Reader small image

You're reading from  CISA – Certified Information Systems Auditor Study Guide - Second Edition

Product typeBook
Published inJun 2023
PublisherPackt
ISBN-139781803248158
Edition2nd Edition
Right arrow
Author (1)
Hemang Doshi
Hemang Doshi
author image
Hemang Doshi

Hemang Doshi has more than 15 years of experience in the field of system audit, IT risk and compliance, internal audit, risk management, information security audit, third-party risk management, and operational risk management. He has authored several books for certification such as CISA, CRISC, CISM, DISA, and enterprise risk management.
Read more about Hemang Doshi

Right arrow

DRP – Test Methods

The objective of DRP testing is to ensure that recovery procedures are effective. Regular DRP testing and exercises are very important in determining the continued adequacy and effectiveness of the DRP. It helps to validate the compatibility of the offsite facility with the organization in case of a disaster. The following are some important methods for testing a DRP.

Checklist Review

This test is performed prior to a real test. A checklist is provided to all members of the recovery team for review. This checklist is updated regularly.

Structured Walkthrough

This includes a review of the DRP on paper. Team members review each step to evaluate the effectiveness of the DRP. The gaps, deficiencies, and constraints identified are addressed to improve the plan.

Tabletop Test

A tabletop test is conducted with the aim of practicing the coordination of efforts and the implementation of communication methodology among the relevant members of the recovery...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
CISA – Certified Information Systems Auditor Study Guide - Second Edition
Published in: Jun 2023Publisher: PacktISBN-13: 9781803248158

Author (1)

author image
Hemang Doshi

Hemang Doshi has more than 15 years of experience in the field of system audit, IT risk and compliance, internal audit, risk management, information security audit, third-party risk management, and operational risk management. He has authored several books for certification such as CISA, CRISC, CISM, DISA, and enterprise risk management.
Read more about Hemang Doshi