Acknowledgments |
|
xix | |
About the Authors |
|
xxi | |
Introduction |
|
xxiii | |
|
Chapter 1 Business Continuity and Disaster Recovery Overview |
|
|
1 | (28) |
|
|
1 | (2) |
|
Business Continuity and Disaster Recovery Defined |
|
|
3 | (1) |
|
|
4 | (7) |
|
|
6 | (2) |
|
Process in BC/DR Planning |
|
|
8 | (2) |
|
Technology in BC/DR Planning |
|
|
10 | (1) |
|
The Cost of Planning versus the Cost of Failure |
|
|
11 | (7) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
17 | (1) |
|
Types of Disasters to Consider |
|
|
18 | (1) |
|
Business Continuity and Disaster Recovery Planning Basics |
|
|
19 | (5) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
Mitigation Strategy Development |
|
|
22 | (1) |
|
|
23 | (1) |
|
Training, Testing, and Auditing |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
25 | (2) |
|
|
25 | (1) |
|
|
26 | (1) |
|
The Cost of Planning versus the Cost of Failure |
|
|
26 | (1) |
|
Types of Disasters to Consider |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
27 | (2) |
|
Chapter 2 Legal and Regulatory Obligations Regarding Data and Information Security |
|
|
29 | (22) |
|
|
29 | (2) |
|
|
31 | (2) |
|
Current Regulatory Environment |
|
|
33 | (4) |
|
Source of Legal Obligations |
|
|
33 | (2) |
|
Scope of Legal Obligations |
|
|
35 | (2) |
|
Information Security Management |
|
|
37 | (3) |
|
Responsibility Lies at the Top |
|
|
37 | (1) |
|
Written Information Security Program (WISP) |
|
|
38 | (2) |
|
|
40 | (1) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
41 | (1) |
|
Current Regulatory Environment |
|
|
41 | (1) |
|
Information Security Management |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
|
Case Study: Legal Obligations Regarding Data Security |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
The Sony PlayStation Incident |
|
|
44 | (1) |
|
State Laws Regarding Data Security |
|
|
45 | (2) |
|
Notice of Security Breach Laws |
|
|
45 | (2) |
|
Safeguarding Personal Data State Laws |
|
|
47 | (1) |
|
Federal Laws Regarding Data Security |
|
|
47 | (2) |
|
U.S. House of Representatives Proposed Bill |
|
|
48 | (1) |
|
|
49 | (1) |
|
Executive Order-improving Critical Infrastructure Cyber Security |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
Chapter 3 Project Initiation |
|
|
51 | (100) |
|
|
51 | (1) |
|
Elements of Project Success |
|
|
52 | (11) |
|
|
53 | (3) |
|
|
56 | (1) |
|
Experienced Project Manager |
|
|
56 | (1) |
|
Clearly Defined Project Objectives |
|
|
57 | (1) |
|
Clearly Defined Project Requirements |
|
|
58 | (1) |
|
|
59 | (2) |
|
Shorter Schedule, Multiple Milestones |
|
|
61 | (1) |
|
Clearly Defined Project Management Process |
|
|
61 | (2) |
|
|
63 | (11) |
|
Project Initiation or Project Definition |
|
|
64 | (7) |
|
|
71 | (3) |
|
|
74 | (17) |
|
|
74 | (3) |
|
|
77 | (1) |
|
|
78 | (2) |
|
|
80 | (4) |
|
|
84 | (1) |
|
|
85 | (4) |
|
Project Communication Plan |
|
|
89 | (2) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
92 | (2) |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
95 | (1) |
|
Key Contributors and Responsibilities |
|
|
96 | (10) |
|
|
96 | (3) |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
Warehouse/Inventory/Manufacturing/Research |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
103 | (2) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
107 | (2) |
|
|
109 | (2) |
|
|
111 | (1) |
|
Business Continuity and Disaster Recovery Project Plan |
|
|
112 | (3) |
|
Project Definition, Risk Assessment |
|
|
113 | (1) |
|
|
113 | (1) |
|
Risk Mitigation Strategies |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
114 | (1) |
|
Training, Testing, Auditing |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
115 | (2) |
|
|
117 | (2) |
|
Elements of Project Success |
|
|
117 | (1) |
|
|
117 | (1) |
|
Key Contributors and Responsibilities |
|
|
118 | (1) |
|
|
118 | (1) |
|
Business Continuity and Disaster Recovery Plan |
|
|
119 | (1) |
|
|
119 | (2) |
|
Industry Spotlight #1---Energy/Utilities |
|
|
|
Business Continuity and Disaster Recovery in Energy/Utilities |
|
|
121 | (1) |
|
|
121 | (2) |
|
Integrating BC/DR Requirements into IT Governance |
|
|
123 | (5) |
|
BC/DR Requirements Definition |
|
|
124 | (1) |
|
IT Service Level Definition |
|
|
125 | (1) |
|
Application Recovery Procedures |
|
|
126 | (1) |
|
Summary of Integrating BC/DR Requirements into IT Governance |
|
|
127 | (1) |
|
Improving BC/DR Recovery and Risk Mitigation Strategies |
|
|
128 | (15) |
|
Ensuring Access to BC/DR Documentation in a Disaster |
|
|
128 | (2) |
|
Change Approval Board and Technical Change Review Committees |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (1) |
|
Centralized Security Vulnerability Assessment |
|
|
132 | (1) |
|
IT Network Vulnerability Assessment |
|
|
133 | (1) |
|
Security Control Baselines and Change Detection |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
135 | (4) |
|
Self-service Application Failover and Fallback |
|
|
139 | (1) |
|
Industrial Control Systems |
|
|
140 | (2) |
|
Summary of Improving BC/DR Recovery and Risk Mitigation Strategies |
|
|
142 | (1) |
|
|
143 | (7) |
|
Recovery from Actual Incidents: Postmortems and Documenting Lessons Learned |
|
|
143 | (1) |
|
|
144 | (5) |
|
Summary of Scheduled BC/DR Testing |
|
|
149 | (1) |
|
Summary of Best Practices and Key Concepts |
|
|
150 | (1) |
|
|
150 | (1) |
|
Chapter 4 Risk Assessment |
|
|
151 | (74) |
|
|
151 | (2) |
|
|
153 | (6) |
|
|
155 | (4) |
|
People, Process, Technology, and Infrastructure in Risk Management |
|
|
159 | (1) |
|
|
159 | (3) |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
IT-Specific Risk Management |
|
|
161 | (1) |
|
IT Risk Management Objectives |
|
|
162 | (6) |
|
The System Development Lifecycle Model |
|
|
163 | (3) |
|
Risk Assessment Components |
|
|
166 | (2) |
|
Information Gathering Methods |
|
|
168 | (35) |
|
Natural and Environmental Threats |
|
|
169 | (16) |
|
|
185 | (10) |
|
|
195 | (4) |
|
|
199 | (3) |
|
Threat Assessment Methodology |
|
|
202 | (1) |
|
Quantitative Threat Assessment |
|
|
203 | (11) |
|
Qualitative Threat Assessment |
|
|
207 | (4) |
|
|
211 | (3) |
|
People, Process, Technology, and Infrastructure |
|
|
214 | (5) |
|
|
216 | (3) |
|
|
219 | (2) |
|
|
221 | (2) |
|
|
221 | (1) |
|
Risk Assessment Components |
|
|
222 | (1) |
|
Threat Assessment Methodology |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
223 | (2) |
|
Chapter 5 Business Impact Analysis |
|
|
225 | (112) |
|
|
225 | (1) |
|
Business Impact Analysis Overview |
|
|
226 | (6) |
|
Upstream and Downstream Losses |
|
|
229 | (1) |
|
Understanding The Human Impact |
|
|
230 | (2) |
|
Understanding Impact Criticality |
|
|
232 | (9) |
|
|
232 | (3) |
|
Recovery Time Requirements |
|
|
235 | (6) |
|
Identifying Business Functions |
|
|
241 | (8) |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
246 | (1) |
|
|
246 | (1) |
|
|
247 | (1) |
|
|
247 | (1) |
|
Warehouse (Inventory, Fulfillment, Shipping, and Receiving) |
|
|
248 | (1) |
|
|
248 | (1) |
|
Gathering Data for the Business Impact Analysis |
|
|
249 | (5) |
|
Data Collection Methodologies |
|
|
250 | (4) |
|
|
254 | (2) |
|
Business Impact Analysis Data Points |
|
|
256 | (12) |
|
|
260 | (8) |
|
Preparing the Business Impact Analysis Report |
|
|
268 | (2) |
|
|
270 | (1) |
|
|
271 | (2) |
|
|
271 | (1) |
|
Understanding Impact Criticality |
|
|
271 | (1) |
|
Identifying Business Functions |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
273 | (1) |
|
|
273 | (1) |
|
|
273 | (2) |
|
Industry Spotlight #2 Healthcare |
|
|
|
Business Continuity and Disaster Recovery in Healthcare |
|
|
275 | (1) |
|
Introduction to Healthcare IT |
|
|
275 | (14) |
|
Types of Healthcare Organizations |
|
|
277 | (3) |
|
The Rising Cost of Healthcare |
|
|
280 | (1) |
|
Governmental Incentives and Penalties |
|
|
281 | (2) |
|
HIEs and Accountable (Care) Organizations |
|
|
283 | (2) |
|
Integration of Healthcare IT and Medical Equipment |
|
|
285 | (1) |
|
Consumer-Driven Healthcare |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
288 | (1) |
|
|
289 | (7) |
|
Centers for Medicare and Medicaid Services/Joint Commission on Accreditation of Healthcare Organizations |
|
|
289 | (1) |
|
U.S. Food and Drug Administration |
|
|
290 | (2) |
|
Health Insurance Portability and Accountability Act |
|
|
292 | (2) |
|
Health Information Technology for Economic and Clinical Health |
|
|
294 | (1) |
|
|
295 | (1) |
|
State and Local Requirements |
|
|
296 | (1) |
|
Healthcare IT Risk Management |
|
|
296 | (3) |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
298 | (1) |
|
|
299 | (1) |
|
Technical Needs---Healthcare IT Architecture |
|
|
299 | (11) |
|
|
300 | (1) |
|
|
301 | (1) |
|
|
302 | (2) |
|
Types of Systems and Storage |
|
|
304 | (6) |
|
Healthcare Operational Needs |
|
|
310 | (5) |
|
|
310 | (1) |
|
Insurance Verification and Billing Services |
|
|
311 | (2) |
|
|
313 | (2) |
|
Interoperability Among Disparate Systems |
|
|
315 | (3) |
|
Electronic Medical Record |
|
|
315 | (1) |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
316 | (1) |
|
Billing and Payment Systems |
|
|
317 | (1) |
|
|
317 | (1) |
|
|
318 | (1) |
|
Current Environment and New Technology |
|
|
318 | (5) |
|
Advances in Data Storage and Replication |
|
|
318 | (1) |
|
|
319 | (1) |
|
Virtualization and Cloud Computing |
|
|
320 | (2) |
|
|
322 | (1) |
|
Current Environment and New Technology Summary |
|
|
323 | (1) |
|
Healthcare IT BC/DR Best Practices |
|
|
323 | (5) |
|
|
323 | (3) |
|
|
326 | (2) |
|
|
328 | (4) |
|
Overview of Healthcare IT |
|
|
328 | (1) |
|
|
328 | (1) |
|
Healthcare IT Risk Management |
|
|
329 | (1) |
|
Technical Needs---Healthcare IT Architecture |
|
|
329 | (1) |
|
Healthcare Operational Needs |
|
|
330 | (1) |
|
Interoperability Among Disparate Systems---Integration in Healthcare IT |
|
|
330 | (1) |
|
Current Environment and New Technology |
|
|
331 | (1) |
|
Healthcare IT BC/DR Best Practices |
|
|
331 | (1) |
|
|
332 | (3) |
|
|
335 | (2) |
|
Chapter 6 Risk Mitigation Strategy Development |
|
|
337 | (32) |
|
|
337 | (2) |
|
Types of Risk Mitigation Strategies |
|
|
339 | (4) |
|
|
340 | (1) |
|
|
340 | (3) |
|
The Risk Mitigation Process |
|
|
343 | (7) |
|
|
343 | (1) |
|
|
343 | (3) |
|
|
346 | (1) |
|
Cost versus Capability of Recovery Options |
|
|
347 | (1) |
|
Recovery Service Level Agreements |
|
|
347 | (2) |
|
|
349 | (1) |
|
Developing your Risk Mitigation Strategy |
|
|
350 | (4) |
|
People, Buildings, and Infrastructure |
|
|
354 | (1) |
|
|
355 | (3) |
|
Critical Data and Records |
|
|
356 | (1) |
|
Critical Systems and Infrastructure |
|
|
356 | (2) |
|
Backup and Recovery Considerations |
|
|
358 | (7) |
|
Alternate Business Processes |
|
|
358 | (1) |
|
|
359 | (5) |
|
Documenting Your Risk Mitigation Strategy |
|
|
364 | (1) |
|
|
365 | (1) |
|
|
365 | (2) |
|
Types of Risk Mitigation Strategies |
|
|
365 | (1) |
|
|
366 | (1) |
|
|
367 | (1) |
|
Backup and Recovery Considerations |
|
|
367 | (1) |
|
|
367 | (2) |
|
Chapter 7 Business Continuity/Disaster Recovery Plan Development |
|
|
369 | (58) |
|
|
369 | (2) |
|
Implement Risk Mitigation |
|
|
371 | (4) |
|
Phases of Business Continuity and Disaster |
|
|
375 | (8) |
|
|
375 | (6) |
|
|
381 | (1) |
|
Business Continuity Phase |
|
|
382 | (1) |
|
|
383 | (1) |
|
Defining BC/DR Teams and Key Personnel |
|
|
383 | (9) |
|
|
384 | (1) |
|
|
385 | (1) |
|
|
385 | (1) |
|
Operations Assessment Team |
|
|
385 | (1) |
|
|
386 | (1) |
|
Administrative Support Team |
|
|
386 | (1) |
|
Transportation and Relocation Team |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
Physical/Personnel Security Team |
|
|
388 | (1) |
|
Procurement Team (Equipment and Supplies) |
|
|
388 | (1) |
|
|
389 | (1) |
|
BC/DR Contact Information |
|
|
390 | (2) |
|
Defining Tasks and Assigning Resources |
|
|
392 | (8) |
|
|
393 | (2) |
|
|
395 | (2) |
|
Contracts for BC/DR Services |
|
|
397 | (3) |
|
|
400 | (2) |
|
|
400 | (1) |
|
|
400 | (1) |
|
|
401 | (1) |
|
|
401 | (1) |
|
The Community and the Public |
|
|
401 | (1) |
|
Event Logs, Change Control, and Appendices |
|
|
402 | (5) |
|
|
403 | (1) |
|
|
404 | (1) |
|
|
405 | (1) |
|
|
406 | (1) |
|
|
407 | (1) |
|
|
407 | (1) |
|
|
408 | (1) |
|
|
409 | (2) |
|
Phases of Business Continuity and Disaster Recovery |
|
|
409 | (1) |
|
Defining BC/DR Teams and Key Personnel |
|
|
409 | (1) |
|
Defining Tasks and Assigning Resources |
|
|
410 | (1) |
|
|
410 | (1) |
|
Event Logs and Change Control |
|
|
411 | (1) |
|
|
411 | (1) |
|
|
411 | (2) |
|
Industry Spotlight #3 Financial |
|
|
|
Business Continuity and Disaster Recovery in Financial Services |
|
|
413 | (1) |
|
|
413 | (1) |
|
Finance Industry Regulation Overview |
|
|
413 | (3) |
|
United States Financial Regulation |
|
|
414 | (1) |
|
European Financial Regulation |
|
|
415 | (1) |
|
Other Regions' Financial Regulation |
|
|
415 | (1) |
|
Finance Industry Requirements for Business Continuity |
|
|
416 | (1) |
|
Industry Impact---September 11 Attacks |
|
|
416 | (4) |
|
Industry Impact---Hurricane Sandy |
|
|
420 | (2) |
|
Industry Impact---Cyber Threats |
|
|
422 | (2) |
|
|
424 | (1) |
|
|
425 | (1) |
|
|
425 | (2) |
|
Chapter 8 Emergency Response and Recovery |
|
|
427 | (52) |
|
|
427 | (1) |
|
Emergency Management Overview |
|
|
428 | (1) |
|
|
428 | (2) |
|
|
430 | (2) |
|
|
432 | (4) |
|
Emergency Response and Disaster Recovery |
|
|
433 | (1) |
|
Alternate Facilities Review and Management |
|
|
433 | (1) |
|
|
433 | (2) |
|
|
435 | (1) |
|
|
436 | (1) |
|
|
436 | (1) |
|
|
436 | (1) |
|
|
436 | (8) |
|
Activation and Emergency Response Checklists |
|
|
437 | (1) |
|
|
437 | (1) |
|
|
438 | (6) |
|
|
444 | (2) |
|
|
446 | (1) |
|
|
447 | (2) |
|
Emergency Management Overview |
|
|
447 | (1) |
|
|
447 | (1) |
|
|
448 | (1) |
|
|
448 | (1) |
|
|
448 | (1) |
|
|
449 | (1) |
|
|
449 | (2) |
|
Industry Spotlight #4 SMBs |
|
|
|
Business Continuity and Disaster Recovery for Small- and Medium-Sized Businesses |
|
|
451 | (1) |
|
Overview of SMB Disaster Recovery |
|
|
451 | (2) |
|
SMB Disaster Preparedness: Survey Results |
|
|
453 | (1) |
|
On-Premise Disaster Recovery |
|
|
453 | (3) |
|
|
455 | (1) |
|
Using a Co-location Data Center for Disaster Recovery |
|
|
456 | (4) |
|
The Value of Co-location Data Centers in a Disaster |
|
|
457 | (1) |
|
Tips for Selecting a Co-location Provider |
|
|
457 | (1) |
|
What Does a Co-location Center Cost? |
|
|
458 | (1) |
|
SMB Case Study: Balancing Internal Capability and Cost with Co-location Data Centers for DR |
|
|
459 | (1) |
|
Disaster Recovery in the Cloud |
|
|
460 | (14) |
|
Disaster Recovery in the Cloud Options |
|
|
462 | (3) |
|
Protecting Branch Offices with Cloud Disaster Recovery |
|
|
465 | (4) |
|
|
469 | (5) |
|
|
474 | (1) |
|
|
474 | (3) |
|
Overview of SMB Disaster Recovery |
|
|
474 | (1) |
|
SMB Disaster Preparedness: Survey Results |
|
|
475 | (1) |
|
On-premise Disaster Recovery |
|
|
475 | (1) |
|
Using a Co-location Data Center for Disaster Recovery |
|
|
476 | (1) |
|
Disaster Recovery in the Cloud |
|
|
476 | (1) |
|
|
477 | (2) |
|
Chapter 9 Training, Testing, and Auditing |
|
|
479 | (26) |
|
|
479 | (1) |
|
Training for Disaster Recovery and Business Continuity |
|
|
479 | (6) |
|
|
480 | (1) |
|
Disaster Recovery and Business Continuity Training Overview |
|
|
481 | (1) |
|
Training Scope, Objectives, Timelines, and Requirements |
|
|
481 | (1) |
|
Performing Training Needs Assessment |
|
|
482 | (1) |
|
|
483 | (1) |
|
Scheduling and Delivering Training |
|
|
484 | (1) |
|
Monitoring and Measuring Training |
|
|
485 | (1) |
|
Training and Testing for Your Business Continuity and Disaster Recovery Plan |
|
|
485 | (8) |
|
|
487 | (4) |
|
|
491 | (1) |
|
|
492 | (1) |
|
|
492 | (1) |
|
Training Plan Implemented |
|
|
493 | (1) |
|
|
493 | (6) |
|
Understanding of Processes |
|
|
494 | (1) |
|
Validation of Task Integration |
|
|
495 | (1) |
|
|
495 | (1) |
|
|
495 | (1) |
|
Familiarize with Information Flow |
|
|
495 | (1) |
|
Identify Gaps or Weaknesses |
|
|
496 | (1) |
|
Determine Cost and Feasibility |
|
|
496 | (2) |
|
|
498 | (1) |
|
|
499 | (1) |
|
Performing IT Systems and Security Audits |
|
|
499 | (1) |
|
IT Systems and Security Audits |
|
|
499 | (2) |
|
|
501 | (2) |
|
|
503 | (1) |
|
Training for Emergency Response, Disaster Recovery, and Business Continuity |
|
|
503 | (1) |
|
Testing your Business Continuity and Disaster Recovery Plan |
|
|
503 | (1) |
|
Performing IT Systems Audits |
|
|
504 | (1) |
|
|
504 | (1) |
|
Chapter 10 BC/DR Plan Maintenance |
|
|
505 | (16) |
|
|
505 | (1) |
|
BC/DR Plan Change Management |
|
|
506 | (7) |
|
Training, Testing, and Auditing |
|
|
507 | (1) |
|
Changes in Information Technologies |
|
|
507 | (1) |
|
|
508 | (1) |
|
|
509 | (1) |
|
Legal, Regulatory, or Compliance Changes |
|
|
510 | (1) |
|
Strategies for Managing change |
|
|
510 | (1) |
|
|
511 | (1) |
|
Evaluate and Incorporate Change |
|
|
512 | (1) |
|
|
513 | (1) |
|
Plan Maintenance Activities |
|
|
514 | (1) |
|
|
515 | (1) |
|
|
516 | (2) |
|
|
518 | (3) |
|
BC/DR Plan Change Management |
|
|
518 | (1) |
|
Strategies for Managing Change |
|
|
518 | (1) |
|
|
519 | (1) |
|
Plan Maintenance Activities |
|
|
519 | (1) |
|
|
519 | (2) |
|
APPENDIX A Risk Management Checklist |
|
|
521 | (6) |
|
|
521 | (3) |
|
|
524 | (3) |
|
APPENDIX B Crisis Communications Checklist |
|
|
527 | (2) |
|
|
527 | (1) |
|
|
528 | (1) |
|
APPENDIX C Emergency Response and Recovery Checklists |
|
|
529 | (8) |
|
|
529 | (1) |
|
|
530 | (1) |
|
Emergency Response Checklists |
|
|
531 | (2) |
|
|
533 | (4) |
|
APPENDIX D Business Continuity Checklist |
|
|
537 | (6) |
|
|
537 | (2) |
|
Manufacturing, Warehouse, Production, and Operations |
|
|
539 | (1) |
|
Resuming Normal Operations |
|
|
539 | (2) |
|
Transition to Normalized Activities |
|
|
541 | (2) |
|
APPENDIX E IT Recovery Checklists |
|
|
543 | (4) |
|
IT Recovery Checklist One: Infrastructure |
|
|
543 | (1) |
|
Recovery Checklist Three: Office Area and End-User Recovery |
|
|
544 | (1) |
|
|
544 | (1) |
|
Recovery Checklist Four: Business Process Recovery |
|
|
545 | (1) |
|
Recovery Checklist Five: Manufacturing, Production, and Operations Recovery |
|
|
545 | (2) |
|
APPENDIX F Training, Testing, and Auditing Checklists |
|
|
547 | (2) |
|
|
547 | (1) |
|
|
547 | (2) |
|
APPENDIX G BC/DR Plain Maintenance Checklist |
|
|
549 | (2) |
|
|
549 | (2) |
Glossary of Terms |
|
551 | (14) |
Index |
|
565 | |