Seven Steps of a BCP Walk-through Test
I just sent this in an e-mail to a Client, and thought maybe other people could use it.
WALK-THROUGH TEST AGENDA ITEMS:
- The walk-through should be a planned test (needs to be scheduled in advance, with all BCT members required to attend, and all BCT members should know the purpose of the test.) Sharing this checklist in the meeting invitation would suffice.
- All Business Continutity Team (BCT) Members need to be present and they need to sign an attendance sheet.
- The walk-through should confirm that all BCT Members have their own copy of the plan, and that their copy is up-to-date. The BCP coordinator should personally and physically look at each BCT Member’s plan to confirm updates are in the plan.
- The walk-through should also review any policies or procedures that call for the plan.
- The walk-through should go through the entire plan, one page at a time, making sure that all BCT members understand and agree with the plan, updating system descriptions and such. If there is disagreements, they should NOT be resolved in the walk-through, but the minutes of the walk-through should reflect this so that the BCP can be updated at a later date with resolution of disagreements.
- The walk-through should confirm all phone numbers, and remind BCT members to keep their plan at home (when they are not using it in BCP Tests).
- The walk-through should end with a reading of the “decision summary” or “minutes” and a written copy of such should be sent to all BCT members (as well as other appropriate management team members) within a reasonable amount of time after the test.
The above is quick and off the top of my head, but I believe if you follow it as a guide, you’ll have a sufficient Walk-through Test of your Business Continuity Plan.
9 Responses to “Seven Steps of a BCP Walk-through Test”
Attacks on AMD Trusted Platform Modules raise security questions. An article review. Read more
New research reveals issues with these commonly overlooked devices… An article review Read more
Known to be vulnerable since 2005, the algorithm will be phased out over the next sev Read more
Hackers are getting unusually creative in their attacks… An article review. One drawb Read more