Disaster Recovery Business Continuity Rating Risk

ITIL Framework to Rate Risk 

Order DRP Audit ProgramAudit Program VersionsDownload Audit Program Sample

Janco has found that over 30% of all Disaster Recovery Business Continuity Plans are in-complete or in-accurate

The typical organization has hundreds of applications all at different recoverability capability.  For example some have no plan, some have out of region architectures some have not exercised in long time and some are in great shape testing every quarter.

All of the applications need to be categorizing them so that the Disaster Planning Team can start remediating the ones that place the enterprise at the most risk to the business from both a compliance and readiness perspective.

Using the ITIL framework, you can weigh each Critical Success Factor (CSF) and scoring their Key Performance Indicators (KPI). That allows you to create a rating system and developing a score card report by tiers.

Weighting Critical Success Factors

Examples

  • 6 = Critical to success of recovery
  • 3 = Required for timely recovery (could recover without but risk is increased)
  • 1 = Needed to support recovery but only minimal impact on recovery efforts

Scoring of Key Performance Indicators

Examples

  • Not in place or not implemented = 0
  • Completed but past the KPI deadline, not accurate or incomplete = 1
  • In place or completed on time = 3
  • Final rating for each CSF and the associated KPI multiply the weight of the CSF by the score of the KPI

Critical Success Factors/Key Performance Indicators Examples:

  • CSF: Conduct exercise at alternate facility (Weight 6)
    • KPI = Conduct an annual exercise alternate facility
  • CSF: Update BCP Plans (Weight 3)
    • KPI = Update BCP plans by <insert date> each year
  • CSF: Conduct Annual Tabletop of recovery Plan (Weight 3)
    • KPI = Conduct at least 1 annual tabletop of BCP plans by December

 

Order DRP Audit ProgramDownload Audit Program Sample

 

DRP BCP Sample Audit ProgramDisaser Recovery Business Contininty and Security Audit Bundle

  • Disaster Recovery Business Continuity Template
  • Security Manual Template
  • Disaster Recovery Business Continuity Audit Program
  • Security Audit Program




Security Audit ProgramSecurity Audit Program

  • Comes in MS EXCEL and PDF formats
  • Meets ISO 28000, 27001, 27002, Sarbanes-Oxley, PCI-DSS and HIPAA requirements
  • Over 400 unique tasks divided into 11 areas of audit focus which are the divided into 39 separate task groupings including BYOD

Over 3,000 enterprises from around the world have chosen at least one of Janco's products.  The Security Audit program is a must have tool that not only assists in meeting compliance requirements but also is a great way to validate that your enterprise is ready for your next external audit.

DRP BCP AuditDisaster Recovery Business Continuity Audit Program

  • Comes in MS WORD format and PDF
  • Meets ISO 27001, 27002, 27031, 28000, Sarbanes-Oxley, PCI-DSS, FIPS-199, and HIPAA requirements
  • 38 specific items that the audit covers in the 13 page audit program

Security Manual Template - Standard Edition

Security Manual Template

  • Business and IT Impact Questionnaire
  • Threat and Vulnerability Assessment Toolkit
  • Security Management Checklist
  • HIPAA Audit Program
  • Sarbanes Oxley Section 404 Checklist
  • Security Audit Program- fully editable -- Comes in MS EXCEL and PDF formats -- Meets ISO 28000, 27001, 27002, Sarbanes-Oxley, PCI-DSS, HIPAA FIPS 199, and NIS SP 800-53 requirements -- Over 400 unique tasks divided into 11 areas of audit focus which are the divided into 38 separate task groupings
  • Electronic forms that can be Emailed, completed via a computer or tablet, and stored electronically including: Blog Policy Compliance, BYOD Access and Use, Company Asset Employee Control Log, Email - Employee Acknowledgment, Employee Termination Checklist, FIPS 199 Assessment Electronic Form, Internet Access Request, Internet Use Approval, Internet & Electronic Communication - Employee Acknowledgment, Mobile Device Access and Use Agreement, Employee Security Acknowledgement Release, Preliminary Security Audit Checklist, Security Access Application, Security Audit Report, Security Violation Reporting, Sensitive Information Policy Compliance Agreement, Server Registration, and Threat and Vulnerability Assessment (Adobe FormsCentral - PDF)
Order Security ManualSample DRP

Disaster Recovery Business ContinuityDisaster Recovery Business Continuity Standard Edition

Disaster Recovery Business Continuity Template (WORD)

  • Disaster Recovery Business Continuity Audit Program - Compliant with ISO 27031,  ISO 22301, and ISO 28000
  • Disaster Recovery Manager Job Description
  • Manager Disaster Recovery & Business Continuity Job Description
  • Application Inventory and Business Impact Analysis Questionnaire
  • Incident Communication Plan and Policy with BEST PRACTICES for
    • News Conferences
    • Media Relations
  • Social Network Checklist
  • Included with the template are Electronic Forms which have been designed to lower the cost of maintenance of the plan. Electronic Forms that can be e-mailed, completed via a computer or tablet, and stored electronically including:
    • LAN Inventory, Location Contact Numbers, Off-Site Inventory, Personnel Locations, Plan Distribution, Remote Location Contact Information, Server Registration Just Added, Team Call List, and Vendor Contact Information
    • Added Bonus - Safety Program Electronic Forms -- Area Safety Inspection, Employee Job Hazard Analysis, First Report of Injury, Inspection Checklist – Alternative Locations, Inspection Checklist – Office Locations, New Employee Safety Checklist, Safety Program Contact List, and Training Record
 Order Disaster Plan TemplateDisaster Plan Sample

 

 

Disaster Planning Security Policies Procedures Job Descriptions IT Infrastructure, Strategy, & Charter Template IT Salary Survey DRP Security