Menu

Business Continuity Audit

Business continuity 

 

 

The Secure Online Desktop S.r.l. is able to carry out Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) audit projects in order to verify their correct drafting and implementation. These audits may be necessary both for external verification of internal IT processes and for supplier control in case of IT outsourcing.

 

BUSINESS CONTINUITY PLAN / DISASTER RECOVERY PLAN PROCEDURE VERIFICATION

 

After analyzing the documentation provided by the client or his supplier and following the real needs, the actions that are recommended to comply with the corporate security policies and the minimum pre-requisites that these activities must meet are listed. In this phase, the RPO and RTO are also verified in such a way that they comply with what is specified in the policies or in the supply contract (in case of outsourcers).

Findings are listed and described in order to examine any countermeasures.

 

COUNTERMEASURES AND IMPROVEMENTS

For identified and marked locations one or more possible countermeasures are provided. This information makes it possible to intervene on the correction of the BCPs / DRPs and on the relative business processes, they provide the guidelines that the IT staff will have to follow for the adaptation.

 

RECIPIENTS

An audit (audit) of the BCP and DRP plans is necessary for all those companies that want an external verification from a third party of their Business Continuity plans in order to identify any problems and to improve their quality. The Audit process is not limited to the documentary verification of the BCPs and DRPs, but also technically verifies that the technological solutions declared in the documentation are actually in operation and that they are functioning correctly. It is not uncommon, in the face of a “disaster”, to note that although the DRP plan provides a DR (Disaster Recovery) procedure this did not work as expected and that the same has never been verified with the execution regular and program verification plans.

 

Contact us

Please follow and like us:

Project Date

Customers

Twitter FEED

Recent activity
  • SecureOnlineDesktop

    The security of computer networks is of vital importance for a company. With technologies increasingly relying on r… https://t.co/Zbaf4mL1D5

  • SecureOnlineDesktop

    La sicurezza delle reti informatiche e' di vitale importanza per un'azienda. Con le tecnologie che fanno sempre piu… https://t.co/NJWcr9rpnz

  • SecureOnlineDesktop

    Small and medium-sized businesses have little room for maneuver when it comes to investment. Precisely for this rea… https://t.co/L675M5UWhz

  • SecureOnlineDesktop

    Piccole e medie imprese hanno poco spazio di manovra quando si parla di investimenti. Proprio per questo, ogni pass… https://t.co/y8Ft5SHW4x

  • SecureOnlineDesktop

    In the IT development process, sooner or later we come across API services, which stands for Application Programmin… https://t.co/WOKfe487af

Newsletter

    Swite Tumblr

406