First page Back Continue Last page Summary Graphic
Security = Disaster Planning
The same information derived from your security assessment can be used for disaster planning and business recovery.
Identify key hardware, software, and information.
Identify key personnel.
Identify a backup location and keep backups off-site.
Document all configuration, including:
- hardware installation parameters
- software installation parameters
- file server and workstation boot files
- file/print/FAX/communications server parameters (phone line rollover?)
- application settings and installation parameters
- user access rights
- backup and virus parameters