Knowledge

Business continuity and disaster recovery auditing

Source 📝

577:: An audit of backup processes determines if (a) they are effective, and (b) if they are actually being implemented by the involved personnel. The disaster recovery plan also includes information on how best to recover any data that has not been copied. Controls and protections are put in place to ensure that data is not damaged, altered, or destroyed during this process. 527:: When there is a disaster, an organization's data and business processes become vulnerable. As such, security can be more important than the raw speed involved in a disaster recovery plan's RTO. The most critical consideration then becomes securing the new data pipelines: from new VPNs to the connection from offsite backup services. 444:, off-site storage location equipment, telephones, etc.), distribution register, software and data files backup/retention schedules, temporary location specifications, any other such lists, materials, inventories, and documentation. Pre-formatted forms are often used to facilitate the data gathering process. 626:
and other research. Among the items that the auditor needs to verify are: the scope of the policy (including any stated exclusions), that the amount of coverage is sufficient to cover the organization's needs, and that the policy is current and in force. The auditor also ascertains, through a review
330:
The first three components (business resumption, occupant emergency, and continuity of operations plans) do not deal with the IT infrastructure. The incident management plan (IMP) does deal with the IT infrastructure, but since it establishes structure and procedures to address cyber attacks against
69:
Often used together, the terms business continuity (BC) and disaster recovery (DR) are very different. BC refers to the ability of a business to continue critical functions and business processes after the occurrence of a disaster, whereas DR refers specifically to the IT functions of the business,
647:
or any other unusual circumstance is minimized. Agreements pertaining to establishing support and assisting with recovery for the entity are also outlined. Techniques used for evaluating this area include an examination of the reasonableness of the plan, a determination of whether or not the plan
306:
of business continuity. Where DRP encompasses the policies, tools and procedures to enable recovery of data following a catastrophic event, BCP involves keeping all aspects of a business functioning regardless of potential disruptive events. As such, a business continuity plan is a comprehensive
159:
a specific individual within the organization, who may be referred to as the disaster recovery officer, the disaster recovery liaison, the DR coordinator, or some other similar title, has the technical skills, training, experience, and abilities to analyze the capabilities of the team members to
339:
The overall categorization of tests are functional- and discussion-based. Types of tests include: tabletop exercises, checklists, simulations, parallel processing (testing recovery site while primary site is in operation), and full interruption (fail over) tests. These apply to both BC and DR.
396:(BIA) that includes a range of possible disasters. Each functional area of the organization is analyzed to determine potential consequences. Traditionally, fire has posed the greatest threat. A thorough plan provides for "worst case" situations, such as destruction of the main building. 583:: Practice drills conducted periodically to determine how effective the plan is and to determine what changes may be necessary. The auditor's primary concern here is verifying that these drills are being conducted properly and that problems uncovered during these drills are addressed. 562:
Occasional tests and trials verify the viability and effectiveness of the plan. An auditor looks into the probability that operations of the organization can be sustained at the level that is assumed in the plan, and the ability of the entity to actually establish operations at the
511:: Failure to include each and every important business process or a block of data. Ripples can extend a disaster's impact. Payroll may not initially be mission-critical, but left alone for several days, it can become more important than any of your initial problems. 414:, any special security procedures, procedure for the notification of system changes, hours of operation, the specific hardware and other equipment required for processing, personnel requirements, definition of the circumstances constituting an 699:
programs and a clear definition of job responsibilities. A review of the readiness capacity of a plan often includes tasks such as inquires of personnel, direct physical observation, and examination of training records and any certifications.
517:: A third point of failure involves focusing only on DR without considering the larger business continuity needs. Corporate office space lost to a disaster can result in an instant pool of teleworkers which, in turn, can overload a company's 432:: This includes various lists (employee backup position listing, critical telephone numbers list, master call list, master vendor list, notification checklist), inventories (communications equipment, documentation, office equipment, forms, 209:. Man-made disasters could be intentional (for example, an act of a terrorist) or unintentional (that is, accidental, such as the breakage of a man-made dam or even "fat fingers" - or errant commands entered - on a computer system). 1106: 307:
organizational strategy that includes the DRP as well as threat prevention, detection, recovery, and resumption of operations should a data breach or other disaster event occur. Therefore, BCP consists of five component plans:
634:
Effective DR plans take into account the extent of a company's responsibilities to other entities and its ability to fulfill those commitments despite a major disaster. A good DR audit will include a review of existing
348:
Like every insurance plan, there are benefits that can be obtained from proper business continuity planning, including: Studies have shown a correlation between higher spending on auditing fees and lower rates of
293:
system. Copies of it are stored on and off site and are made available or accessible to those who require them. An auditor tests the procedures used to meet this objective and determine their effectiveness.
686:
Procedures to sustain staff during a round-the-clock disaster recovery effort are included in any good disaster recovery plan. Procedures for the stocking of food and water, capabilities of administering
92: 551:. A hot site is fully equipped to resume operations while a cold site does not have that capability. A warm site has the capability to resume some, but not all operations. 1079: 163:
more than one individual is trained and capable of doing a particular function during the DR exercise. Tests and inquiries of personnel can help achieve this objective.
1026: 1012: 84:
The primary objective is to protect the organization in the event that all or part of its operations and/or computer services are rendered partially or completely
486:
Initial testing can be plan is done in sections and after normal business hours to minimize disruptions. Subsequent tests occur during normal business hours.
331:
an organization's IT systems, it generally does not represent an agent for activating the DRP; thus DRP is the only BCP component of active interest to IT.
1130: 940: 381:
According to Geoffrey H. Wold of the Disaster Recovery Journal, the entire process involved in developing a Disaster Recovery Plan consists of 10 steps:
803: 827: 505:: When executive management sees DR planning as "just another fake earthquake drill" or CEOs fail to make DR planning and preparation a priority 708:
The auditor must review procedures that take into account the possibility of power failures or other situations that are of a non-IT nature.
914: 648:
takes all factors into account, and a verification of the contracts and agreements reasonableness through documentation and outside research.
521:
overnight, overwork the IT support staff at the blink of an eye and cause serious bottlenecks and monopolies with the dial-in PBX system.
888: 482:" of the plan is performed by conducting a structured walk-through test. An actual test-run must be performed. Problems are corrected. 695:, and dealing with family emergencies are clearly written and tested. This can generally be accomplished by the company through good 671:
testing of procedures, interviewing employees, making comparison against the plans of other company and against industry standards,
197:. It is "a comprehensive statement of consistent actions to be taken before, during and after a disaster". The disaster could be 664:
hardware, contact information for both internal communication and external issues, such as business partners and key customers.
627:
of the ratings assigned by independent rating agencies, that the insurance company or companies providing the coverage have the
1197: 1083: 749: 360:
Guaranteeing the reliability of standby systems (even automating the failure detection and recovery in certain scenarios)
1131:
http://www.businessinsurance.com/article/20150309/ISSUE0401/303159991/constructing-a-successful-business-continuity-plan
1168: 1149: 787: 285:
to verify that records are being kept. One such record is a current list of the organization's hardware and software
970: 855: 17: 1013:"What is the difference between a tabletop exercise, a drill, a functional exercise, and a full-scale exercise?" 677:
direct observation that emergency telephone numbers are listed and easily accessible in the event of a disaster.
628: 122:
Minimizing downtime and data loss during disaster recovery is typically measured in terms of two key concepts:
991: 944: 744: 389: 754: 566:
The auditor can verify this through paper and paperless documentation and actual physical observation. The
32: 918: 289:. Such list is made and periodically updated to reflect changing business practices and as part of an 759: 594: 1187: 393: 136: 406:
for alternatives selected are prepared, with details specifying duration, termination conditions,
636: 126: 739: 419: 202: 190: 58: 28: 1044: 243:
To maximize their effectiveness, DRPs are most effective when updated frequently, and should:
555: 255: 79: 892: 498:
has identified five "common mistakes" organizations often make related to BCP/DR planning:
206: 50: 643:
to ensure that the organization's legal liability for lack of performance in the event of
8: 320: 290: 224:
detection, a byproduct of routine inspections, which may discover new (potential) threats
54: 1111: 1060: 623: 619: 615: 156:
the procedures stated in the BCP and DR plan are actually consistent with real practice
1202: 1164: 1145: 1064: 783: 479: 263: 248: 186: 36: 1052: 433: 232: 198: 139:(RPO), a measure of the ability to recover files by specifying a point in time the 458:
Determining the feasibility and compatibility of backup facilities and procedures.
91: 1192: 441: 274: 426:, non-mainframe resource requirements, priorities, and other contractual issues. 217:
Although there is no one-size-fits-all plan, there are three basic strategies:
407: 273:
Adequate records need to be retained by the organization. The auditor examines
259: 992:"Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities" 1181: 661: 470:
Providing motivation for maintaining and updating the disaster recovery plan.
437: 185:) is a documented process or set of procedures to execute an organization's 85: 24: 221:
prevention, including proper backups, having surge protectors and generators
423: 402:: Critical needs of each department are evaluated and prioritized. Written 804:"What Is the Difference Between Disaster Recovery and Business Continuity" 1125:
Berman, Alan. : Constructing a Successful Business Continuity Plan.
1056: 548: 1107:"Hurricane Joaquin Highlights the Importance of Plans to Keep Operating" 863: 780:
Business continuity and disaster recovery planning for IT professionals
712: 657: 692: 611: 415: 350: 282: 269:
be thoroughly tested, not just unpracticed bureaucratic documentation
862:. Adapted from Volume 5 #1. Disaster Recovery World. Archived from 696: 644: 640: 590: 567: 403: 194: 286: 278: 722: 716: 303: 140: 130: 1077: 1045:"Are External Auditors Concerned about Cyber Risk disclosure" 42: 1027:"Homeland Security Exercise and Evaluation Program (HSEEP)" 998: 726: 495: 411: 917:. Email Archiving and Remote Backup. 2010. Archived from 688: 518: 494:
Due to high cost, various plans are not without critics.
467:
Demonstrating the ability of the organization to recover.
464:
Providing training to the team managers and team members.
235:, and holding a "lessons learned" brainstorming session. 1142:
Auditing & Assurance Services: A Systematic Approach
656:
The auditor must verify that planning ensures that both
418:, process to negotiate service extensions, guarantee of 1163:(4th ed.). Boca Raton, FL: Auerbach Publications. 674:
examining company manuals and other written procedures.
1080:"Five Mistakes That Can Kill a Disaster Recovery Plan" 1043:
Li, He; No, Won Gyun; Boritz, J. Efrim (24 Nov 2021).
47:
business continuity and disaster recovery (BCDR) plans
828:"5 Tips to Build an Effective Disaster Recovery Plan" 610:
The auditor determines the adequacy of the company's
533:
Locking down or remotely wiping lost handheld devices
461:
Identifying areas in the plan that need modification.
400:
Establishing priorities for processing and operations
1078:Cormac Foster; Dell Corporation (25 October 2010). 941:"Disaster Recovery & Business Continuity Plans" 376: 1158: 889:"Disaster Recovery Planning - Step by Step Guide" 372:Lowering unnecessarily stressful work environment 1179: 1104: 943:. Stone Crossing Solutions. 2012. Archived from 631:to cover the losses in the event of a disaster. 530:In disasters, planning for post-mortem forensics 436:, workgroup and data center computer hardware, 1159:Gallegos, F.; Senft, S.; Davis, A. L. (2012). 777: 729:or other such phenomena and PPE may be needed. 1144:(8th ed.). New York: McGraw-Hill/Irwin. 189:processes and recover and protect a business 95:A DR plan illustrating the chronology of the 1049:Auditing: A Journal of Practice & Theory 849: 847: 845: 782:(2 ed.). Burlington: Elsevier Science. 366:Minimizing decision-making during a disaster 968: 891:. Michigan State University. Archived from 539: 1042: 825: 453:Developing testing criteria and procedures 842: 448:Organizing and documenting a written plan 363:Providing a standard for testing the plan 172: 1161:Information Technology Control and Audit 821: 819: 817: 489: 90: 1139: 703: 681: 651: 600: 297: 231:The latter may include securing proper 1180: 964: 962: 570:of the storage site is also confirmed. 35:covers the entire organization, while 883: 881: 814: 660:and the recovery team have effective 147: 49:provides a third-party validation to 45:documents covering an organization's 1105:Constance Gustke (October 7, 2015). 856:"Disaster Recovery Planning Process" 853: 750:Comparison of online backup services 622:) through a review of the company's 388:: The planning committee prepares a 369:Reducing potential legal liabilities 959: 605: 13: 878: 152:An auditor examines and assesses 14: 1214: 725:procedures in case of gas leaks, 238: 212: 193:infrastructure in the event of a 57:is complete and does not contain 16:For the Irish gauge railway, see 377:Planning and testing methodology 167: 1119: 1098: 1071: 1036: 1019: 1005: 18:Belfast and County Down Railway 1032:. Homeland Security. Jan 2020. 984: 933: 907: 796: 771: 455:: reasons for testing include 31:(IT) to run their operations, 1: 765: 745:Comparison of backup software 317:Continuity of operations plan 117: 1198:Information technology audit 971:"The Disaster Recovery Plan" 755:Information technology audit 597:, and personnel redundancy. 386:Performing a risk assessment 254:be revisited at every major 133:is completely up and running 33:business continuity planning 7: 1140:Messier, W. F. Jr. (2011). 1127:Business Insurance Magazine 826:Bill Abram (14 June 2012). 733: 343: 247:be an integral part of all 64: 27:' increasing dependency on 10: 1219: 915:"Backup Disaster Recovery" 854:Wold, Geoffrey H. (1997). 830:. Small Business Computing 667:Audit techniques include 334: 77: 73: 15: 969:Chad Bahan. (June 2003). 860:Disaster Recovery Journal 760:Vulnerability (computing) 357:Minimizing risk of delays 540:Decisions and strategies 509:Incomplete RTOs and RPOs 394:business impact analysis 311:Business resumption plan 137:Recovery point objective 778:Susan Snedaker (2013). 614:coverage (particularly 587:Backup of key personnel 440:hardware and software, 314:Occupant emergency plan 302:Disaster recovery is a 160:complete assigned tasks 127:Recovery time objective 70:albeit a subset of BC. 740:Backup rotation scheme 326:Disaster recovery plan 179:disaster recovery plan 173:Disaster recovery plan 114: 29:information technology 589:- including periodic 556:cost-benefit analysis 490:Caveats/controversies 256:corporate acquisition 143:copy will restore to. 94: 80:IT service continuity 78:Further information: 1057:10.2139/ssrn.2880928 704:Environmental issues 682:Emergency procedures 652:Communication issues 601:Other considerations 298:Relationship to BCPs 129:(RTO), time until a 61:misrepresentations. 629:financial viability 321:Incident management 291:IT asset management 110:major incident (MI) 1112:The New York Times 921:on 22 January 2013 624:insurance policies 620:casualty insurance 434:insurance policies 264:system development 233:insurance policies 148:The auditor's role 115: 107:with respect to a 1129:, March 9, 2015. 947:on 23 August 2012 866:on 15 August 2012 262:and at every new 249:business analysis 187:disaster recovery 37:disaster recovery 1210: 1174: 1155: 1133: 1123: 1117: 1116: 1102: 1096: 1095: 1093: 1091: 1082:. Archived from 1075: 1069: 1068: 1040: 1034: 1033: 1031: 1023: 1017: 1016: 1009: 1003: 1002: 996: 988: 982: 981: 979: 977: 966: 957: 956: 954: 952: 937: 931: 930: 928: 926: 911: 905: 904: 902: 900: 885: 876: 875: 873: 871: 851: 840: 839: 837: 835: 823: 812: 811: 800: 794: 793: 775: 606:Insurance issues 545:Site designation 476:Testing the plan 111: 105: 99: 1218: 1217: 1213: 1212: 1211: 1209: 1208: 1207: 1188:Data management 1178: 1177: 1171: 1152: 1136: 1124: 1120: 1103: 1099: 1089: 1087: 1076: 1072: 1041: 1037: 1029: 1025: 1024: 1020: 1011: 1010: 1006: 994: 990: 989: 985: 975: 973: 967: 960: 950: 948: 939: 938: 934: 924: 922: 913: 912: 908: 898: 896: 895:on 8 March 2014 887: 886: 879: 869: 867: 852: 843: 833: 831: 824: 815: 802: 801: 797: 790: 776: 772: 768: 736: 706: 684: 654: 608: 603: 542: 492: 430:Collecting data 379: 346: 337: 300: 258:, at every new 241: 215: 175: 170: 150: 120: 109: 103: 97: 82: 76: 67: 39:focuses on IT. 21: 12: 11: 5: 1216: 1206: 1205: 1200: 1195: 1190: 1176: 1175: 1169: 1156: 1150: 1135: 1134: 1118: 1097: 1070: 1035: 1018: 1004: 983: 958: 932: 906: 877: 841: 813: 795: 788: 769: 767: 764: 763: 762: 757: 752: 747: 742: 735: 732: 731: 730: 720: 719:may be needed. 705: 702: 683: 680: 679: 678: 675: 672: 653: 650: 607: 604: 602: 599: 595:cross-training 572: 571: 564: 547:: choice of a 541: 538: 537: 536: 535: 534: 531: 522: 515:Systems myopia 512: 506: 503:Lack of buy-in 491: 488: 484: 483: 478:: An initial " 473: 472: 471: 468: 465: 462: 459: 450: 445: 427: 408:system testing 397: 378: 375: 374: 373: 370: 367: 364: 361: 358: 345: 342: 336: 333: 328: 327: 324: 318: 315: 312: 299: 296: 271: 270: 267: 260:product launch 252: 240: 239:Best practices 237: 229: 228: 225: 222: 214: 213:Types of plans 211: 174: 171: 169: 166: 165: 164: 161: 157: 149: 146: 145: 144: 134: 119: 116: 75: 72: 66: 63: 9: 6: 4: 3: 2: 1215: 1204: 1201: 1199: 1196: 1194: 1191: 1189: 1186: 1185: 1183: 1172: 1170:9781439893203 1166: 1162: 1157: 1153: 1151:9780077520151 1147: 1143: 1138: 1137: 1132: 1128: 1122: 1114: 1113: 1108: 1101: 1086:on 2013-01-16 1085: 1081: 1074: 1066: 1062: 1058: 1054: 1050: 1046: 1039: 1028: 1022: 1014: 1008: 1001:. p. 21. 1000: 993: 987: 972: 965: 963: 946: 942: 936: 920: 916: 910: 894: 890: 884: 882: 865: 861: 857: 850: 848: 846: 829: 822: 820: 818: 810:. 2019-11-25. 809: 805: 799: 791: 789:9780124114517 785: 781: 774: 770: 761: 758: 756: 753: 751: 748: 746: 743: 741: 738: 737: 728: 724: 721: 718: 714: 711: 710: 709: 701: 698: 694: 690: 676: 673: 670: 669: 668: 665: 663: 662:communication 659: 649: 646: 642: 638: 632: 630: 625: 621: 617: 613: 598: 596: 592: 588: 584: 582: 578: 576: 569: 565: 561: 560: 559: 557: 552: 550: 546: 532: 529: 528: 526: 523: 520: 516: 513: 510: 507: 504: 501: 500: 499: 497: 487: 481: 477: 474: 469: 466: 463: 460: 457: 456: 454: 451: 449: 446: 443: 442:office supply 439: 438:microcomputer 435: 431: 428: 425: 421: 420:compatibility 417: 413: 409: 405: 401: 398: 395: 391: 390:risk analysis 387: 384: 383: 382: 371: 368: 365: 362: 359: 356: 355: 354: 352: 341: 332: 325: 322: 319: 316: 313: 310: 309: 308: 305: 295: 292: 288: 284: 280: 276: 268: 265: 261: 257: 253: 250: 246: 245: 244: 236: 234: 226: 223: 220: 219: 218: 210: 208: 204: 203:environmental 200: 196: 192: 188: 184: 180: 168:Documentation 162: 158: 155: 154: 153: 142: 138: 135: 132: 128: 125: 124: 123: 112: 106: 100: 93: 89: 87: 81: 71: 62: 60: 56: 55:documentation 52: 48: 44: 40: 38: 34: 30: 26: 25:organizations 19: 1160: 1141: 1126: 1121: 1110: 1100: 1088:. Retrieved 1084:the original 1073: 1048: 1038: 1021: 1007: 986: 974:. Retrieved 949:. Retrieved 945:the original 935: 923:. Retrieved 919:the original 909: 897:. Retrieved 893:the original 868:. Retrieved 864:the original 859: 832:. Retrieved 807: 798: 779: 773: 707: 685: 666: 655: 633: 609: 586: 585: 580: 579: 574: 573: 553: 544: 543: 525:Lax security 524: 514: 508: 502: 493: 485: 475: 452: 447: 429: 424:availability 399: 385: 380: 347: 338: 329: 301: 272: 242: 230: 216: 182: 178: 176: 151: 121: 108: 102: 96: 83: 68: 51:stakeholders 46: 41: 22: 713:Flashlights 575:Data backup 558:is needed. 549:backup site 1182:Categories 766:References 658:management 404:agreements 266:milestone. 251:processes, 227:correction 118:DR metrics 1065:168198159 976:24 August 693:first aid 641:contracts 612:insurance 416:emergency 351:incidents 283:contracts 53:that the 1203:Planning 1090:8 August 951:9 August 870:8 August 834:9 August 808:Cloudian 734:See also 697:training 645:disaster 616:property 591:training 568:security 344:Benefits 279:billings 207:man-made 195:disaster 101:and the 86:unusable 65:Overview 59:material 43:Auditing 717:candles 480:dry run 335:Testing 287:vendors 275:records 199:natural 74:Metrics 1193:Backup 1167:  1148:  1063:  786:  723:Safety 581:Drills 392:and a 304:subset 281:, and 141:backup 131:system 23:Given 1061:S2CID 1030:(PDF) 995:(PDF) 925:9 May 899:9 May 727:fires 563:site. 1165:ISBN 1146:ISBN 1092:2012 999:NIST 978:2012 953:2012 927:2014 901:2014 872:2012 836:2012 784:ISBN 715:and 639:and 618:and 496:Dell 412:cost 323:plan 1053:doi 689:CPR 637:MOA 519:VPN 205:or 183:DRP 104:RTO 98:RPO 88:. 1184:: 1109:. 1059:. 1051:. 1047:. 997:. 961:^ 880:^ 858:. 844:^ 816:^ 806:. 593:, 554:A 422:, 410:, 353:. 277:, 201:, 191:IT 177:A 1173:. 1154:. 1115:. 1094:. 1067:. 1055:: 1015:. 980:. 955:. 929:. 903:. 874:. 838:. 792:. 691:/ 181:( 113:. 20:.

Index

Belfast and County Down Railway
organizations
information technology
business continuity planning
disaster recovery
Auditing
stakeholders
documentation
material
IT service continuity
unusable

Recovery time objective
system
Recovery point objective
backup
disaster recovery
IT
disaster
natural
environmental
man-made
insurance policies
business analysis
corporate acquisition
product launch
system development
records
billings
contracts

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.