: Current State Assessment Phase III: Design and Development Phase V: Maintaining BCP & DRP Phase IV: Implementation
  • 17. Phase I: Project Initiation
  • 18. Project Initiation  Establish the organization’s continuity planning scope and objectives criteria  Gain and demonstrate management support  Form the continuity planning project team (CPPT), and define their roles and responsibilities  Define and obtain continuity project resource requirements  Understand and leverage current and anticipated disaster avoidance preparations
  • 19. Project Initiation Phase Activities and Tasks Activity/Task Prepare project charter and obtain management approval Prepare and finalize project plan, including work steps, deliverables, and milestones Prepare and finalize project budget Management presentation and approval to move to next phase Deliverables Project charter Project work plan Budget
  • 20. Phase II: Current State Assessment
  • 21. Survey In-scope Business Processes  Develop interview / intake template  Interview a rep from each department   Identify all important processes Identify dependencies on systems, people, equipment  Collate data into database or spreadsheets  Gives a big picture, all-company view
  • 22. Performing a Business Impact Assessment  Survey critical processes  Perform risk analyses and threat assessment  Determine Maximum Tolerable Downtime (MTD)  Establish key recovery targets
  • 23. Threat and Risk Analysis  Identify threats, vulnerabilities, risks, for each key process   Rank according to probability, impact, cost Identify mitigating controls
  • 24. Determine Maximum Tolerable Downtime (MTD)  For each business process  Identify the maximum time that each business process can be inoperative before significant damage or long-term viability is threatened  Probably an educated guess for many processes  Obtain senior management input to validate data  Publish into the same database / spreadsheet listing all business processes
  • 25. Develop Statements of Impact  For each process, describe the impact on the rest of the organization if the process is incapacitated  Examples    Inability to process payments Inability to produce invoices Inability to access customer data for support purposes
  • 26. Record Other Key Metrics  Examples    Cost to operate the process Cost of process downtime Profit derived from the process  Useful for upcoming Criticality Analysis
  • 27. Ascertain Current Continuity and Recovery Capabilities  For each business process    Identify documented continuity capabilities Identify documented recovery capabilities Identify undocumented capabilities  What if the disaster happened tomorrow
  • 28. Develop Key Recovery Targets  Recovery time objective (RTO)  Period of time from disaster onset to resumption of business process  Recovery point objective (RPO)   Maximum period of data loss from onset of disaster counting backwards Amount of work that will have to be done over  Obtain senior management buyoff on RTO/RPO  Publish into the same database / spreadsheet listing all business processes
  • 29. Sample Recovery Point Objectives RPO Technologies required 8-14 days New equipment, data recovery from backup 4-7 days Cold systems, data recovery from backup 2-3 days Warm systems, data recovery from backup 12-24 hours Warm systems, recovery from high speed backup media
  • 30. Sample Recovery Point Objectives (cont.) RPO Technologies required 6-12 hours Hot systems, recovery from high speed backup media Hot systems, data replication Clustering, data replication Clustering, near real time data replication 3-6 hours 1-3 hours < 1 hour
  • 31. Criticality Analysis  Rank processes by criticality criteria      MTD (maximum tolerable downtime) RTO (recovery time objective) RPO (recovery point objective) Cost of downtime or other metrics Qualitative criteria  Reputation, market share, goodwill
  • 32. Improve System and Process Resilience  For the most critical processes (based upon ranking in the criticality analysis)     Identify the biggest risks Identify cost of mitigation Can several mitigating controls be combined Do mitigating controls follow best / common practices
  • 34. Select Recovery Team Members  Selection criteria      Location of residence, relative to work and other key locations Skills and experience (determines effectiveness) Ability and willingness to respond Health and family (determines probability to serve) Identify backups  Other team members, external resources
  • 35. Emergency Response  Personnel safety: includes first-aid, searching for personnel, etc.  Evacuation: evacuation procedures to prevent any hazard to workers.  Asset protection: includes buildings, vehicles, and equipment.
  • 36. Emergency Response (cont.)  Damage assessment: this could involve outside structural engineers to assess damage to buildings and equipment.  Emergency notification: response team communication, and keeping management and organization staff informed.
  • 37. Damage Assessment and Salvage  Determine damage to buildings, equipment, utilities   Requires inside experts Usually requires outside experts  Civil engineers to inspect buildings  Government building inspectors  Salvage   Identify working and salvageable assets Cannibalize for parts or other uses
  • 38. Notification  Many parties need to know the condition of the organization  Employees, suppliers, customers, regulators, authorities, shareholders, community  Methods of communication   Telephone call trees, web site, signage, media Alternate means of communication must be identified
  • 39. Personnel Safety  The number one concern in any disaster response operation     Emergency evacuation Accounting for all personnel Administering first-aid Emergency supplies  Water, food, blankets, shelters  On-site employees could be stranded for several days
  • 40. Communications  Communications essential during emergency operations  Considerations  Avoid common infrastructure  Don't have emergency communications through the same wires as normal communications     Diversify mobile services Consider two-way radios Consider satellite phones Consider amateur radio
  • 41. Public Utilities and Infrastructure  Often interrupted during a disaster      Electricity: UPS (Uninterruptible Power Supply), generator Water: building could be closed if no water is available for fire suppression Natural gas: heating Wastewater: if disabled, building could be closed Steam heat
  • 42. Logistics and Supplies          Food and drinking water Blankets and sleeping cots Sanitation (toilets, showers, etc.) Tools Spare parts Waste bins Information Communications Fire protection (extinguishers, sprinklers, smoke alarms, fire alarms)
  • 43. Business Resumption Planning  Alternate work locations  Alternate personnel  Communications  Emergency, support of business processes  Standby assets and equipment  Access to procedures, business records
  • 44. Restoration and Recovery     Repairs to facilities, equipment Replacement equipment Restoration of utilities Resumption of business operations in primary business facilities
  • 45. Improving System Resilience and Recovery  Off-site media storage  Assurance of data recovery  Server clusters   Improved availability Geographic clusters: members far apart  Data replication   Application, DMBS, OS, or Hardware Maintains current data on multiple servers even in remote places
  • 46. Training Staff     Everyday operations Recovery procedures Emergency procedures Resumption procedures
  • 47. Testing Business Continuity and Disaster Recovery Plans
  • 48. Testing Business Continuity and Disaster Recovery Plans  Five levels of testing      Document review Walkthrough Simulation Parallel test Cutover test
  • 49. Document Review  Review of recovery, operations, resumption plans and procedures  Performed by individuals  Provide feedback to document owners
  • 50. Walkthrough  Performed by teams  Group discussion of recovery, operations, resumption plans and procedures  Brainstorming and discussion brings out new issues, ideas  Provide feedback to document owners
  • 51. Simulation  Walkthrough of recovery, operations, resumption plans and procedures in a scripted “case study” or “scenario”  Performed by teams  Places participants in a mental disaster setting that helps them discern real issues more easily
  • 52. Parallel Test  Full or partial workload is applied to recovery systems  Performed by teams  Tests actual system readiness and accuracy of procedures  Production systems continue to operate and support actual business processes
  • 53. Cutover Test  Production systems are shut down or disconnected; recovery systems assume full actual workload  Risk of interrupting real business  Gives confidence in DR (Disaster Recovery) system if it works
  • 54. Maintaining Business Continuity and Disaster Recovery Plans
  • 55. Maintaining Business Continuity and Disaster Recovery Plans  Events that necessitate review and modification of DRP and BCP procedures:       Changes in business processes and procedures Changes to IT systems and applications Changes in IT architecture Additions to IT applications Changes in service providers Changes in organizational structure
  • 56. Q&A