1. Organizational and Management Requirements:
The first part of the checklist begins with organizational security policies and management requirements. Organizations are required to assess the need for a recovery plan, define a recovery team, develop relationships with external organizations, maintain documentation of security controls, maintain documentation of system information and provide training on information assurance to personnel who need it.
2. Procedures to be followed during an incident:
The second part of the checklist requires that organizations must have a data protection director. Once a recovery plan is ready to be implemented, it must be approved by the relevant person within the organization. They should also establish procedures for reporting incidents, and document every event that results in damage or loss of information, as well as how they deal with these events.
3. Procedures to be followed after an event is concluded:
The third part of the checklist consists of procedures related to recovering data and restoring systems. It also states that after procedures are implemented, a thorough test is required before the system is made available to anyone.
4. Other related requirements to IT policy and capabilities:
The fourth part of the checklist requires that guides must be followed when performing information assurance assessments. They must also ensure that the recovery plan provides for the protection of classified information and that monitoring of business systems has been designed to ensure compliance with laws, regulations and standards.
5. Compliance Considerations:
The final part of the checklist requires organizations to identify risks, design controls and assess risks. This part also requires that they ensure that they maintain records of all security policies implemented, practices and incident response.