Disaster Recovery
Skill packages tagged with “Disaster Recovery”
BCP Audit Evidence Pack
Create a consolidated Business Continuity Evidence Pack for SOC 2, ISO 22301, or ISO 27001 audits. Combines BIA summary, RTO/RPO targets, recovery plans, DR test matrix, and auditor checklist into a single audit-ready document with cross-validation.
ICT Business Continuity & Disaster Recovery (DORA)
Draft the ICT business continuity policy and disaster recovery plan required by DORA Articles 11-12, covering recovery objectives, switchover procedures, backup policies, continuity testing, and crisis management.
ISO 27001 Business Continuity & Disaster Recovery Plan
Create operationally detailed Business Continuity Plans (BCP) and Disaster Recovery Plans (DRP) with BIA-driven recovery sequences, RTO/RPO validation, failover procedures, and exercise records per ISO 27001 Controls A.5.29/A.5.30.
IT Disaster Recovery Plan (ITDRP)
Draft IT Disaster Recovery Plans with validated technical runbooks for system restoration, following ISO 27031. Sequences recovery steps respecting system dependencies, validates failover logic to prevent dependency deadlocks, and audits the emergency contact matrix for expired vendor contracts and stale contact data.
NIS2 Business Continuity
Document business continuity and crisis management measures per NIS2 Art. 21(2)(c). Covers backup management policies, disaster recovery procedures, crisis management activation and escalation, and ICT readiness for business continuity. Validates BCP completeness against NIS2 requirements and checks RTO/RPO target definitions.
Recovery Scenario Builder (COBIT DSS04)
Draft IT recovery plans for Total Site Loss and Single Service Outage. Ensure HA matches business criticality. Includes DR test integrity check (failover tests vs tabletop only).
Restoration Dependency Analyzer (NIST RC.RP)
Draft and validate System Restoration Sequence & Integrity Verification plans aligned with NIST CSF 2.0 RC.RP. Ensures restoration order respects service dependencies and that backup verification and security integrity checks are explicit before go-live.