Please note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.

The second stage of Disaster Recovery Plan (DRP) development involves conducting an operational analysis. An operational analysis is done early in the DRP process to identify dangerous or weak practices in the day-to-day operation of security procedures that could become exploitable vulnerabilities. To assist IT departments with DR operational analysis, this tool covers the following areas:

  • Physical security.
  • Data access.
  • Critical services.
  • Passwords and user accounts.
  • Backups and data storage.
  • Internet and e-mail use.
  • IT security software.

IT departments hope they never need to test their work beyond scheduled scenario tests of the plan. As such, every DRP must be based on solid planning of the enterprise's security operations, and a realistic assessment of existing processes and their potential vulnerabilities.


This downloadable tool is associated with the research note, “Scrutinize Security Ops to Ensure an Airtight DRP.”

Related Content

Hide Details

Search Code: 8428
Published: May 23, 2007
Last Revised: May 23, 2007


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.