DRP / BCP Audit ProgramDisaster Recovery
Business Continuity Audit Program

ISO 28000 - 27001 - 27002 -22301
HIPAA - SOX - PCI-DSS Compliant Includes BYOD and Mobile Devices - IoT

Order DRP Audit ProgramAudit Program Version HistoryDownload Selected Pages DRP Audit Program

Janco has found that less than 40% of all Disaster Recovery Business Continuity Plans are without a major defect

This Disaster Recovery / Business Continuity Audit program identifies control objectives that are meet by the audit program. There are approximately 50 specific items that the audit covers in the 17 page audit program.  Included are references to specific Janco products that will assist you in addressing any defects or shortcoming the audit uncovers.  

This DR/BC Audit program is the right tool to see that the plans that in place work.

Why DR and BC plans fail

This program can be used as standalone audit program or in concert with the following Janco offerings:

ISO Compliance Plan Act Do Process

The Disaster Recovery / Business Continuity Audit program covers the following control objectives are:

  • Ensure that adequate and effective contingency plans have been established to support the prompt recovery of crucial enterprise functions and IT facilities in the event of major failure or disaster;
  • Ensure that all mandated disaster recovery, business continuity, and security requirements have adequate compliance policies and procedures in place;
  • Ensure the survival of the business and to minimize the implications of a major enterprise and/or I T failure;
  • Ensure that all the potential risks to the enterprise and its IT facilities are identified and assessed in preparation of the contingency plans;
  • Ensure the optimum contingency arrangements are selected and cost effectively provided;
  • Ensure that an authorized and documented disaster recovery / business continuity plan is created, maintained up-to-date, and securely stored;
  • Ensure that the recovery plan is periodically tested for its relevance and effectiveness;
  • Ensure that all internal and external parties to the recovery process are fully aware of their responsibilities and commitments;
  • Ensure that appropriate liaison is maintained with external parties (i.e. insurers, emergency services, suppliers, etc. );
  • Ensure that both the damaged and recovery sites are secure and that systems are securely operated in support of the enterprise;
  • Ensure that systems and procedures are adequately and accurately documented to aid the recovery process; and
  • Ensure that public and media relations would be effectively addressed during an emergency in order to minimize adverse publicity and business implications.

Included with this program area Microsoft (.docx format) Word Document and an a PDF version of the Audit Program.

Order DRP Audit ProgramDownload Selected Pages  DRP Audit Program

See also Rating Disaster Recovery Risk

DRP BCP AuditDR/BC Audit Program

  • Comes in MS WORD format and PDF
  • Meets ISO 27001, 27002, 27031, 28000, Sarbanes-Oxley, PCI-DSS, FIPS-199, and HIPAA requirements
  • Includes BYOD and other mobile devices
  • Approximately 50 specific items that the audit covers in theĀ 17 page audit program

Disaster Recovery Business ContinuityDisaster Recovery Business Continuity Standard Edition

Disaster Recovery Business Continuity Template (WORD) - comes with the latest electronic forms and is fully compliant with all mandated US, EU, and ISO requirements.

  • Fully editable Disaster Recovery Business Continuit template
  • Disaster Recovery Business Continuity Audit Program - Compliant with ISO 27031,  ISO 22301, and ISO 28000
  • Disaster Recovery Manager Job Description
  • Manager Disaster Recovery & Business Continuity Job Description
  • Application Inventory and Business Impact Analysis Questionnaire
  • Incident Communication Plan and Policy with BEST PRACTICES for
    • News Conferences
    • Media Relations
  • Social Network Checklist
  • Included with the template are Electronic Forms which have been designed to lower the cost of maintenance of the plan. Electronic Forms that can be e-mailed, completed via a computer or tablet, and stored electronically including:
    • LAN Inventory, Location Contact Numbers, Off-Site Inventory, Personnel Locations, Plan Distribution, Remote Location Contact Information, Server Registration, Team Call List, and Vendor Contact Information
    • Added Bonus - Safety Program Electronic Forms -- Area Safety Inspection, Employee Job Hazard Analysis, First Report of Injury, Inspection Checklist - Alternative Locations, Inspection Checklist - Office Locations, New Employee Safety Checklist, Safety Program Contact List, and Training Record
Order DRP BCP TemplateDownload DRP BCP Selected Pages

DRP BCP Sample Audit ProgramDisaser Recovery Business Contininty and Security Audit Bundle

  • Disaster Recovery Business Continuity Template
  • Security Manual Template
  • Disaster Recovery Business Continuity Audit Program
  • Security Audit Program




Security Audit ProgramSecurity Audit Program

  • Comes in MS EXCEL and PDF formats
  • Meets ISO 28000, 27001, 27002, Sarbanes-Oxley, PCI-DSS and HIPAA requirements
  • Over 400 unique tasks divided into 11 areas of audit focus which are the divided into 39 separate task groupings including BYOD

Over 3,000 enterprises from around the world have chosen at least one of Janco's products. The Security Audit program is a must have tool that not only assists in meeting compliance requirements but also is a great way to validate that your enterprise is ready for your next external audit.

Security Manual Template - Standard Edition

Security Manual TemplateSecurity Manual Template

  • Business and IT Impact Questionnaire
  • Threat and Vulnerability Assessment Toolkit
  • Security Management Checklist
  • Full Detail Policies for
    • Blog and Personal Website Policy
    • Mobile Device Policy
    • Physical and Virtural File Server Policy
    • Sensitive Information Policy
    • Travel and Off-Site Meeting Policy
  • HIPAA Audit Program
  • Sarbanes Oxley Section 404 Checklist
  • Security Audit Program- fully editable -- Comes in MS EXCEL and PDF formats -- Meets ISO 28000, 27001, 27002, Sarbanes-Oxley, PCI-DSS, HIPAA FIPS 199, and NIS SP 800-53 requirements -- Over 400 unique tasks divided into 11 areas of audit focus which are the divided into 38 separate task groupings
  • Electronic forms that can be Emailed, completed via a computer or tablet, and stored electronically including: Blog Policy Compliance, BYOD Access and Use, Company Asset Employee Control Log, Email - Employee Acknowledgment, Employee Termination Checklist, FIPS 199 Assessment Electronic Form, Internet Access Request, Internet Use Approval, Internet & Electronic Communication - Employee Acknowledgment, Mobile Device Access and Use Agreement, Employee Security Acknowledgement Release, Preliminary Security Audit Checklist, Risk Assessment, Security Access Application, Security Audit Report, Security Violation Reporting, Sensitive Information Policy Compliance Agreement, Server Registration, and Threat and Vulnerability Assessment
  • eReader version of the Security Manual Template
Order Security ManualDownload Security Table of Contents