Chap6 2007 C I S A Review Course


Published on

Published in: Business, Technology
1 Comment
1 Like
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Chap6 2007 C I S A Review Course

    1. 1. 2007 CISA  Review Course Business Continuity and Disaster Recovery Chapter 6
    2. 2. Process Area Overview <ul><ul><li>Business Continuity/Disaster Recovery Planning </li></ul></ul><ul><ul><ul><li>IS Business Continuity/Disaster Recovery Planning </li></ul></ul></ul><ul><ul><ul><li>Disasters and Other Disruptive Events </li></ul></ul></ul><ul><ul><ul><li>BCP Process </li></ul></ul></ul><ul><ul><ul><li>Business Continuity and Disaster Recovery Policy </li></ul></ul></ul><ul><ul><ul><li>BCP Incident Management </li></ul></ul></ul><ul><ul><ul><li>Business Impact Analysis </li></ul></ul></ul><ul><ul><ul><li>Recovery Point Objective and Recovery Time Objective </li></ul></ul></ul><ul><ul><ul><li>Recovery Strategies </li></ul></ul></ul><ul><ul><ul><li>Recovery Alternatives </li></ul></ul></ul>
    3. 3. Process Area Overview <ul><ul><li>Business Continuity/Disaster Recovery Planning (cont) </li></ul></ul><ul><ul><ul><li>Development of Business Continuity and Disaster Recovery Plans </li></ul></ul></ul><ul><ul><ul><li>Organization and Assignment of Responsibilities </li></ul></ul></ul><ul><ul><ul><li>Other Issues in Plan Development </li></ul></ul></ul><ul><ul><ul><li>Components of a BCP </li></ul></ul></ul><ul><ul><ul><li>Plan Testing </li></ul></ul></ul><ul><ul><ul><li>Backup and Restoration </li></ul></ul></ul>
    4. 4. Process Area Overview <ul><ul><li>Auditing Disaster Recovery and Business Continuity </li></ul></ul><ul><ul><ul><li>Reviewing the BCP </li></ul></ul></ul><ul><ul><ul><li>Evaluation of Prior Test Results </li></ul></ul></ul><ul><ul><ul><li>Evaluation of Offsite Storage </li></ul></ul></ul><ul><ul><ul><li>Interviewing Key Personnel </li></ul></ul></ul><ul><ul><ul><li>Evaluation of Security at Offsite Facility </li></ul></ul></ul><ul><ul><ul><li>Reviewing Alternative Processing Contract </li></ul></ul></ul><ul><ul><ul><li>Reviewing Insurance Coverage </li></ul></ul></ul>
    5. 5. Chapter Objective <ul><li>Ensure that the IS Auditor </li></ul><ul><li>“ understands and can provide assurance that in the event of a </li></ul><ul><li>disruption the business continuity and disaster recovery processes will ensure the timely resumption of IT services while minimizing the business impact” </li></ul>
    6. 6. <ul><li>There are three (3) tasks within this content area: </li></ul><ul><ul><li>1. Evaluate the adequacy of backup and restore provisions to ensure the availability of information required to resume processing. </li></ul></ul><ul><ul><li>2. Evaluate the organization’s disaster recovery plan to ensure that it enables the recovery of IT processing capabilities in the event of a disaster. </li></ul></ul><ul><ul><li>3. Evaluate the organization’s business continuity plan to ensure its ability to continue essential business operations during the period of an IT disruption.  </li></ul></ul>Chapter Objective
    7. 7. Chapter Summary <ul><li>According to the CISA Certification Board, this Content Area will represent approximately 14% of the CISA examination (approximately 28 questions) </li></ul>
    8. 8. 6.1 Business Continuity / Disaster Recovery Planning <ul><li>Corporate risks could cause an organization to suffer: </li></ul><ul><ul><li>Inability to maintain critical customer services </li></ul></ul><ul><ul><li>Damage to market share, reputation or brand </li></ul></ul><ul><ul><li>Failure to protect the company assets including intellectual properties and personnel </li></ul></ul><ul><ul><li>Business control failure </li></ul></ul><ul><ul><li>Failure to meet legal or regulatory requirements </li></ul></ul><ul><li>Business continuity planning (BCP) is a process designed to reduce the organization’s business risk </li></ul><ul><li>A BCP is much more than just a plan for the information systems </li></ul>
    9. 9. <ul><li>Business’ Ability to Continue Operations requires: </li></ul><ul><ul><li>Rigorous planning & commitment of resources </li></ul></ul><ul><ul><li>Risk assessment to identify critical business processes </li></ul></ul><ul><ul><li>Reduction of risk for unexpected disruption to critical functions </li></ul></ul><ul><ul><li>Assure continuity of minimum level of service for critical operations </li></ul></ul><ul><ul><li>Responsibility of senior management </li></ul></ul><ul><ul><li>Address all functions & assets to continue as viable organization </li></ul></ul>6.1 Business Continuity / Disaster Recovery Planning
    10. 10. <ul><li>IS BCP/DRP is a component of the overall Business Continuity and Disaster Recovery strategy </li></ul><ul><li>Imperative to have a ready-to-start reserved facility </li></ul><ul><li>IS plan must support the corporate BCP </li></ul>6.1.1 IS Business Continuity / Disaster Recovery Planning
    11. 11. 6.1.2 Disasters and other Disruptive Events <ul><li>Disasters </li></ul><ul><ul><li>Disrupt the operation of critical information processing </li></ul></ul><ul><ul><li>Adversely impact business operations </li></ul></ul><ul><li>Not all disruptions are disasters </li></ul><ul><li>Causes of service disruption </li></ul><ul><ul><li>Natural </li></ul></ul><ul><ul><li>Expected services no longer supplied </li></ul></ul><ul><li>BCP must take into account all types of events impacting IS processing facilities and end users functionality </li></ul>
    12. 12. <ul><li>Phases of the Business Continuity Planning Process </li></ul><ul><ul><li>Creation of a business continuity and disaster recovery policy </li></ul></ul><ul><ul><li>Business impact analysis </li></ul></ul><ul><ul><li>Classification of operations and criticality analysis </li></ul></ul><ul><ul><li>Development of a business continuity plan and disaster recovery procedures </li></ul></ul><ul><ul><li>Training and awareness program </li></ul></ul><ul><ul><li>Testing and implementation of plan </li></ul></ul><ul><ul><li>Monitoring </li></ul></ul>6.1.3 BCP Process
    13. 13. 6.1.4 Business Continuity and Disaster Recovery Policy <ul><li>Policies need to be proactive and encompass preventative, detective and corrective controls </li></ul><ul><li>BCP is the most critical corrective control </li></ul><ul><li>BCP needs to be well designed, documented, drill tested, funded and audited </li></ul><ul><li>Incident management group needs to be adequately staffed, supported and trained </li></ul>
    14. 14. 6.1.5 BCP Incident Management <ul><li>The management of incidents need be dynamic, proactive and documented </li></ul><ul><li>All types of incidents need to be categorized </li></ul><ul><ul><li>negligible: causing no significant damage </li></ul></ul><ul><ul><li>minor: produce no negative material or financial impact </li></ul></ul><ul><ul><li>major: cause negative material impact on business processes </li></ul></ul><ul><ul><li>crisis: serious material impact on the functioning of the business </li></ul></ul>
    15. 15. 6.1.5 BCP Incident Management <ul><li>Minor, major and crisis incidents must be documented, classified and revisted until corrected or resolved </li></ul><ul><li>The SO should be notified of all incidents as soon as the trigger occurs. This will allow for a pre-established protocol to be followed. </li></ul><ul><li>Service downtime determines the incident severity </li></ul><ul><li>The severity should be reevaluated regularly </li></ul>
    16. 16. 6.1.6 Business Impact Analysis (BIA) <ul><li>Identifying the various events that could impact the continuity of operations and their impact on the organization </li></ul><ul><li>Issues to consider for BIA </li></ul><ul><ul><li>Different business processes </li></ul></ul><ul><ul><li>Critical information resources related to critical business processes </li></ul></ul><ul><ul><li>Critical recovery time period before significant losses are incurred </li></ul></ul><ul><ul><li>Systems risk ranking </li></ul></ul>
    17. 17. 6.1.7 Recovery Point Objective and Recovery Time Objective <ul><li>Recovery Point Objective (RPO) </li></ul><ul><ul><li>based on acceptable data loss </li></ul></ul><ul><ul><li>indicates earliest point in time in which it is acceptable to recover the data </li></ul></ul><ul><li>Recovery Time Objective (RTO) </li></ul><ul><ul><li>based on acceptable downtime </li></ul></ul><ul><ul><li>indicates earliest point in time at which the business operations must resume after a disaster </li></ul></ul>
    18. 18. 6.1.7 Recovery Point Objective and Recovery Time Objective <ul><li>RPO and RTO are based on time parameters </li></ul><ul><li>The lower the time requirements, the higher the cost of recovery strategies </li></ul><ul><li>Parameters to consider when defining recovery strategies: </li></ul><ul><ul><li>Interruption window </li></ul></ul><ul><ul><li>Service delivery objective (SDO) </li></ul></ul><ul><ul><li>Maximum tolerable outages </li></ul></ul>
    19. 19. <ul><li>The window of time for recovery of information processing capabilities is based on the: </li></ul><ul><ul><li>criticality of the processes affected. </li></ul></ul><ul><ul><li>quality of the data to be processed. </li></ul></ul><ul><ul><li>nature of the disaster. </li></ul></ul><ul><ul><li>applications that are mainframe-based. </li></ul></ul>Chapter 6: Question?
    20. 20. <ul><li>When preparing a business continuity plan, which of the following must be known to establish a recovery point objective (RPO)? </li></ul><ul><ul><li>The acceptable data loss in case of disruption of operations </li></ul></ul><ul><ul><li>The acceptable downtime in case of disruption of operations </li></ul></ul><ul><ul><li>Types of offsite backup facilities available </li></ul></ul><ul><ul><li>Types of IT platforms supporting critical business functions </li></ul></ul>Chapter 6 Question 9
    21. 21. 6.1.8 Recovery Strategies <ul><li>Like all threats, the most effective action would be: </li></ul><ul><ul><li>To remove the threat altogether </li></ul></ul><ul><ul><li>To minimize the likelihood and effect of occurrence </li></ul></ul><ul><li>A recovery strategy is a combination of preventive, detective and corrective measures. </li></ul><ul><li>The selection of a recovery strategy would depend upon: </li></ul><ul><ul><li>The criticality of the business process and the applications supporting the processes </li></ul></ul><ul><ul><li>Cost </li></ul></ul><ul><ul><li>Time required to recover </li></ul></ul><ul><ul><li>Security </li></ul></ul>
    22. 22. <ul><li>Recovery strategies based on the risk level identified for recovery would include developing: </li></ul><ul><ul><li>Hot sites </li></ul></ul><ul><ul><li>Warm sites </li></ul></ul><ul><ul><li>Cold sites </li></ul></ul><ul><ul><li>Duplicate information processing facilities </li></ul></ul><ul><ul><li>Mobile sites </li></ul></ul><ul><ul><li>Reciprocal arrangements with other organizations </li></ul></ul>6.1.8 Recovery Strategies
    23. 23. 6.1.9 Recovery Alternatives <ul><li>Types of Off-site Backup Facilities </li></ul><ul><ul><li>Hot sites - Fully equipped facility </li></ul></ul><ul><ul><li>Warm sites - Partially equipped but lacking processing power </li></ul></ul><ul><ul><li>Cold sites - Basic environment </li></ul></ul><ul><ul><li>Duplicate information processing facility </li></ul></ul><ul><ul><li>Mobile sites </li></ul></ul><ul><ul><li>Reciprocal agreement </li></ul></ul><ul><ul><ul><li>Contract with hot, warm or cold site </li></ul></ul></ul><ul><ul><ul><li>Procuring alternative hardware facilities </li></ul></ul></ul>
    24. 24. <ul><li>Procuring alternative hardware facilities </li></ul><ul><ul><li>Vendor or third-party </li></ul></ul><ul><ul><li>Off-the-shelf </li></ul></ul><ul><ul><li>Credit agreement or emergency credit cards </li></ul></ul>6.1.9 Recovery Alternatives
    25. 25. <ul><li>An IS auditor discovers that an organization’s business continuity plan provides for an alternate processing site that will accommodate 50 percent of the primary processing capability. Based on this, which of the following actions should the IS auditor take? </li></ul><ul><ul><li>Do nothing, because generally, less than 25 percent of all processing is critical to an organization’s survival and the backup capacity, therefore, is adequate. </li></ul></ul><ul><ul><li>Identify applications that could be processed at the alternate site, and develop manual procedures to back up other processing. </li></ul></ul><ul><ul><li>Ensure that critical applications have been identified and that the alternate site could process all such applications. </li></ul></ul><ul><ul><li>Recommend that the information processing facility arrange for an alternate processing site with the capacity to handle at least 75 percent of normal processing. </li></ul></ul>Chapter 6 Question 2
    26. 26. 6.1.10 Development of Business Continuity and Disaster Recovery Plan <ul><li>A detailed Business Recovery and Disaster Recovery Plan: </li></ul><ul><li>Developed Based on </li></ul><ul><ul><li>Inputs received from Business Impact Analysis </li></ul></ul><ul><ul><li>Criticality Analysis </li></ul></ul><ul><ul><li>Recovery Strategy selected by management </li></ul></ul><ul><li>Must address all issues involved in interruption to Business Processes, including covering from a Disaster </li></ul><ul><li>Should consider various factors while developing the plan </li></ul>
    27. 27. Chapter 6 Question 4 <ul><li>During an IT audit of a large bank, the IS auditor observes that no formal risk assessment exercise has been carried out for the various business applications to arrive at their relative importance and recovery time requirements. The risk that the bank is exposed to is that the: </li></ul><ul><ul><li>business continuity plan may not have been calibrated to the relative risk that disruption of each application poses to the organization. </li></ul></ul><ul><ul><li>business continuity plan may not include all relevant applications and, therefore, may lack completeness in terms of its coverage. </li></ul></ul><ul><ul><li>business impact of a disaster may not have been accurately understood by the management. </li></ul></ul><ul><ul><li>business continuity plan may lack an effective ownership by the business owners of such applications. </li></ul></ul>
    28. 28. 6.1.11 Organization and Assignment of Responsibilities <ul><ul><li>Incidence Response Team </li></ul></ul><ul><ul><li>Emergency Action Team </li></ul></ul><ul><ul><li>Damage Assessment Team </li></ul></ul><ul><ul><li>Emergency Management Team </li></ul></ul><ul><ul><li>Off-site Storage Team </li></ul></ul><ul><ul><li>Software Team </li></ul></ul><ul><ul><li>Applications Team </li></ul></ul><ul><ul><li>Security Team </li></ul></ul><ul><ul><li>Emergency Operations Team </li></ul></ul><ul><ul><li>Network Recovery Team </li></ul></ul><ul><ul><li>Communications Team </li></ul></ul>
    29. 29. 6.1.11 Organization and Assignment of Responsibilities <ul><ul><li>Transportation Team </li></ul></ul><ul><ul><li>User Hardware Team </li></ul></ul><ul><ul><li>Data Preparation and Records Team </li></ul></ul><ul><ul><li>Administration Support Team </li></ul></ul><ul><ul><li>Supplies Team </li></ul></ul><ul><ul><li>Salvage Team </li></ul></ul><ul><ul><li>Relocation Team </li></ul></ul><ul><ul><li>Coordination Team </li></ul></ul><ul><ul><li>Legal Affairs Team </li></ul></ul><ul><ul><li>Recovery Test Team </li></ul></ul><ul><ul><li>Training Team </li></ul></ul>
    30. 30. 6.1.12 Other Issues in Plan Development <ul><li>Management and user involvement is vital to the success of BCP </li></ul><ul><ul><li>essential to the identification of critical systems, recovery times and resources </li></ul></ul><ul><ul><li>involvement from support services, business operations and information processing support </li></ul></ul><ul><li>Entire organisation needs to be considered for BCP </li></ul>
    31. 31. 6.1.12 Other Issues in Plan Development <ul><li>IS processing plan can be extended where a BCP does not exist for the entire organization </li></ul><ul><li>Include the following in the plan: </li></ul><ul><ul><li>A list of detailed staff information </li></ul></ul><ul><ul><li>The configuration of the building </li></ul></ul>
    32. 32. 6.1.13 Components of a BCP <ul><li>A BCP may consist of more than one plan document: </li></ul><ul><ul><li>Business continuity plan (BCP) </li></ul></ul><ul><ul><li>Business recovery (or resumption) plan (BRP) </li></ul></ul><ul><ul><li>Continuity of operations plan (COOP) </li></ul></ul><ul><ul><li>Continuity of support plan/IT contingency plan </li></ul></ul><ul><ul><li>Crisis communications plan </li></ul></ul><ul><ul><li>Incident response plan </li></ul></ul><ul><ul><li>Disaster recovery plan (DRP) </li></ul></ul><ul><ul><li>Occupant emergency plan (OEP) </li></ul></ul>
    33. 33. 6.1.13 Components of a BCP <ul><li>Components of this Plan </li></ul><ul><ul><li>Key decision-making personnel </li></ul></ul><ul><ul><li>Backup of required supplies </li></ul></ul><ul><ul><li>Telecommunication networks disaster recovery methods </li></ul></ul><ul><ul><li>Redundant array of inexpensive disks (RAID) </li></ul></ul><ul><ul><li>Insurance </li></ul></ul>
    34. 34. 6.1.13 Components of a BCP <ul><li>Telecommunication networks disaster recovery methods </li></ul><ul><ul><li>Redundancy </li></ul></ul><ul><ul><li>Alternative routing </li></ul></ul><ul><ul><li>Diverse routing </li></ul></ul><ul><ul><li>Long haul network diversity </li></ul></ul><ul><ul><li>Last mile circuit protection </li></ul></ul><ul><ul><li>Voice recovery </li></ul></ul>
    35. 35. 6.1.13 Components of a BCP <ul><li>Redundant array of inexpensive disks (RAID) </li></ul><ul><ul><li>Level 0, striped disk array without fault tolerance </li></ul></ul><ul><ul><li>Level 1, mirroring </li></ul></ul><ul><ul><li>Level 2, hamming code ECC </li></ul></ul><ul><ul><li>Level 3, parallel transfer with parity </li></ul></ul><ul><ul><li>Level 4, independent data disks with shared parity disk </li></ul></ul><ul><ul><li>Level 5, independent data disks with distributed parity blocks </li></ul></ul><ul><ul><li>Level 6, independent data disks with two independent distributed parity schemes </li></ul></ul>
    36. 36. 6.1.13 Components of a BCP <ul><li>Redundant array of inexpensive disks (RAID) </li></ul><ul><ul><li>Level 7, optimized asynchrony for high I/O rates as well as high data transfer rates </li></ul></ul><ul><ul><li>Level 10, very high reliability combined with high performance </li></ul></ul><ul><ul><li>Level 53, high I/O rates and data transfer performance </li></ul></ul><ul><ul><li>Level 0+1, high data transfer performance </li></ul></ul>
    37. 37. <ul><li>Insurance </li></ul><ul><ul><ul><li>IS equipment and facilities </li></ul></ul></ul><ul><ul><ul><li>Media (software) reconstruction </li></ul></ul></ul><ul><ul><ul><li>Extra expense </li></ul></ul></ul><ul><ul><ul><li>Business interruption </li></ul></ul></ul><ul><ul><ul><li>Valuable papers and records </li></ul></ul></ul><ul><ul><ul><li>Errors and omissions </li></ul></ul></ul><ul><ul><ul><li>Fidelity coverage </li></ul></ul></ul><ul><ul><ul><li>Media transportation </li></ul></ul></ul>6.1.13 Components of a BCP
    38. 38. <ul><li>Which of the following is necessary to have FIRST in the development of a business continuity plan? </li></ul><ul><ul><li>Risk-based classification of systems </li></ul></ul><ul><ul><li>Inventory of all assets </li></ul></ul><ul><ul><li>Complete documentation of all disasters </li></ul></ul><ul><ul><li>Availability of hardware and software </li></ul></ul>Chapter 6: Question 5
    39. 39. <ul><li>In business continuity plan (BCP) which of the following notification directories is the MOST important? </li></ul><ul><ul><ul><li>Equipment and Supply vendors </li></ul></ul></ul><ul><ul><ul><li>Insurance company agents </li></ul></ul></ul><ul><ul><ul><li>Contract personnel services </li></ul></ul></ul><ul><ul><ul><li>A prioritized contact list </li></ul></ul></ul>Chapter 6 Question 7
    40. 40. <ul><li>Data mirroring should be implemented as a recovery strategy when: </li></ul><ul><ul><li>recovery point objective (RPO) is low. </li></ul></ul><ul><ul><li>recovery point objective (RPO) is high. </li></ul></ul><ul><ul><li>recovery time objective (RTO) is high. </li></ul></ul><ul><ul><li>disaster tolerance is high. </li></ul></ul>Chapter 6 Question 1
    41. 41. <ul><li>Which of the following components of a business continuity plan is PRIMARILY the responsibility of an organization’s IS department? </li></ul><ul><ul><li>Developing the business continuity plan </li></ul></ul><ul><ul><li>Selecting and approving the strategy for the business continuity plan </li></ul></ul><ul><ul><li>Declaring a disaster </li></ul></ul><ul><ul><li>Restoring the IS systems and data after a disaster </li></ul></ul>Chapter 6 Question 8
    42. 42. 6.1.14 Plan Testing <ul><li>Schedule testing at a time that will minimize disruptions to normal operations </li></ul><ul><li>Test must simulate actual processing conditions </li></ul><ul><li>Test Execution </li></ul><ul><ul><li>Documentation of Results </li></ul></ul><ul><ul><li>Results Analysis </li></ul></ul><ul><ul><li>Recovery/Continuity Plan Maintenance </li></ul></ul>
    43. 43. 6.1.15 Backup and Restoration <ul><li>Secondary storage media are used to allow for the un-interrupted profit-seeking activities of a business </li></ul><ul><li>This media are stored in one or more physical facilities (referred to as offsite libraries) </li></ul><ul><li>Offsite librarian’s responsibility to maintain inventory and access to the libraries </li></ul><ul><li>Current copy of the business continuity plan needs to be maintained at the facility as well </li></ul>
    44. 44. 6.1.15 Backup and Restoration <ul><li>Off-site Library Controls </li></ul><ul><li>Security and Control of Off-site Facilities </li></ul><ul><li>Media and Documentation Back-up </li></ul><ul><li>Periodic Back-up Procedures </li></ul><ul><li>Frequency of Rotation </li></ul><ul><li>Types of Media and Documentation Rotated </li></ul><ul><li>Methods of Rotation </li></ul><ul><li>Record Keeping for Off-site Storage </li></ul><ul><li>Business Continuity Management (BCM) Best Practices </li></ul>
    45. 45. 6.1.16 Summary of Business Continuity and Disaster Recovery <ul><li>Business Continuity Plan must </li></ul><ul><ul><li>be based on the long-range IT plan </li></ul></ul><ul><ul><li>comply with the overall business continuity strategy </li></ul></ul><ul><li>Process for developing and maintaining the BCP/DRP: </li></ul><ul><ul><li>Business Impact Analysis </li></ul></ul><ul><ul><li>Identify and prioritize systems </li></ul></ul><ul><ul><li>Choose appropriate strategies </li></ul></ul><ul><ul><li>Develop the detailed plan for IS facilities </li></ul></ul><ul><ul><li>Develop the detailed BCP </li></ul></ul><ul><ul><li>Test the plans </li></ul></ul><ul><ul><li>Maintain the plans </li></ul></ul>
    46. 46. 6.2 Auditing Recovery / Continuity Plans <ul><li>Review Business Continuity Plan </li></ul><ul><li>Evaluate Prior Test Results </li></ul><ul><li>Evaluate Off-site Storage </li></ul><ul><li>Interview Key Personnel </li></ul><ul><li>Evaluate Security at Off-site Facility </li></ul><ul><li>Review Alternative Processing Contract </li></ul><ul><li>Review Insurance Coverage </li></ul>
    47. 47. 6.2.1 Review Business Continuity Plan <ul><li>When reviewing the developed plan, IS auditors should verify that basic elements of a well-developed plan are evident. </li></ul><ul><li>Basic elements include: </li></ul><ul><ul><li>currency of documents </li></ul></ul><ul><ul><li>effectiveness of documents </li></ul></ul><ul><ul><li>interview personnel for appropriateness and completeness </li></ul></ul><ul><ul><li>etc </li></ul></ul>
    48. 48. 6.2.2 Evaluate Prior Test Results <ul><li>Historical documentation of prior tests must be kept </li></ul><ul><li>IS Auditor must review the test results to: </li></ul><ul><ul><li>determine whether corrective actions are in the plan </li></ul></ul><ul><ul><li>evaluate thoroughness and accuracy </li></ul></ul><ul><ul><li>determine problem trends and resolution of problems </li></ul></ul>
    49. 49. 6.2.3 Evaluate Off-site Storage <ul><li>The IS Auditor must </li></ul><ul><ul><li>evaluate presence, synchronization and currency of media and documentation </li></ul></ul><ul><ul><li>perform a detailed inventory review </li></ul></ul><ul><ul><li>review all documentation </li></ul></ul><ul><ul><li>evaluate availability of facility </li></ul></ul>
    50. 50. 6.2.4 Interview Key Personnel <ul><li>Key personnel must have an understanding of their responsibilities </li></ul><ul><li>Current detailed documentation must be kept </li></ul>
    51. 51. 6.2.5 Evaluate Security at Off-site Storage <ul><li>The IS Auditor must </li></ul><ul><ul><li>evaluate the physical and environmental access controls </li></ul></ul><ul><ul><li>examine the equipment for current inspection and calibration tags </li></ul></ul>
    52. 52. 6.2.6 Review Alternative Processing Contract <ul><li>The references listed in the contract with the vendor of the alternative processing facility must be checked; and vendor’s promises verified in writing </li></ul><ul><li>The contract should be reviewed against a number of guidelines </li></ul><ul><ul><li>contract is clear and understandable </li></ul></ul><ul><ul><li>organization’s agreement with the rules </li></ul></ul><ul><ul><li>etc </li></ul></ul>
    53. 53. 6.2.7 Review Insurance Coverage <ul><li>Insurance coverage must reflect actual cost of recovery </li></ul><ul><li>Coverage of the following must be reviewed for adequacy </li></ul><ul><ul><li>media damage </li></ul></ul><ul><ul><li>business interruption </li></ul></ul><ul><ul><li>equipment replacement </li></ul></ul><ul><ul><li>business continuity processing </li></ul></ul>
    54. 54. <ul><li>An IS auditor should be involved in: </li></ul><ul><ul><li>observing tests of the disaster recovery plan. </li></ul></ul><ul><ul><li>developing the disaster recovery plan. </li></ul></ul><ul><ul><li>maintaining the disaster recovery plan. </li></ul></ul><ul><ul><li>reviewing the disaster recovery requirements of supplier contracts. </li></ul></ul>Chapter 6 Question 6
    55. 55. <ul><li>In an audit of a business continuity plan, which of the following findings is of MOST concern? </li></ul><ul><ul><li>There is no insurance for the addition of assets during the year. </li></ul></ul><ul><ul><li>The BCP manual is not updated on a regular basis. </li></ul></ul><ul><ul><li>Testing of the backup of data has not been done regularly. </li></ul></ul><ul><ul><li>Records for maintenance of the access system have not been maintained </li></ul></ul>Chapter 6 Question 10
    56. 56. Chapter 6: Case Study <ul><li>Organisation revising BCP and DRP for headquarters (750 employees) and 16 branches (each with 20 – 35 employees and mail and file/print server) </li></ul><ul><li>Current plans not updated in more than 8 years </li></ul><ul><li>Organisation has grown by 300% </li></ul><ul><li>Staff connect via LAN to more than 60 applications, databases and print servers in the corporate data centre </li></ul><ul><li>Staff connect via a frame relay network to the branches </li></ul><ul><li>Travelling users connect over the Internet using VPN </li></ul>
    57. 57. Chapter 6: Case Study <ul><li>All users in the headquarters and branches connect to the Internet through a firewall and proxy server located in the data centre </li></ul><ul><li>Critical applications have RTO of 3 – 5 days </li></ul><ul><li>Branch offices are located between 30 and 50 miles from one another, with none closer to the headquarters' facility than 25 miles </li></ul><ul><li>Backup media for the data center are stored at a third-party facility 35 miles away </li></ul><ul><li>Backups for servers located at the branch offices are stored at nearby branch offices using reciprocal agreements between offices </li></ul>
    58. 58. Chapter 6: Case Study <ul><li>Current contract with third party hot-site </li></ul><ul><ul><li>3 year term, with equipment upgrades occurring at renewal time </li></ul></ul><ul><ul><li>25 servers </li></ul></ul><ul><ul><li>work area space with PC’s for 100 employees </li></ul></ul><ul><ul><li>separate agreement to ship 2 servers and 10 PC’s to any branch declaring a disaster </li></ul></ul><ul><ul><li>hot site provider has multiple sites in case the primary site is in use by another customer or rendered unavailable by the disaster </li></ul></ul>
    59. 59. Chapter 6: Case Study Question 1 <ul><li>On the basis of the above information, which of the following should the IS auditor recommend concerning the hot site? </li></ul><ul><ul><li>Desktops at the hot site should be increased to 750. </li></ul></ul><ul><ul><li>An additional 35 servers should be added to the hot site contract. </li></ul></ul><ul><ul><li>All backup media should be stored at the hot site to shorten the RTO. </li></ul></ul><ul><ul><li>Desktop and server equipment requirements should be reviewed quarterly. </li></ul></ul>
    60. 60. Chapter 6: Case Study Question 2 <ul><li>On the basis of the above information, which of the following should the IS auditor recommend concerning branch office recovery? </li></ul><ul><ul><li>Add each of the branches to the existing hot site contract. </li></ul></ul><ul><ul><li>Ensure branches have sufficient capacity to back each other up. </li></ul></ul><ul><ul><li>Relocate all branch mail and file/print servers to the Data Center. </li></ul></ul><ul><ul><li>Add additional capacity to the hot site contract equal to the largest branch. </li></ul></ul>