DRP / BCP Audit ProgramDisaster Recovery
Business Continuity Audit Program 2023 Edition

ISO 28000 - 27001 - 27002 -22301
HIPAA - SOX - PCI-DSS Compliant Includes BYOD and Mobile Devices - IoT

Order DRP Audit Program  Version History  Download Sample


Janco has found that less than 40% of all Disaster Recovery Business Continuity Plans are without a major defect

This Disaster Recovery / Business Continuity Audit program identifies control objectives that are met by the audit program. There are approximately 50 specific items that the audit covers in the 18 page audit program. Included are references to specific Janco products that will assist you in addressing any defects or shortcoming the audit uncovers.

This DR/BC Audit program is the right tool to see that the plans that in place work.

Why DR and BC plans fail

This program can be used as standalone audit program or in concert with the following Janco offerings:

ISO Compliance Plan Act Do Process

The Disaster Recovery / Business Continuity Audit program covers the following control objectives are:

  • Ensure that adequate and effective contingency plans have been established to support the prompt recovery of crucial enterprise functions and IT facilities in the event of major failure or disaster;
  • Ensure that all mandated disaster recovery, business continuity, and security requirements have adequate compliance policies and procedures in place;
  • Ensure the survival of the business and to minimize the implications of a major enterprise and/or IT failure;
  • Ensure that all the potential risks to the enterprise and its IT facilities are identified and assessed in preparation of the contingency plans;
  • Ensure the optimum contingency arrangements are selected and cost effectively provided;
  • Ensure that an authorized and documented disaster recovery / business continuity plan is created, maintained up-to-date, and securely stored;
  • Ensure that the recovery plan is periodically tested for its relevance and effectiveness;
  • Ensure that all internal and external parties to the recovery process are fully aware of their responsibilities and commitments;
  • Ensure that appropriate liaison is maintained with external parties (i.e. insurers, emergency services, suppliers, etc. );
  • Ensure that both the damaged and recovery sites are secure and that systems are securely operated in support of the enterprise;
  • Ensure that systems and procedures are adequately and accurately documented to aid the recovery process; and
  • Ensure that public and media relations would be effectively addressed during an emergency in order to minimize adverse publicity and business implications.

Included with this program area Microsoft (.docx format) Word Document and an a PDF version of the Audit Program.

Order DR Audit Program  Sample DR Audit Program

See also Rating Disaster Recovery Risk

DRP BCP AuditDR/BC Audit Program

  • Comes in MS WORD format and PDF
  • Meets ISO 27001, 27002, 27031, 28000, Sarbanes-Oxley, PCI-DSS, FIPS-199, and HIPAA requirements
  • Includes BYOD and other mobile devices
  • Approximately 50 specific items that the audit covers in theĀ 18 page audit program

Order DR Audit Program  Sample DR Audit Program

Disaster Recovery Business ContinuityDisaster Recovery Business Continuity Standard Edition

Artificial Intelligence Considerations

Disaster Recovery Business Continuity Template (WORD) - comes with the latest electronic forms and is fully compliant with all mandated US, EU, and ISO requirements.

  • Fully editable Disaster Recovery Business Continuity template
  • Disaster Recovery Business Continuity Audit Program - Compliant with ISO 27031, ISO 22301, and ISO 28000
  • Key job descriptions included
    • Chief Compliance Officer
    • Chief Experience Officer
    • Chief Mobility Officer
    • Manager Disaster Recovery & Business Continuity
    • Manager Disaster Recovery Manager
    • and more
  • Incident Communication Plan and Policy with BEST PRACTICES for
    • News Conferences
    • Media Relations
  • Social Network Checklist
  • Included with the template are Electronic Forms which have been designed to lower the cost of maintenance of the plan. Electronic Forms that can be e-mailed, completed via a computer or tablet, and stored electronically including:
    • LAN Inventory, Location Contact Numbers, Off-Site Inventory, Pandemic Planning Checklist; Personnel Locations, Plan Distribution, Remote Location Contact Information, Server Registration, Team Call List, Vendor Contact Information, and Vendor/Partner Questionnaire
    • Added Bonus - Safety Program Electronic Forms -- Area Safety Inspection, Employee Job Hazard Analysis, First Report of Injury, Inspection Checklist - Alternative Locations, Inspection Checklist - Office Locations, New Employee Safety Checklist, Safety Program Contact List, and Training Record

Order DRP BCP Template  DRP BCP Sample

DRP BCP Sample Audit ProgramDisaser Recovery Business Contininty and Security Audit Bundle

  • Disaster Recovery Business Continuity Template
  • Security Manual Template
  • Disaster Recovery Business Continuity Audit Program
  • Security Audit Program

Order Audit Program  Download Table of Contents





Security Audit ProgramSecurity Audit Program - Self Scoring Tool

  • Comes in MS EXCEL and PDF formats
  • Addresses Ransomware and Work From Home (WFH)
  • Meets ISO 28000, 27001, 27002, Sarbanes-Oxley, PCI-DSS and HIPAA requirements
  • Over 400 unique tasks divided into 11 areas of audit focus which are the divided into 39 separate task groupings including BYOD
  • BONUS - ISO 28000 Supply Chain Security Audit Program in MS EXCEL and PDF formats

Over 3,000 enterprises from around the world have chosen at least one of Janco's products. The Security Audit program is a must have tool that not only assists in meeting compliance requirements but also is a great way to validate that your enterprise is ready for your next external audit.

Order Audit Program  Download Table of Contents

Security Manual Template - Standard Edition

  • Security PolicyBusiness and IT Impact Questionnaire
  • Threat and Vulnerability Assessment Toolkit
  • Security Management Checklist
  • Full Detail Policies for
    • Blog and Personal Website Policy
    • Internet, Email, Social Networking, Mobile Device, and Electronic Communication Policy
    • Mobile Device Policy
    • Physical and Virtual File Server Policy
    • Sensitive Information Policy
    • Travel and Off-Site Meeting Policy
  • Job Descriptions for the Chief Compliance Officer, Chief Security Officer, Data Protection Officer, Manager Security and Workstations, Manager WFH Support, Security Architect, and Systems Administrator.
  • Work From Home (WFH) operational rules
  • HIPAA Audit Program
  • AI Security Management
  • GDPR Compliance Checklist to meet EU Requirements
  • CCPA - California Consumer Privacy Act requirements definition
  • Consumer Bill of Rights
  • Sarbanes Oxley Section 404 Checklist
  • HIPAA Audit Proram
  • Security Audit Program- fully editable -- Comes in MS EXCEL and PDF formats -- Meets GDPR, ISO 28000, 27001, 27002, Sarbanes-Oxley, PCI-DSS, HIPAA FIPS 199, and NIS SP 800-53 requirements -- Over 400 unique tasks divided into 11 areas of audit focus which are the divided into 38 separate task groupings
  • Electronic forms that can be Emailed, completed via a computer or tablet, and stored electronically including: Blog Policy Compliance, BYOD Access and Use, Company Asset Employee Control Log, Email - Employee Acknowledgment, Employee Termination Checklist, FIPS 199 Assessment Electronic Form, Internet Access Request, Internet Use Approval, Internet & Electronic Communication - Employee Acknowledgment, Mobile Device Access and Use Agreement, Employee Security Acknowledgment Release, Preliminary Security Audit Checklist, Risk Assessment, Security Access Application, Security Audit Report, Security Violation Reporting, Sensitive Information Policy Compliance Agreement, Server Registration, and Threat and Vulnerability Assessment
  • eReader version of the Security Manual Template
  • BONUS - ISO 28000 Supply Chain Security Audit Program in MS EXCEL and PDF formats.

Order Security Manual Template Download Sample