Disaster Recovery Plan
Disaster Recovery Plan
Disaster Recovery Plan
&
Business Continuity
Template
ISO 27000 (17799), Sarbanes-Oxley, HIPAA, PCI DSS and
ITIL Compliant
Prepared by
email - [email protected]
Web sites – http://www.e-janco.com - http://www.it-toolkits.com -- http://www.itproductivity.org
Version 5.0
© 2008 Copyright Janco Associates, Inc. ALL RIGHTS RESERVED
License Conditions:
This product is NOT FOR RESALE or REDISTRIBUTION in any physical or electronic format. The
purchaser of this template has acquired the rights to use it for a SINGLE Disaster Recovery Plan unless
the user has purchased a multi-use license. Anyone who makes an unlicensed copy of or uses the
template or any derivative of it is in violation of United States and International copyright laws and
subject to fines that are treble damages as determined by the courts. A REWARD of up to 1/3 of those
fines will be paid to anyone reporting such a violation upon the successful prosecution of such
violators.
The purchaser agrees that derivative of this template will contain the following words within the first
five pages of that document. The words are:
Derived from the Disaster Recovery / Business Continuity Template of Janco Associates, Inc.
© 2001 - 2008 Copyright Janco Associates, Inc. – ALL RIGHTS RESERVED
All Rights Reserved. No part of this book may be reproduced by any means without the prior written
permission of the publisher. No reproduction or derivation of this book shall be re-sold or given away
without royalties being paid to the authors. All other publisher’s rights under the copyright laws will
be strictly enforced.
435 940-9300
e-mail - [email protected]
Publisher cannot in any way guarantee the procedures and approaches presented in this book are being used for the
purposes intended and therefore assumes no responsibility for their proper and correct use.
Printed in the United States of America
ISBN13 (978-1-881218-02-9)
HandiGuide is a registered trademark of Janco Associates, Inc.
Janco Associates, Inc. provides the licensed user of the Disaster Recovery Plan
document the right to use this document for INTERNAL USE ONLY for the enterprise
of this user only. If the licensed user is a consultant or consulting entity, using this
document for a third party (client or customer of the licensed user), a separate
license must be purchased for each client facility and or customer location.
All questions about this via email at [email protected] or by phone at
435-940-9300.
The single user license is for one enterprise for one facility. If this template is used
for more than one facility than either an enterprise version or multiple copies of the
template should be purchased.
Any document that is created using this template must have © 2001-2008
copyright Janco Associates, Inc within the new document. All of this original
material remains the property of Janco Associates, Inc. and the user is granted a
limited use license.
Prepared by:
Version 5.0
Enterprise logo here Disaster Recovery Business Continuity
Table of Contents1
1.0 Plan Introduction ................................................................................................................. 9
1.1 Mission and Objectives ........................................................................................... 10
Compliance ........................................................................................................ 10
Implication of Legislated and Industry Standards Requirements .....................10
Sarbanes-Oxley ...............................................................................................10
COSO .......................................................................................................13
PCI DSS .......................................................................................................14
ISO 27000 Compliance Process ............................................................................. 15
Define the Control Environment.......................................................................15
Control the Environment by Implementation and Management .......................15
Audit and Examine the Control Processes ......................................................16
1.2 Disaster Recovery / Business Continuity Scope ..................................................... 17
1.3 Authorization ........................................................................................................... 18
1.4 Responsibility ......................................................................................................... 19
1.5 Key Plan Assumptions ............................................................................................ 20
1.6 Disaster Definition................................................................................................... 22
1.7 Metrics .................................................................................................................... 23
1.8 Disaster Recovery / Business Continuity and Security Basics .................................... 25
Servers ........................................................................................................ 25
Network ........................................................................................................ 27
Clients ........................................................................................................ 27
Recovery Procedures ............................................................................................. 27
Communication ....................................................................................................... 28
Designated operators ............................................................................................. 28
Designated manager .............................................................................................. 28
External resources .................................................................................................. 28
Insurance ........................................................................................................ 29
2.0 Business Impact Analysis .................................................................................................. 30
2.1 Scope ..................................................................................................................... 31
2.2 Objectives ............................................................................................................... 32
2.3 Critical Time Frame ................................................................................................ 33
2.4 Application System Impact Statements .................................................................. 34
Essential ........................................................................................................ 34
Delayed ........................................................................................................ 34
Suspended ........................................................................................................ 34
2.5 Information Reporting ............................................................................................. 35
2.6 Best Data Practices ..................................................................................................... 36
2.7 Summary ................................................................................................................ 37
3.0 Backup Strategy ........................................................................................................................ 39
3.01 Site Strategy ........................................................................................................... 40
3.02 Data Capture and Backups..................................................................................... 42
Backup Strategy ..................................................................................................... 43
3.03 Communication Strategy and Policy ....................................................................... 44
DRP / BCP Communication Policy ......................................................................... 45
3.04 ENTERPRISE Data Center Systems ...................................................................... 46
1
Major sections of this document were extracted from Client Server Management HandiGuide, PC Policies and
Procedures HandiGuide, Metric for the Internet and IT Management HandiGuide, and the IT Position Description
HandiGuide which are copyrighted by M. V. Janulaitis and published by Janco Associates, Inc. These copyrighted
materials remain the property of the copyright owners and the licensed user of this document is only granted a limited
use license of this material. For more information see www.e-janco.com
*** IMPORTANT*********************************************
http://www.e-janco.com/register.asp
If your product is not registered you will have to pay for support via
a credit card (MasterCard, Visa, or American Express). Please have
your credit card ready prior to calling.
***********************************************************
The DRP/BCP template and thier associated documents are saved
in two formats both Office 2003 and 2007. For example:
Both of these documents are the same but we have provided them in
both for your use. If you have any questions on these documents please
send an email to [email protected] and reference your order
number.
1. http://www.e-janco.com
2. http://www.itproductivity.org
3. http://www.ejobdescription.com
4. http://www.it-toolkits.com
The intent of a Disaster Recovery Plan is to provide a written and tested plan
directing the computer system recovery process in the event of an interruption in
continuous service resulting from an unplanned and unexpected disaster.
The Disaster Recovery Plan preparation process includes several major steps as
follows:
These steps were conducted and this document represents the completed effort in
the preparation of the ENTERPRISE Disaster Recovery Plan.
Compliance
Sarbanes-Oxley
2
Critical time frames include both the point in time that the recovery will be set to and the point in time
that the recovery will be completed and the enterprise can be back in operation.
3
This section is for informational purposes and can be excluded from the plan.
COSO
PCI DSS
PCI Standard requires that any enterprise that processes credit card
information must do the following:
Build and Maintain a Secure Network
o Install and maintain a firewall configuration to protect
cardholder data
o Do not use vendor-supplied defaults for system
passwords and other security parameters
Protect Cardholder Data
o Protect stored cardholder data
o Encrypt transmission of cardholder data across open, public
networks
Maintain a Vulnerability Management Program
o Use and regularly update anti-virus software
o Develop and maintain secure systems and applications
Implement Strong Access Control Measures
o Restrict access to cardholder data by business need-
to-know
o Assign a unique ID to each person with computer
access
o Restrict physical access to cardholder data
Regularly Monitor and Test Networks
o Track and monitor all access to network resources
and cardholder data
o Regularly test security systems and processes
Maintain an Information Security Policy
o Maintain a policy that addresses information
security
The enterprise DRP/BC team needs to establish controls that can be easily
managed and monitored in order to assess compliance and remediate any
problems.
A key strategy for reducing the risk and cost associated with implementing
controls as they are associated with the DRP/BCP is to define policies and
procedures that support the compliance process. By minimizing costly and
error-prone un-defined process, you can eliminate the fragmentation and
duplication of effort and transform your controls environment into a
proactive risk management system.
4
This section is for informational purposes and can be excluded from the plan.
1.3 Authorization
The management of ENTERPRISE recognizes the need for a Disaster
Recovery Plan for all operations directly or indirectly dependent on data
processing. The Chief Information Officer for ENTERPRISE has authorized
the development and ongoing maintenance of this plan.
The Disaster Recovery Plan and Process have been reviewed by the executive
management of ENTERPRISE and necessary changes in the ―BY-LAWS‖
and or ―CHARTER‖ of ENTERPRISE has been approved by Board of
Directors, Stockholders or other legal entities as required.
1.4 Responsibility
Responsibility for the development and maintenance of the plan is assumed by
the Information Technology group. Specific responsibility for ensuring the
plan is maintained and tested rests with the ENTERPRISE DRP Support
Group. In consideration of this responsibility, the end user community is
responsible to coordinate with the Project Manager for their information
technology requirements.
The computer facilities of the alternative site are not within the
scope of this plan and are assumed not to be impacted by any
disaster that may interrupt computer operations at
ENTERPRISE offices.
The Management Team makes a decision whether to stay and repair the
damage, or move computer operations to the off-site recovery location.
Therefore, the definition of a disaster is:
1.7 Metrics
Questions asked are: where will your management team be when disaster
strikes? They could be anywhere --at work -- on vacation-- or in the car. How
will you find each other? Will you know if your employees are safe?
Disaster can strike quickly and without warning. It can force you to evacuate
your offices or confine you to your home. What would you do if basic
services -- water, gas, electricity or telephones -- were cut off? Local officials
and relief workers will be on the scene after a disaster, but they cannot reach
everyone right away.
Metrics provide the mechanism by which you can measure the success of your
disaster recovery and business continuity process.
Metrics for disaster recovery and business continuity are somewhat different
from those used to measure other functions, because they are a combination of
project status and test runs of infrastructure.
Metrics include:
Servers
Room - The server room should be secured. Methods to do this
include biometric locks, combination locks, and reinforced doors
with a deadbolt at last 1.5 inches long. If the room has windows,
they should be barred. The room should have both fire/heat
detection and water detection sensors which set off a local alarm
and send a signal to an off-premises monitoring facility. The
server room should have fire extinguishers suitable for electrical
fires. A fire suppression system is also suggested.
5
The database server should be available only to enterprise staff in the enterprise and the vendor of the
automated enterprise system. It should not be available to others via the Internet or by dial-up.
6
A proxy server shields the database server from direct access by initiating a separate inquiry, rather than
passing the external inquiry through to the database server.
7
In the case of tape, it can become unstable with repeated use; therefore, seven logging tapes--one for each
day of the week--should be used. Seven backup tapes should also be used. All of the tapes should be
replaced at least every year.
Network
Network hardware should be secured in locked data
communications closets or cabinets. All data jacks should be
capable of being de-activated when no enterprise equipment is
connected to them. The practice of distributing a large number of
data jacks around a building for use with laptops should be avoided
unless these jacks are on a separate LAN segment that can be
isolated from the database server of the automated enterprise
system.
Clients
Laptop and desktop computers are the most vulnerable technology
in ENTERPRISE. Viruses are the greatest threat. Anti-virus
software is essential. Products from companies such as McAfee
and Norton detect computer virus signatures and alert the user to
them before they enter the client. Anti-virus software should be
updated at least weekly by downloading the latest version.
Recovery Procedures
It is important to state in the disaster plan not only what recovery
procedures are to be followed if a disaster occurs, but also who has
what responsibility. Who calls whom and what information should
they be prepared to give? Who performs the needed diagnostics?
Who restores the files? What are the instructions for packing and
shipping the corrupted files?
Communication
It should be assumed that regular telephone service would NOT be
available. Key personnel should have cell phones for use when
regular telephone service fails or is overloaded. The ―charged‖
and ―activated‖ cell phone in the server room should be stored in a
wall-hung watertight cabinet on the wall adjacent to the entrance
door. The instructions for dealing with a computer/network
disaster should be stored in the same cabinet. All important
telephone numbers should be stored in each cell phone.
Designated operators
There should be a server operator on duty at all times. This may
be a member of the help desk's support staff- the staff which
usually is in the facility whenever ENTERPRISE is open for
business or staff use. The designated person would perform the
end-of-day swap of the logging and backup tapes as part of his/her
routine duties.
Designated manager
An operator may encounter a situation that overwhelms him/her.
There should always be a designated manager in the enterprise or
available by telephone 24 hours per day, seven days per week.
While there may rarely be a need to decide about evacuation of the
enterprise or another major action, the plan and processes to do so
must be in place.
External resources
Key vendors are an important resource in diagnosing problems that
result from a disaster. When drawing the contract, make it clear
that vendor(s) shall be liable not only for the performance of their
product, but they shall have the ability to conduct remote
diagnostics. If coverage has not been purchased for 24 hours a day
and seven days a week, there should be provision for emergency
Many vendors operate service bureaus for firms that do not wish to
maintain their own computer systems. ENTERPRISE should
discuss the terms for its vendor to offer its service bureau as a
backup facility should the enterprise not be able to restore its own
system within a day or so. This will involve establishing a basic
profile and maintaining a relatively recent copy of the
ENTERPRISE's database at the vendor's site.
Insurance
ENTERPRISE should carry insurance that includes coverage for
its servers, network, and clients. In order to make claims, it is
essential to have an absolutely current inventory of all hardware
and software, including purchase data and price. A copy of this
information should be stored at a remote site.
In turn, this provides for the determination of the most cost effective recovery
time-period for each system and application. Recovery times are established and
accepted by the user community.
2.1 Scope
The scope of the Business Impact Analysis is the ENTERPRISE operating
departments supported by data center facilities located at ____________
______________________________. This network encompasses the
following information technology services:
General business applications, such as word-processing,
spreadsheet and database applications
e-Mail
File servers supporting all business operations
Gateway to the host applications and other sites
WEB / e-commerce processing
Wireless Networks
Non-ENTERPRISE infrastructure including power grids,
telephone switching centers, microwave towers, and cell and
wireless transmission sites within a ten (10) mile radius of the
facility
2.2 Objectives
The Business Impact Analysis is completed to determine the Critical Time
Frame in which the application system capabilities and functionality must be
available after an interruption in service to minimize the operational loss of
control and potential loss of revenue. In addition, the Business Impact
Analysis assists in identifying alternative manual procedures which may be
used during an interruption in service. Therefore, the objectives of the
Business Impact Analysis are:
The Critical Time Frame is defined in business days as the elapsed time
between the points of the interruption up to the point where the system must
be functional.
Recovery procedures in the plan are staged around the most critical
application which has the shortest Critical Time Frame to the application with
the longest Critical Time Frame. According to the Business Impact Analysis
the application with the shortest Critical Time Frame is the
___________________ and the longest is the _____________________.
Although each system may have a different time frame, the plan as a whole
carries the time frame on the application with the shortest. Therefore, the plan
as a whole has a _____ day Critical Time Frame.
Essential
An application is considered ―essential‖ if its loss would affect
ENTERPRISE’s ability to remain solvent through financial loss or impart
a serious loss of operational control.
Delayed
An application is classified as ―delayed‖ when the function can survive
without computer processing support for a period of time. Resumption of
computer processing begins only when resources are available in excess of
the requirements for the essential category; however, the passage of time
can escalate the criticality of the application.
Suspended
Some business functions may have computer support "suspended" or
discontinued indefinitely. Resumption of processing begins again when
full computer capability is restored. Typically, the passage of time does
not cause the escalation of the criticality of suspended systems; however,
they may be processed using any available resources when the
requirements of the essential and delayed systems are satisfied.
8
The ―Application Inventory and Business Impact Analysis Questionnaire‖ (see Appendix for sample
forms) should be filled for each business function prior to the completion of this section of the Disaster
Recovery Plan.
2.7 Summary
A summary of the Application System Impact Statements9, outlining the
period of time before an application’s loss becomes critical and classifying
each application as essential, delayed or suspended, is as follows:
MN = Minimum Impact
MD = Moderate Impact
CT = Critical Impact
9
The ―Application Inventory and Business Impact Analysis Questionnaire‖ (see Appendix for sample
forms) should be filled for each business function prior to the completion of this section of the Disaster
Recovery Plan.
10
Internet Service Providers and other ―outsourced‖ service providers.
11
Personal Digital Assistants
Most strategies start with periodic full backups, and then add more
frequent incremental or differential backups to minimize storage
requirements, as both require less space than a full backup. If a restore is
necessary, the full backup is added first, with data filled in from the
subsequent incremental or differential backups.
While incremental and differential backups save space, they can generate
inaccuracies upon restore. Due to the nature of the data snapshots taken in
these types of backups, files can be restored in multiple versions and/or
multiple locations, even after they were purposely deleted. This can
necessitate a manual clean-up that adds to the overall restore time.
Backup Strategy
Backups can be accomplished locally, centrally or both. There
are advantages and disadvantages to each. The table below
lists some of the advantages and disadvantages of each.
Disaster Recovery
Advantage Disadvantage
Backup Alternatives
Backup quicker More hardware required
Minimal bandwidth usage More staff required
Local Backup Quicker restore in minor Security risks increased
recovery situation Riskier restore in a major
recovery situation.
Hardware requirement less More bandwidth required
Less staff required Backup takes longer to
Central Backup Less training complete
Quicker restore in a major Restore takes longer in
recovery situation. minor recovery situation
Security risks lower
Recovery time eased More hardware required
Coordinated Local Enterprise risks reduced More staff required
and Central Backup Easier to coordinate DRP More training required
and Business Continuity More bandwidth required
Plans
After a disaster, landlines are often out. The only workable solutions often are
cellular, satellite, and Wifi. These need to be incorporated in the preparation
for catastrophic events, power outages, weather-related incidents, and similar
threats. That requires forward-looking procedures, a responsive
communication network, and a framework of supporting technology.
Backup Files
At least two copies should be made of all master and transaction files.
One copy should remain at the data center under approved security
procedures. One copy should be moved to an offsite storage facility. That
facility should be secure and at least 20 miles from the data center.
System and application software necessary to access that data should also
be stored along with any changes made to either. The ―Change Control
System‖12 is integrated with the Disaster Recovery Plan and is the trigger
for creating new backup files of system and application software.
Storage Rotation
12
The change control system is the set of procedures and processes that are followed as system and
application programs are altered by ENTERPRISE.
Backup Files
At least three copies should be made of all master and transaction files.
One copy should remain in a secure area of the department under
approved security procedures. One copy should be retained at
ENTERPRISE data center under approved security procedures. One copy
should be moved to an offsite storage facility. That facility should be
secure and at least 20 miles from the data center. System and application
software necessary to access that data should also be stored along with any
changes made to either. The ―Change Control System‖13 is integrated
with the Disaster Recovery Plan and is the trigger for creating new backup
files of system and application software.
Storage Rotation
Department
At least one copy of several generations of master files,
transaction files, operation system software (including
patches), and application system software should be in a
secure location in the department. On a quarterly (monthly
/ semiannual / annual) basis these files should be tested for
their viability as vehicles to restore the department file
servers.
ENTERPRISE Data Center
At least one copy of several generations of master files,
transaction files, operation system software (including
patches), and application system software should be in a
secure location at the data center. On a quarterly (monthly
/ semiannual / annual) basis these files should be tested for
their viability as vehicles to restore the department file
servers.
13
The change control system is the set of procedures and processes that are followed as system and
application programs are altered by ENTERPRISE.
Backup Files
At least three copies should be made of all master and transaction files.
One copy should remain in a secure area of the wireless server area under
approved security procedures. One copy should be moved to the
ENTERPRISE data center under approved security procedures. One copy
should be moved to an offsite storage facility. That facility should be
secure and at least 20 miles from the data center. System and application
software necessary to access that data should also be stored along with any
changes made to either. The ―Change Control System‖14 is integrated
with the Disaster Recovery Plan and is the trigger for creating new backup
files of system and application software.
Storage Rotation
14
The change control system is the set of procedures and processes that are followed as system and
application programs are altered by ENTERPRISE.
Backup Files
At least three copies should be made of all master and transaction files.
One copy should remain in a secure area of the outsourced site under
approved security procedures. One copy should be moved to the
ENTERPRISE data center under approved security procedures. One copy
should be moved to an offsite storage facility. That facility should be
secure and at least 20 miles from the data center. System and application
software necessary to access that data should also be stored along with any
changes made to either. The ―Change Control System‖15 is integrated
with the Disaster Recovery Plan and is the trigger for creating new backup
files of system and application software.
Storage Rotation
Outsourced Sites
At least one copy of several generations of master files,
transaction files, operation system software (including
patches), and application system software should be in a
secure location at the outsourced site. On a quarterly
(monthly / semiannual / annual) basis these files should be
tested for their viability as vehicles to restore outsourced
site(s)16.
ENTERPRISE Data Center
At least one copy of several generations of master files,
transaction files, operation system software (including
patches), and application system software should be in a
secure location at the data center. On a quarterly (monthly
/ semiannual / annual) basis these files should be tested for
their viability as vehicles to restore the outsourced site(s).
15
The change control system is the set of procedures and processes that are followed as system and
application programs are altered by COMPANY.
16
This test should be conducted at a site other than the outsourced site at least annually. That test should
insure the ability to create all of the systems that run on the outsourced service provider at another site if
the outsourced service provider ceases to function.
At small remote offices, data resides primarily on desktops and laptops, which
can contain up to 80% of a ENTERPRISE’s business-critical data. These
computers can be difficult to backup at scheduled times. Desktops might be
turned off when employees leave for the evening. Laptops are often
disconnected from the network when employees go home or travel on
business. Backups are made more difficult because small offices have very
limited IT resources to administer backup operations.
All unique data that resides in branch offices should have copies made weekly
(monthly / quarterly /annual) of all master files and software necessary to
restore and access the data for normal operations. Daily (weekly / monthly /
quarterly / annual) transactions files copies should made.
Backup Files
At least three copies should be made of all unique master and transaction
files that reside on Branch Office devices. One copy should remain in a
secure area of the close to the Branch Office under approved security
procedures. One copy should be moved to the ENTERPRISE data center
under approved security procedures. If the application is critical, one copy
should be moved to an offsite storage facility. That facility should be
secure and at least 20 miles from the Branch Office. System and
application software necessary to access that data should also be stored
along with any changes made to either. The ―Change Control System‖17 is
integrated with the Disaster Recovery Plan and is the trigger for creating
new backup files of system and application software.
17
The change control system is the set of procedures and processes that are followed as system and
application programs are altered by ENTERPRISE.
Storage Rotation
Laptop location
At least one copy of several generations of unique master
files, transaction files, operation system software (including
patches), and application system software should be in a
secure location near the Branch Office. On a quarterly
(monthly / semiannual / annual) basis these files should be
tested for their viability as vehicles to restore the Branch
Office devices18.
ENTERPRISE Data Center
At least one copy of several generations of unique master
files, transaction files, operation system software (including
patches), and application system software should be in a
secure location at the data center. On a quarterly (monthly
/ semiannual / annual) basis these files should be tested for
their viability as vehicles to restore the Branch Office
devices.
Off Site Storage
If critical, at least one copy of several generations of unique
master files, transaction files, operation system software
(including patches), and application system software should
be in a secure location at the offsite storage facility. On a
quarterly (monthly / semiannual / annual) basis these files
should be tested for their viability as vehicles to restore the
Branch Office devices.
18
This test should be conducted on all devices in the Branch Office at least annually. That test should
insure the ability to create all of the systems that run in the Branch Office if the facility ceases to exist
(function).
Backup Files
At least three copies should be made of all master and transaction files.
One copy should remain in a secure area of the close to the desktop
workstation under approved security procedures. One copy should be
moved to the ENTERPRISE data center under approved security
procedures. If the application is critical, one copy should be moved to an
offsite storage facility. That facility should be secure and at least 20 miles
from the data center. System and application software necessary to access
that data should also be stored along with any changes made to either.
The ―Change Control System‖19 is integrated with the Disaster Recovery
Plan and is the trigger for creating new backup files of system and
application software.
Storage Rotation
Backup Files
At least three copies should be made of all master and transaction files.
One copy should remain in a secure area of the close to the desktop
workstation under approved security procedures. One copy should be
moved to the ENTERPRISE data center under approved security
procedures. If the application is critical, one copy should be moved to an
off site storage facility. That facility should be secure and at least 20
miles from the data center. System and application software necessary to
access that data should also be stored along with any changes made to
either. The ―Change Control System‖21 is integrated with the Disaster
Recovery Plan and is the trigger for creating new backup files of system
and application software.
Storage Rotation
21
The change control system is the set of procedures and processes that are followed as system and
application programs are altered by ENTERPRISE.
22
This test should be conducted on a workstation other than the workstation at least annually. That test
should insure the ability to create all of the systems that run on the desktop workstation on another desktop
if the desktop workstation ceases to function.
3.11 Laptops
All data that resides laptops should have copies made weekly (monthly /
quarterly /annual) of all master files and software necessary to restore and
access the data for normal operations. Daily (weekly / monthly / quarterly /
annual) transactions files copies should made.
Backup Files
At least three copies should be made of all master and transaction files.
One copy should remain in a secure area of the close to the laptop user’s
primary location under approved security procedures. One copy should be
moved to the ENTERPRISE data center under approved security
procedures. If the application is critical, one copy should be moved to an
offsite storage facility. That facility should be secure and at least 20 miles
from the data center. System and application software necessary to access
that data should also be stored along with any changes made to either.
The ―Change Control System‖23 is integrated with the Disaster Recovery
Plan and is the trigger for creating new backup files of system and
application software.
Storage Rotation
Laptop location
At least one copy of several generations of master files,
transaction files, operation system software (including
patches), and application system software should be in a
secure location near the laptop user’s primary location. On
a quarterly (monthly / semiannual / annual) basis these files
should be tested for their viability as vehicles to restore
laptop(s)24.
ENTERPRISE Data Center
At least one copy of several generations of master files,
transaction files, operation system software (including
patches), and application system software should be in a
secure location at the data center. On a quarterly (monthly
23
The change control system is the set of procedures and processes that are followed as system and
application programs are altered by ENTERPRISE.
24
This test should be conducted laptop other than the laptop at least annually. That test should insure the
ability to create all of the systems that run on the laptop on another laptop if the laptop ceases to function.
All unique data that resides PDA’s and Smartphones should have copies made
weekly (monthly / quarterly /annual) of all master files and software necessary
to restore and access the data for normal operations. Daily (weekly / monthly
/ quarterly / annual) transactions files copies should made.
Backup Files
At least three copies should be made of all unique master and transaction
files that reside on PDA’s and Smartphones. One copy should remain in a
secure area of the close to the PDA’s and Smartphones user’s primary
location under approved security procedures. One copy should be moved
to the ENTERPRISE data center under approved security procedures. If
the application is critical, one copy should be moved to an offsite storage
facility. That facility should be secure and at least 20 miles from the data
center. System and application software necessary to access that data
should also be stored along with any changes made to either. The
―Change Control System‖27 is integrated with the Disaster Recovery Plan
and is the trigger for creating new backup files of system and application
software.
25
PDA and Smartphones are referred to as PDA’s in this document.
26
By providing ENTERPRISE employees with convenient mobile access to email, business applications,
customer information and critical corporate data, businesses have become more productive, streamlined
business processes and enabled better decision making. This in turn has created a new set of issues that
need to be addressed in the DR / BC planning process because:
Smartphones and handhelds are more easily lost or stolen than laptop or desktop computers.
Users often treat smartphones and handhelds as personal devices and must be trained to consider
the security risks when they use these devices to access corporate data and networks.
Because smartphones and handhelds frequently connect wirelessly, robust wireless security
becomes essential.
27
The change control system is the set of procedures and processes that are followed as system and
application programs are altered by ENTERPRISE.
Storage Rotation
Laptop location
At least one copy of several generations of unique master
files, transaction files, operation system software (including
patches), and application system software should be in a
secure location near the PDA’s and Smartphones user’s
primary location. On a quarterly (monthly / semiannual /
annual) basis these files should be tested for their viability
as vehicles to restore the PDA(s)28 and Smartphones.
ENTERPRISE Data Center
At least one copy of several generations of unique master
files, transaction files, operation system software (including
patches), and application system software should be in a
secure location at the data center. On a quarterly (monthly
/ semiannual / annual) basis these files should be tested for
their viability as vehicles to restore the PDA(s) and
Smartphones.
Off Site Storage
If critical, at least one copy of several generations of unique
master files, transaction files, operation system software
(including patches), and application system software should
be in a secure location at the offsite storage facility. On a
quarterly (monthly / semiannual / annual) basis these files
should be tested for their viability as vehicles to restore the
PDA(s) and Smartphones.
28
This test should be conducted for PDAs and other than the PDAs at least annually. That test should
insure the ability to create all of the systems that run on the PDA on another PDA if the PDA ceases to
function.
Approach
Escalation Plans
Decision Points
4.1 Approach
The Critical Time Frame is the basis for selecting an alternate site in the worst
case scenario. Information Technology recommended the ________________
_______________________________________. This alternative site
provides immediate access to the mainframe and technical facilities to assist
in the recovery process. The key contact and address of the alternate site (the
alternative site must be at least ten (10) miles from the site and within a
different power grid, telephone switching centers, microwave towers, and cell
and wireless transmission sites within a ten (10) mile radius of the facility) is:
Name
Address Line
City, State ZIP
Phone (999) 999-1212
Cell (999)-999-1212
The decision to utilize the alternative site is dependent upon two factors:
1) The length of the anticipated outage and
2) The portion of the business cycle ENTERPRISE is in at the time of
the outage.
Therefore, based upon these two factors, three escalation plans have been
devised to drive the recovery process.
The escalation plans below have been developed based on the time frames
depicted on the Business Impact Analysis matrix.
Plan 1
In the worst case scenario where the ADP access is disabled just
prior to the Payroll release or input of the payroll information, the
recovery strategy for payroll processing is as follows:
OR
Plan 2
Plan 3
The organization of the staff to recover the system is designed for the worst case
situation. The worst case, requiring a move to the alternative site, must be
executed by a coordinated team to minimize the operational impacts to end-users,
senior management and ENTERPRISE as a whole.
Senior Recovery
Manager
Recovery
Manager
Systems,
Damage Physical Administration Hardware Application & Communications Operations
Assessment & Security Installation Network Software
Security
Pre-Disaster
Approves the final Disaster Recovery Plan
Ensures the Disaster Recovery Plan is maintained
Ensures Disaster Recovery training is conducted
Authorizes periodic Disaster Recovery Plan testing
Post-Disaster
Declares that a disaster has occurred and the Disaster
Recovery Plan is activated
Determines the plan strategy to be implemented (i.e.: Plan
1, 2 or 3)
Determines alternate team members (if any) and other
support members of the recovery process
Authorizes travel and housing arrangements for team
members
Authorizes expenditures in excess of $5,000
Manages and monitors the overall recovery process
Advises Senior ENTERPRISE and user management on the
status of the disaster recovery efforts
Coordinates media and press releases
Pre-Disaster
Maintains and updates the plan as scheduled
Distributes Disaster Recovery Plan to recovery team
members
Appoints recovery team members and alternates as required
Coordinate the testing of the plan
Trains disaster recovery team members in regard to the
Plan
Post-Disaster
Assists in assessing extent of damage to ENTERPRISE
facilities and ability to provide data processing service to
the organization
Provides the initial notification of disaster declaration to
recovery team
Coordinates all recovery teams
Notifies alternative site of pending activation
Notifies systems, application and network software teams
to request off-site system backups, manuals, equipment and
documentation
Notifies administration team to make necessary travel or
hotel accommodations for designated recovery team
members
Authorizes purchases and required disbursements
Reports to senior recovery manager the status of recovery
effort
Pre-Disaster
Understands the role and responsibilities within the
Disaster Recovery Plan
Works closely with recovery management team to reduce
possibility for disaster in the data center (See Preventative
Measures in Appendix)
Trains employees in emergency preparedness
Participates in Disaster Recovery Plan tests as required
Post-Disaster
Determines accessibility to building and ENTERPRISE’s
offices
Assesses the extent of the damage to ENTERPRISE’s LAN
and data center
Assesses the need for physical security, such as security
guards
Estimates time to recover based upon damage assessment
Identifies salvageable hardware and communication
equipment
Apprises the senior management team on the extent of
damage, estimated recovery time, physical security
requirements, and salvageable equipment
Maintains a log of salvageable hardware and equipment
5.3.4 Administration
The Disaster Recovery Administration team is responsible for
providing secretarial, filing, procurement, travel and housing, off-
site storage and other administrative matters not performed by
other team members. Included is limited authority to provide
funds for emergency expenditures other than for capital equipment
and salaries.
Pre-Disaster
Understands the role and responsibilities within the
Disaster Recovery Plan
Trains employees in emergency preparedness
Ensures sufficient comprehensive and business interruption
insurance is maintained
Ensures sufficient emergency funds will be available
during recovery process
Assesses the needs for alternative means of communication
if telephones service and network service is unavailable
Participates in Disaster Recovery Plan tests as required
Post-Disaster
Prepares, coordinates and obtains appropriate approval for
all procurement requests
Coordinates deliveries of all procurement requests
Processes requests for payment of all invoices relating to
recovery process
Arranges for travel and lodging as required by recovery
team
Provides for acquisition of telephone equipment and
services, including voice, dial-up data and leased lines
Provides for alternative means of communication between
recovery team members in the event regular telephone
service and network service is unavailable
Arranges for temporary secretarial, filing, and other
administrative services required by the recovery
team
29
The ―Application Inventory and Business Impact Analysis Questionnaire‖ (see Appendix for sample
forms) should be filled for each business function prior to the completion of this section of the Disaster
Recovery Plan.
5.3.7 Communications
The Communications Team is responsible for establishing voice
and data links to the alternative site. This includes connecting
local and remote users to the alternate site.
Pre-Disaster
Understands the role and responsibilities within the
Disaster Recovery Plan
Works closely with recovery management team to ensure
physical security of existing system, LAN and facilities
Trains employees in emergency preparedness
Participates in Disaster Recovery Plan tests as required
Maintains current communication and network
configuration in off-site storage
Post-Disaster
Coordinates with damage assessment and salvage team in
the assessment of communications and network equipment
viability
Retrieves communications configuration from off-site
storage
Plans, coordinates and installs communication and network
equipment at alternative site
Plans, coordinates and installs communication and network
cabling at alternative site
5.3.8 Operations
The Operations Team is responsible for operating the production
systems at the backup data center and for assisting the other
recovery teams in establishing operations at the backup site.
Pre-Disaster
Understands the role and responsibilities within the
Disaster Recovery Plan
Works closely with recovery management team to ensure
physical security of existing system, LAN and facilities
Trains employees in emergency preparedness
Ensures backups are completed as scheduled
Ensures backups are sent to off-site storage as scheduled
Participates in Disaster Recovery Plan tests as required
Post-Disaster
Assist hardware, software and communications team
members as required
Schedules new pickup point with off-site storage
Initializes new tapes and portable electronic/magnetic
media as needed in the recovery process
Conducts the backups at the off-site location
Ensures backup tapes, electronic and magnetic media are
sent secondary to the off-site storage facility
Sets up and operates a sign-in, sign-out procedure for all
materials sent to and from the alternative site
Checks floor configuration of alternative site after disaster
to assist hardware, software and communications team
members
Monitors security of the alternative site and the LAN
network
Coordinates transfer of equipment, furniture and personnel,
as necessary to the alternative site
General
Recovery Management
Damage Assessment and Salvage
Physical Security
Administration
Hardware Installation
Systems, Applications, Network Software
Communications
Operations
6.1 General
Mission: To report a potential or actual disaster so appropriate
action can be taken to minimize injury to ENTERPRISE
personnel and damage to facilities and equipment.
Equipment acquisitions
Equipment repairs
11) Coordinate and issue any media press releases regarding the
disaster as it relates to ENTERPRISE.
I. Building
A. Exterior
B. Interior
1. Data Center
a) Walls
b) Ceiling
c) Floor
II. Environmental/Control
A. Electrical
1. UPS
2. Transformers
3. Emergency/Building
B. HVAC
1. Air Handling
2. Air Conditioning
3. Water
C. Fire Suppression
1. HALON
2. CO 2
3. Water
__________________
__________________
__________________
__________________
__________________
8AM-5PM Phone: (999) 555-1212
24 Hour Phone: (999) 555-1212
Under no circumstances should the Physical Security Team make any public
statements regarding the disaster, its cause or its effect on the operations at
ENTERPRISE.
6.5 Administration
Mission: To provide administrative support to all Disaster
Recovery Teams, including procurement of equipment
and supplies, telephones (acquisition and installation),
travel and housing arrangements, and other
administrative functions not provided by other team
members.
(999) 555-1212
2) Contact the off-site storage facility and request the off-site storage
backup tapes, equipment, manuals and documentation. You will need
to provide them with the following:
________________________
______________________
______________________
______________________
______________________
______________________
______________________
6.8 Communications
Mission: To design, install and verify the communications
equipment and network cabling. In the case of a total
disaster of the primary site and the loss of key
personnel due to injury or death, others may have to
assume these roles at facilities other than the primary
recovery facility.
6.9 Operations
Mission: To provide operating support for the production
systems at the backup data center and assist the other
recovery teams in establishing operations at the backup
site.
The offsite copies of the plan also need to have an individual trained and
assisted to assume the start of the recovery in the event the entire primary
facility is impacted by the disaster. In that case the corporate by laws
(charter) may need to be altered to allow the individuals to act in such a
fashion that would be able to drive the recovery of the basic operations of the
enterprise.
30
The ―Application Inventory and Business Impact Analysis Questionnaire‖ (see Appendix for sample
forms) for each function and business area should be completed and maintained as part of the Disaster
Recovery Plan. .
Planning for the test is a two to six week process depending on the complexity
of the tests employed and the number of individuals involved. However,
without sufficient planning, achievable benefits and objectives from the
testing process may never materialize. The steps in planning for the Disaster
Recovery Test in checklist format are:
Corporate Checklist
8.0 Appendix
ATLANTA
CHICAGO
CLEVELAND
DALLAS
LOS ANGELES
NEW YORK
SAN FRANCISCO
MINNEAPOLIS
Role Individual Office Phone e-mail address Alternate e-mail Cell Phone / Pager / Home Credit Card Issued
address Phone
Recovery Senior
Manager:
Alternate:
Recovery
Manager:
Alternate:
Damage
Assessment and
Security:
Alternate
Physical Security:
Alternate:
Role Individual Office Phone e-mail address Alternate e-mail Cell Phone / Pager / Home Credit Card Issued
address Phone
Administration:
Alternate:
Hardware
Installation:
Alternate:
Systems,
Applications &
Network
Software:
Alternate:
Communications:
Alternate:
Operations:
Alternate:
Product/Service:
Vendor Name:
Street Address:
City/State/Zip:
Contact Person: Phone No.:
24 Hour No.:
Alternate Contact: FAX No.:
Other No.:
Comments:
Product/Service:
Vendor Name:
Street Address:
City/State/Zip:
Contact Person: Phone No.:
24 Hour No.:
Alternate Contact: FAX No.:
Other No.:
Comments:
Product/Service:
Vendor Name:
Street Address:
City/State/Zip:
Contact Person: Phone No.:
24 Hour No.:
Alternate Contact: FAX No.:
Other No.:
Comments:
Product/Service:
Vendor Name:
Street Address:
City/State/Zip:
Contact Person: Phone No.:
24 Hour No.:
Alternate Contact: FAX No.:
Other No.:
Comments:
Product/Service:
Vendor Name:
Street Address:
City/State/Zip:
Contact Person: Phone No.:
24 Hour No.:
Alternate Contact: FAX No.:
Other No.:
Comments:
Product/Service:
Vendor Name:
Street Address:
City/State/Zip:
Contact Person: Phone No.:
24 Hour No.:
Alternate Contact: FAX No.:
Other No.:
Comments:
Product/Service:
Vendor Name:
Street Address:
City/State/Zip:
Contact Person: Phone No.:
24 Hour No.:
Alternate Contact: FAX No.:
Other No.:
Comments:
Product/Service:
Vendor Name:
Street Address:
City/State/Zip:
Contact Person: Phone No.:
24 Hour No.:
Alternate Contact: FAX No.:
Other No.:
Comments:
Signature
Hardware
LAN Server:
Communications:
Peripherals:
SQL Server:
e-Mail:
Software
System/Utility:
Applications:
Server System/Utility:
Gateway:
Narrative: Cash receipts are received directly at a bank lock box. Input of
cash receipts to the MSA system is done through the LAN
gateway based upon the manual reports received from the
bank.
Classification: Essential
Critical Time Frame: 1 to 2 weeks depending upon business cycle. Inability to input
cash receipts during the last two weeks of a month will have
direct impact on ability to complete corporate reporting as
required. Significant operational and reporting impact would
be felt after two weeks.
Position Purpose
Principal Accountabilities
1. Plans and charts the direction for the disaster recovery process.
2. Establishes procedures and priorities for the disaster recovery
process.
3. Manages all activities during the disaster recovery process, and
during semi-annual disaster recovery testing.
4. Works closely with all business operational groups in
developing and managing the creation of business continuity
plan for all functions that interface with the technology
infrastructure.
5. Reports all hardware and software removed (stolen) from the
scene of a disaster to appropriate personnel.
6. Coordinates and supervises all special projects relating to
disaster recovery process and capacity.
7. Recognizes and identifies potential areas where existing
disaster recovery policies and procedures require change, or
where new ones need to be developed, especially regarding
future business expansion.
Position Purpose
Scoring
1. Catastrophic – as a result ENTERPRISE could cease to exist and/or would be
placed in material legal and/or financial jeopardy.
2. Very High - as a result ENTERPRISE would not be able to meet its material
contractual and/or service obligations. Or do material damage to
ENTERPRISE’s reputation and have major negative long term implications on
ENTERPRISE’s ability to continue being a going concern.
The purpose of this questionnaire is to determine the criticality of the applications used at ENTERPRISE. The information
provided will be used to develop a Application Inventory that can be used in the Disaster Recovery Plan that minimizes
the impact of the loss of this application in the event of a disaster. (PLEASE USE ADDITIONAL BLANK PAPER OR
ATTACHMENTS WHEREVER NECESSARY)
Name: _______________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
Was this developed in-house or purchased from a vendor? If purchased from a vendor, do you hold the plans,
source code etc. _______________________________________________________________________________
____________________________________________________________________________________________
If the application is a purchased package, are there extensive modifications to this application (briefly describe
modifications): ________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
Who is the owner of this application (i.e. Joe Smith of Accounting)? _____________________________________
____________________________________________________________________________________________
Sarbanes-Oxley Compliance
Which portions of this system affect the financial records (reports of the Enterprise):
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
When was the last time that this application was audited by an external entity?
When this application was audited by an external entity what were the findings? Explain
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
Does management (executive, senior and line) accept responsibility for control? YES NO N/A
Does management assign responsibilities for training and monitoring controls? YES NO N/A
Are evaluations documented and reviewed by qualified outside parties? YES NO N/A
For each question that has a no response (or N/A) explain why (use as many additional sheets as necessary):
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
User Environment
Provide the following information for each department that uses the application:
Department name
How the application is used (example: Department A inputs patient information, Department B enters billing information etc.)
Primary contact (i.e. primary user or department head name)
Number of people in department that use the application
What attribute best describes the users that have access to this application:
Public
Customers and Employees
Groups of Employees
Specific Employees
Other __________
Sensitive
Confidential
Internal Use
Public
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
Operating Environment
What platform(s) does this application use (i.e. LAN, Internet, IBM Mainframe etc.)?
Platform 1
Platform 2
Platform 3
What Operating system(s) does this application run on (i.e. Novell, VM, VSE, UNIX etc.)?
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
What sub-systems does the application run under (i.e. CICS, TSO, Windows, UNIX (Version) etc.)?
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
What applications and business functions feed this application (i.e. what provides input to this application)?
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
What applications and Business Functions use the output from this application?
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
What are the other applications and Business Functions impacted by the failure of this application?
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
What is the file structure of the data (example: SQL, Oracle, VSAM, Relational DBMS, etc.):
____________________________________________________________________________________________
Criticality of Application
Are there any particular aspects of this system's operation or function that should be considered in determining the
system's criticality to the organization?
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
If a disaster occurred and normal processing capability were unavailable, in which of the following categories would you
classify this system:
Category II Only high priority (i.e., high dollar item) transactions or critical reports
would be processed.
Category III Processed would be carried out on a "Time Availability" only basis.
How long can application be down before having a significant business impact on the organization?
What would be the first major affect if system were to go down (i.e. Patients would not receive medicine?
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
How long until the next impact (i.e. monthly processing could not be performed)?
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
Could you accept input without processing (i.e. data input is stored in a holding file and processed at night):
YES NO N/A
If so, how long can data be stored without processing before having a significant business impact?
____________________________________________________________________________________________
____________________________________________________________________________________________
Provide the following information for each department that uses the application:
Department name
If down-time procedures exist for manual processing
If a training program for down-time procedures exist
Number of days the department can function without this application
Additional resources required for manual processing (i.e. personnel, equipment, etc.)
YES YES
NO NO
YES YES
NO NO
YES YES
NO NO
YES YES
NO NO
YES YES
NO NO
YES YES
NO NO
YES YES
NO NO
Processing Information
What is the estimated volume of transactions processed by this application (example: 10,000 transactions per hour)
____________________________________________________________________________________________
Is this a batch, on-line real time, and/or internet application? Batch On-Line Internet
If application processes in batch mode, what is the length of processing time per batch?
Average:
Maximum:
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
Does the application have a standard scheduled run-time.? If so, when (i.e. 1st Saturday of the month at 3:00 p.m.):
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
Provide the following information for each application and file server:
Host name
IP address and mask for the server
Administrative contact for the server and security contact (i.e. primary user or department head name and phone number)
User Types
Operating system including version number
Application Software including version number
Review status (Yes/No, Date. Reviewer)
Connectivity (Internet, Intranet, modem In, modem out, other
Physical location (Address / phone number for contact
Comments: __________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
Historical Information
Has this application had processing problems in the last twelve months?
____________________________________________________________________________________________
____________________________________________________________________________________________
What was the impact of this down-time (example: loss of patients, delay in sending bills etc.)?
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
What additional resources did the departments need (example: additional temporary people to clear backlog):
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
___________________________________________________________________________________________
___________________________________________________________________________________________
(Note: This segment of information would be helpful if provided by each user department)
Please provide on this form or attach a list of relevant files associated with this application with locations:
Include:
Database / Filename
Job Procedures and Job Control enterprise
Source enterprise
Object enterprise
Data enterprise
Disk pack
Drive
Other
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
Documentation
Security
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
Resource Usage
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
How many workstations (A) does each department have that can access this application:
What is the minimum number of workstations (B) that each department will need in the event of a disaster:
Backups
How often this application is Backed-Up (daily, weekly, monthly, and yearly, etc.):
____________________________________________________________________________________________
____________________________________________________________________________________________
Where are the Backups stored (example: fire-proof vault on premises, off-site, etc.):
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
Product/Service:
Customer Name:
Street Address:
City/State/Zip:
Contact Person: Phone No.:
24 Hour No.:
Alternate Contact: FAX No.:
Other No.:
Comments:
Product/Service:
Customer/Client Name:
Street Address:
City/State/Zip:
Contact Person: Phone No.:
24 Hour No.:
Alternate Contact: FAX No.:
Other No.:
Comments:
Product/Service:
Customer/Client Name:
Street Address:
City/State/Zip:
Contact Person: Phone No.:
24 Hour No.:
Alternate Contact: FAX No.:
Other No.
Comments:
Product/Service:
Customer/Client Name:
Street Address:
City/State/Zip:
Contact Person: Phone No.:
24 Hour No.:
Alternate Contact: FAX No.:
Other No.
Comments:
Staff
Area size
Desks
Chairs
Telephones
Faxes
PCs
Printers
(Other)
List only the increased amounts in each column. For example the team needs 35 people over all. They assign
15 at the 24 hours slot, another 5 in the 48 hours slot and 15 more in the 72 hours slot.
Following the incident, if authorities and your facilities staff determine your affected building is safe to enter,
you might be allowed into your building for a short time. This could be for as little as 15 minutes or one half-
hour. Create a list of the critical items that you would need to retrieve if you could get into your building. This
assumes, of course, that the items are salvageable.
Some examples of items you might need to retrieve include: computer disks, computers, selected paper files
and work in process.
Examples of items that you should not list include: family pictures, unimportant files and information that are
duplicated somewhere else.
Note: Use this form to document the materials that should be retrieved if you are able to enter your facility
following the incident and the items are not badly damaged.
EQUIPMENT:
OTHER:
Copies of critical documents, computer/PC backup floppies and tapes, critical supplies etc. may be available
from a number of sources:
Other ENTERPRISE facilities may have similar resources or copies of critical documents.
Clients or contractors may have copies of critical documents.
Commercial storage facilities will usually pick up backup tapes and documents and store them in a
climate controlled and secure area.
Recovery Box
Create a “Recovery Box” for your business unit. This Recovery Box could contain specific items that the
business unit would need if the building were not accessible. Some items that could be contained in this box
include:
This box must, of course, be stored at an off-site location. The box and an inventory listing of its contents are
both critical records and should be documented as such.
Recovery Boxes
Function:
Storage Location:
Contact Name:
Box Identification:
Contents Comments
Box Identification:
Contents Comments
Below are a set of tasks that can be used to create a work plan to implement the Disaster Recovery
Planning process as defined in this template31. Each of the tasks should have an individual or
steering committee member assigned to the task along with start date, end date and deliverable
defined. For example, a deliverable for a status meeting could be defined as approved minutes of the
meeting and the deliverable for a function assessment could be a completed Application Inventory
and Business Impact Questionnaire for the function (see page 143).
31
An Excel spreadsheet that comes with this document that can be use for the actual planning and reporting process.
Version 5.0 CONFIDENTIAL Page 167
Enterprise logo here
Project Initiation
Project Scheduling
Initial Implementation
Post Implementation
1. Conduct test
Deliverable - Test completion confirmation
2. Review results with steering committee and external entities
Deliverable - Steering Committee minutes
3. Document results and actions taken
Deliverable - Disaster Recovery Plan - Test Results
Documentation
4. Modify plan as necessary
Deliverable - Disaster Recovery Plan Document version 1.1
5. Create procedures to maintain plan
Deliverable - Disaster Recovery Plan Document version 1.2
6. Schedule future test
Deliverable - Test Schedule
7. Create a training program for ENTERPRISE employees, vendors and
suppliers
Deliverable - Training Program Syllabus and Training Schedule
While dry runs are indispensable for testing a disaster recovery plan, by their nature they
are not comprehensive because they do not exercise every contingency in the plan. A
disaster recovery audit, by contrast, attempts to check all the contingencies. An audit
doesn't have the training value of a disaster recovery exercise, but it should provide a
broader check of the plan's workability and value. This is particularly important when
you have an outside vendor in the picture, because you want to make sure the outside
vendor is properly backed up and secured.
The audit process focuses on the guidelines, which incorporate industry best practices, for
critical business units including
Audit Program
Audit Program Overview
Adequate plans should exist for the routine backup of critical data, programs,
documentation, and personnel and for the recovery of these items after an
interruption of processing.
A written plan for resuming information processing activities in the event of a
disaster should be developed and periodically tested. An arrangement for an
alternate site is needed in the event the computer facility is inoperable or
destroyed in a disaster.
The ENTERPRISE intends to distribute this survey to all key vendors and business partners used by
groups within ENTERPRISE, who are critical to the operational readiness of ENTERPRISE. It is
anticipated some vendors and business partners will opt not to complete this survey. In these
instances, we may extend an invitation to those vendors to address key questions outlined in the
survey by giving a presentation to members of the ENTERPRISE Task Force, individual business
groups and/or other support groups as needed.
A cover letter should be sent to each vendor/partner requesting that they complete the questionnaire
and return it as soon as possible.
Name: ____________________________________________________________________
Address: _______________________________________________________________
City/State/Zip/Country: ____________________________________________________
Main Phone Number: ____________________________________________________
Description of relationship: ____________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
0 – 4 hours _____
5 If you answered “Yes” to Question (4), 4 – 8 hours _____
what is the expected recovery time for Within one day _____
your critical business functions? 1 – 2 days _____
More than 2 days _____
Other (please specify) _____
N/A _____
Crisis Communication
Backup Facilities
Testing
3 Do you have DRP and BCP test dates Yes ________ or No ________
scheduled over the next 12-18 months?
Testing (cont’d)
3 Has your DRP and BCP been activated in Yes ________ or No ________
the last 24 months?
Use employee contact list (attach local list to the back of the plan) to notify
appropriate additional personnel to:
Proceed to Assembly Site
If appropriate, bring resumption plan
If appropriate, be prepared to travel
Bring ID Badge(s)
Bring pertinent resources from home or off-site
DO NOT TALK TO THE NEWS MEDIA
If Assembly Site is not the Work area instruct appropriate staff to report to the Work
area
(Name) _____________________________________________________________
Home: Date/Time:
Cell phone: Pager: Status:
For Emergency:
Contact: Relation: Phone:
(Name) _____________________________________________________________
Home: Date/Time:
Cell phone: Pager: Status:
For Emergency:
Contact: Relation: Phone
(Name) _____________________________________________________________
Home: Date/Time:
Cell phone: Pager: Status:
For Emergency:
Contact: Relation: Phone:
(Name) _____________________________________________________________
Home: Date/Time:
Cell phone: Pager: Status:
For Emergency:
Contact: Relation: Phone
(Name) _____________________________________________________________
Home: Date/Time:
Cell phone: Pager: Status:
For Emergency:
Contact: Relation: Phone:
Record the date and time that each person was notified or last attempt made. Add the contact
status BSY-Busy, NA-No Answer, PNA Person-not Available.
After the team notification has been completed. This checklist should be given to the Emergency
Operations Center staff or Emergency Management Team.
Team Responsibilities
When notified by the Emergency Management Team that the Disaster Recovery Plan and Business Resumption
Plan (BRP) has been activated, the primary responsibilities of the team will be to use their resources to support
the corporate recovery effort and to activate their Recovery procedures.
General
The Primary responsibility of the Team Leader is to provide leadership of the recovery team and coordinate
support for the recovery effort. Other responsibilities include:
Critical Functions
______ ___________________________________________
______ ___________________________________________
______ ___________________________________________
* Recovery Time Objective (Amount of down time before outage threatens the survival of the
ENTERPRISE. RTO is determined by Senior Executives)
During an emergency that happens during normal business hours, follow the corporate emergency procedures to
ensure the life and safety of all employees.
If the building is not accessible, the team personnel should assemble at:
- Primary site :
- Alternate site:
1. Take a head count to make sure all team members are safe and available. Notify the
Emergency Management Team immediately if anyone is missing.
3. Record all the information and instructions given by the Emergency Management Team. Use the Notification
Checklist located in this section as a guideline and work paper.
4. Before contacting anyone else review the Notification Procedure located in this section.
5. Notify department personnel not already notified. Use the Notification Call List located in this section; it
contains a list of who to call and what information to pass on.
6. If instructed by the Emergency Management Team, activate the Recovery procedures are located in this
section.
When notified by the Emergency Management Team that the Business Resumption Plan has been activated, the
team leader will:
1. Record all the information and instructions given by the Emergency Management Team. Use the Notification
Checklist located in this section as a guideline and work paper.
2. Before contacting anyone else review the Notification Procedure located in this section
3. You may be instructed to only notify your alternate team leader, your entire team or as many department
personnel as possible. Use the Team Alert List located in the front of the plan or the Employee Call List
located in the back of the plan. Record the status of all notifications and give the completed call list to the
team leader.
4. If instructed by the Emergency Management Team, report to the Emergency Operations Center.
5. If instructed by the Emergency Management Team to activate your Recovery Team, procedures are located in this
section.
6. When you activate your team, have them meet you at the primary or alternate meeting place listed below.
Primary Location
Facility Name:
Street Address: Floor:
City/State/Zip:
Contact Person: Phone No:
24 Hour No:
Alternate Contact: FAX No:
Other No.:
Security Considerations:
Alternate Location
Facility Name:
Street Address: Floor:
City/State/Zip:
Contact Person: Phone No:
24 Hour No:
Alternate Contact: FAX No:
Other No.:
Security Considerations:
Team Recovery
The team leader should ensure that sufficient copies of the Business Resumption Plan are available.
Notifications
Provide notification of the problem to vendors. The information provided should be reviewed with the
Emergency Management Team before calling.
Departmental Meeting:
Key department personnel should meet to determine actions to be taken and establish the
priority of restoring business functions based on the work area and resources available. The
department leader should explain the goals and objectives identified by the Emergency
Management Team.
Review tasks to be performed and assign personnel.
Personnel should be assigned to contact vendors and advise them about the situation and
when they can expect service to be restored. Use the Vendor Notification in the appendix for
contact information.
Determine if some personnel will have to travel to the business recovery site.
Distribute copies of any forms that will be needed during the recovery operation.
Distribute copies of the news media statement that has been prepared. Copies can be obtained
from the Emergency Management Team. Instruct everyone not to makes statements to the
news media.
Personnel should be assigned to provide recovery support needed by other teams, as needed.
Version 5.0 CONFIDENTIAL Page 194
Enterprise logo here
ENTERPRISE
Department DRP and BCP Activation Workbook
Status Report
The department leader should prepare written status reports frequently for the Emergency Management
Team to keep them apprised of the current situation. Use the Status Report Form that is at the end of
the.
Travel Arrangements
The department leader can get assistance for any team travel arrangements from the Administrative
Support Team. This includes travel needs either inside of or out of the metro area.
Notification
Notification Checklist
When notified by the Emergency Management Team that the Business Resumption Plan (BRP) has been activated,
the team leader or alternate should record the following information that will be passed along to department
personnel:
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
6. If the facility cannot be entered, the location that the team should use for a work area or meeting place:
____________________________________________________________________
Notification Procedure
The team leader, alternate or assigned individual upon activation of the Business Resumption Plan will contact
team personnel using the following procedure:
During notifications of an alert or declared disaster, use this procedure to alert all personnel. Read the procedures
thoroughly prior to making a call. By using the following instructions, you will not unnecessarily alarm family members of an
employee who was working at the affected site at the time of the disaster.
3. If contact is made with an answering machine: Make no statement regarding the situation.
Provide the phone number to call at Emergency Operations Center; ask that the employee make contact at that
number as soon as possible.
Record the information in the contact status column.
4. If no answer:
Record the information in the contact status column.
Using the team member contact list in the front of the plan, the team leader, alternate or assigned individual
should convey the following information when contacting the team personnel:
All callers should record status of everyone they call, noting the time the call was placed and whether the person
was contacted. Make a reasonable number of attempts if the phone was busy or there was no answer. Forward
the completed list to the EOC and the staff will continue to attempt to contact team members.
Date Submitted:
Recovery Task
Task Manager
Report Period
Report Prepared By
Planned Activities for the Period
Comments
Contact: __________________________________
Phone: __________________________________
Address: __________________________________
__________________________________
__________________________________
Password: ____________________________
Password: ____________________________
Backup Site
Contact: __________________________________
Phone: __________________________________
Address: __________________________________
__________________________________
__________________________________
Password: ____________________________
Address: ____-____-____-____
Password: ____________________________
Name: ______________________________
Contact: __________________________________
Phone: __________________________________
Address: __________________________________
__________________________________
__________________________________
Password: ____________________________
Address: ____-____-____-____
Password: ____________________________
Name: ______________________________
1. Site Strategy section added (Section 3.1) all other section numbers in Chapter 3 were
increased to adjust for this modification.
2. Audit Disaster Recovery Plan Process added (Section 8.13)
3. Manager Disaster Recovery and Business Continuity job description added
4. Entire template reviewed to validate compliance with Sarbanes-Oxley
If you have any suggestions please forward them to [email protected] or contact us directly via phone at 435 940-9300
Janco Associates, Inc. provides the licensed user of the Disaster Recovery Plan
document the right to use this document for INTERNAL USE ONLY for the enterprise
of this user only. If the licensed user is a consultant or consulting entity, using this
document for a third party (client or customer of the licensed user), a separate
license must be purchased for each client facility and or customer location.
All questions about this via email at [email protected] or by phone at
435-940-9300.
The single user license is for one enterprise for one facility. If this template is used
for more than one facility than either an enterprise version or multiple copies of the
template should be purchased.
Any document that is created using this template must have © 2001-2008
copyright Janco Associates, Inc within the new document. All of this original
material remains the property of Janco Associates, Inc. and the user is granted a
limited use license.
License Conditions
This product is NOT FOR RESALE or REDISTRIBUTION in any physical or electronic format. The purchaser of
this template has acquired the rights to use it for a SINGLE Disaster Recovery Plan unless the user has purchased a
multi-use license. Anyone who makes an unlicensed copy of or uses the template or any derivative of it is in
violation of United States and International copyright laws and subject to fines that are treble damages as determined
by the courts. A REWARD of up to 1/3 of those fines will be paid to anyone reporting such a violation upon the
successful prosecution of such violators.
The purchaser agrees that derivative of this template will contain the following words within the first five pages of
that document. The words are:
Derived from the Disaster Recovery Plan Template of Janco Associates, Inc.
© 2001 - 2008 Copyright Janco Associates, Inc. – ALL RIGHTS RESERVED
All Rights Reserved. No part of this book may be reproduced by any means without the prior written permission of
the publisher. No reproduction or derivation of this book shall be re-sold or given away without royalties being paid
to the authors. All other publisher’s rights under the copyright laws will be strictly enforced.
Published by:
435 940-9300
e-mail - [email protected]