Course Project
docx
keyboard_arrow_up
School
Ivy Tech Community College, Indianapolis *
*We aren’t endorsed by this school
Course
260
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
24
Uploaded by SargentStarGull30
NOTE: This sample template is provided to address NIST SP 800-53 security controls from the
Contingency Planning family for a high impact information system.
The template provided is a
guide and may be customized and adapted as necessary to best fit the system or organizational
requirements for contingency planning.
Veterinary Practice Management Software
Security Categorization: High
Coastal Veterinary Clinic
Information System Contingency Plan (ISCP)
Version [1
]
[November 6, 2023
]
Prepared by
Coastal Veterinary Clinic
123 Dog St
Jacksonville, Floridia, 32034
Plan Approval
4
1.
Introduction
5
1.1
Background
5
1.2
Scope
5
1.3
Assumptions
6
2.
Concept of Operations
6
2.1
System Description
7
2.2
Overview of Three Phases
7
2.3
Roles and Responsibilities
8
3.
Activation and Notification
9
3.1
Activation Criteria and Procedure
9
3.2
Notification
9
3.3
Outage Assessment
10
4.
Recovery
10
4.1
Sequence of Recovery Activities
10
4.2
Recovery Procedures
11
4.3
Recovery Escalation Notices/Awareness
11
5.
Reconstitution
11
5.1
Concurrent Processing
11
5.2
Validation Data Testing
12
5.3
Validation Functionality Testing
12
5.4
Recovery Declaration
13
5.5
Notifications (users)
13
5.6
Cleanup
13
5.7
Offsite Data Storage
13
5.8
Data Backup
14
5.9
Event Documentation
14
5.10
Deactivation
15
APPENDIX A
PERSONNEL CONTACT LIST
15
APPENDIX B
VENDOR CONTACT LIST
17
APPENDIX C
DETAILED RECOVERY PROCEDURES
17
APPENDIX D
ALTERNATE PROCESSING PROCEDURES
17
APPENDIX E
SYSTEM VALIDATION TEST PLAN
18
Page 2
APPENDIX F
ALTERNATE STORAGE, SITE, AND TELECOMMUNICATIONS
19
APPENDIX G
DIAGRAMS (SYSTEM AND INPUT/OUTPUT)
21
APPENDIX H
HARDWARE AND SOFTWARE INVENTORY
21
APPENDIX I INTERCONNECTIONS TABLE
21
APPENDIX J
TEST and MAINTENANCE SCHEDULE
22
APPENDIX K
ASSOCIATED PLANS AND PROCEDURES
24
APPENDIX L
BUSINESS IMPACT ANALYSIS
24
APPENDIX M
DOCUMENT CHANGE PAGE
24
Page 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Plan Approval
Provide a statement in accordance with the agency’s contingency planning policy to affirm that
the ISCP is complete and has been tested sufficiently.
The statement should also affirm that
the designated authority is responsible for continued maintenance and testing of the ISCP. This
statement should be approved and signed by the system designated authority.
Space should
be provided for the designated authority to sign, along with any other applicable approving
signatures.
A sample language is provided below:
As the designated authority for
{Veterinary Practice Management Software
}
, I hereby certify that
the information system contingency plan (ISCP) is complete, and that the information contained
in this ISCP provides an accurate representation of the application, its hardware, software, and
telecommunication components.
I further certify that this document identifies the criticality of the
system as it relates to the mission of the
{Coastal Veterinary Clinic
}
, and that the recovery
strategies identified will provide the ability to recover the system functionality in the most
expedient and cost-beneficial method in keeping with its level of criticality.
I further attest that this ISCP for
{Veterinary Practice Management Software
}
will be tested at
least annually.
This plan was last tested on
{November 6, 2023
}
; the test, training, and exercise
(TT&E) material associated with this test can be found
in the attacked document “ISCP TT&E
November 6, 2023”.
This document will be modified as changes occur and will remain under
version control, in accordance with
Coastal Veterinary Clinic
’s contingency planning policy.
________________________________________
________________________
Jordan Thompson
November 6, 2023
Business Owner/ISCP Coordinator
Page 4
1.
Introduction
Information systems are vital to Coastal Veterinary Clinic’s mission/business processes;
therefore, it is critical that services provided by
Veterinary Practice Management
Software are
able to operate effectively without excessive interruption.
This Information System Contingency
Plan (ISCP) establishes comprehensive procedures to recover Veterinary Practice Management
Software quickly and effectively following a service disruption.
1.1
Background
This
Veterinary Practice Management Software
ISCP establishes procedures to recover
Veterinary Practice Management Software
following a disruption.
The following recovery plan
objectives have been established:
§
Maximize the effectiveness of contingency operations through an established plan that
consists of the following phases:
o
Activation and Notification phase
to activate the plan and determine the extent
of damage;
o
Recovery phase
to restore
Veterinary Practice Management Software
operations;
and
o
Reconstitution phase
to ensure that
Veterinary Practice Management Software
is validated through testing and that normal operations are resumed.
§
Identify the activities, resources, and procedures to carry out the Veterinary Practice
Management Software
processing requirements during prolonged interruptions to
normal operations.
§
Assign responsibilities to designated
Coastal Veterinary Clinic
personnel and provide
guidance for recovering
Veterinary Practice Management Software
during prolonged
periods of interruption to normal operations.
§
Ensure coordination with other personnel responsible for
Coastal Veterinary Clinic
contingency planning strategies.
Ensure coordination with external points of contact and
vendors associated with
Veterinary Practice Management Software
and execution of this
plan.
1.2
Scope
This ISCP has been developed for
the Veterinary Practice Management Software
, which is
classified as a high-impact system, in accordance with Federal Information Processing
Standards (FIPS) 199
– Standards for Security Categorization of Federal Information and
Information Systems.
Procedures in this ISCP are for high- impact systems and designed to
Page 5
recover the Veterinary practice Management Software within
4 hours.
This plan does not
address replacement or purchase of new equipment, short-term disruptions lasting less than
4
hours,
or loss of data at the onsite facility or at the user-desktop levels.
1.3
Assumptions
The following assumptions were used when developing this ISCP:
●
Veterinary Practice Management Software
has been established as a high-impact
system, in accordance with
FIPS 199.
●
Alternate processing sites and offsite storage are required and have been established
for this system.
●
Current backups of the system software and data are intact and available at the offsite
storage facility in
Savannah, Georgia.
●
Alternate facilities have been established at
Savannah, Georgia
and are available if
needed for relocation of
Veterinary Practice Management Software.
§
The
Veterinary Practice Management Software
is inoperable at the
Coastal Veterinary
Clinic
and cannot be recovered within
4 hours
.
§
Key
Veterinary Practice Management Software
personnel have been identified and
trained in their emergency response and recovery roles; they are available to activate
the
Veterinary Practice Management Software
Contingency Plan.
●
Additional assumptions as appropriate.
The
Veterinary Practice Management Software
ISCP does not apply to the following situations:
§
Overall recovery and continuity of mission/business operations.
The Business
Continuity Plan (BCP) and Continuity of Operations Plan (COOP) address continuity of
business operations.
§
Emergency evacuation of personnel.
The Occupant Emergency Plan (OEP)
addresses employee evacuation.
§
Any additional constraints and associated plans should be added to this list.
Page 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
2.
Concept of Operations
The Concept of Operations section provides details about
the Veterinary Practice Management
Software
, an overview of the three phases of the ISCP (Activation and Notification, Recovery,
and Reconstitution), and a description of roles and responsibilities of Coastal Veterinary Clinic’s
personnel during a contingency activation.
2.1
System Description
NOTE: Information for this section should be available from the system’s System Security Plan
(SSP) and can be copied from the SSP, or reference the applicable section in the SSP and
attach the latest version of the SSP to this contingency plan.
Provide a general description of
system architecture and functionality
Indicate the operating environment, physical location, general location of users, and
partnerships with external organizations/systems.
Include information regarding any other
technical considerations that are important for recovery purposes, such as backup procedures.
2.2
Overview of Three Phases
This ISCP has been developed to recover the
Veterinary Practice Management Software
using
a three-phased approach.
This approach ensures that system recovery efforts are performed in
a methodical sequence to maximize the effectiveness of the recovery effort and minimize
system outage time due to errors and omissions.
The three system recovery phases are:
Activation and Notification Phase –
Activation of the ISCP occurs after a disruption or outage
that may reasonably extend beyond the RTO established for a system.
The outage event may
result in severe damage to the facility that houses the system, severe damage or loss of
equipment, or other damage that typically results in long-term loss.
Once the ISCP is activated, system owners and users are notified of a possible long-term
outage, and a thorough outage assessment is performed for the system.
Information from the
Page 7
outage assessment is presented to system owners and may be used to modify recovery
procedures specific to the cause of the outage.
Recovery Phase –
The Recovery phase details the activities and procedures for recovery of
the affected system.
Activities and procedures are written at a level that an appropriately skilled
technician can recover the system without intimate system knowledge.
This phase includes
notification and awareness escalation procedures for communication of recovery status to
system owners and users.
Reconstitution –
The Reconstitution phase defines the actions taken to test and validate
system capability and functionality at the original or new permanent location.
This phase
consists of two major activities: validating successful reconstitution and deactivation of the plan.
During validation, the system is tested and validated as operational prior to returning operation
to its normal state.
Validation procedures may include functionality or regression testing,
concurrent processing, and/or data validation.
The system is declared recovered and
operational by system owners upon successful completion of validation testing.
Deactivation includes activities to notify users of system operational status.
This phase also
addresses recovery effort documentation, activity log finalization, incorporation of lessons
learned into plan updates, and readying resources for any future events.
2.3
Roles and Responsibilities
The ISCP establishes several roles for
the Veterinary Practice Management Software
recovery
and reconstitution support
.
Persons or teams assigned ISCP roles have been trained to
respond to a contingency event affecting
Veterinary Practice Management Software.
Describe each team and role responsible for executing or supporting system recovery
and
reconstitution.
Include responsibilities for each team/role, leadership roles, and coordination
with other recovery and reconstitution teams, as applicable.
At a minimum, a role should be
established for a system owner or business unit point of contact, a recovery coordinator, and a
technical recovery point of contact.
Page 8
Leadership roles should include an ISCP Director, who has overall management responsibility
for the plan, and an ISCP Coordinator, who is responsible to oversee recovery and
reconstitution progress, initiate any needed escalations or awareness communications, and
establish coordination with other recovery and reconstitution teams as appropriate.
3.
Activation and Notification
The Activation and Notification Phase defines initial actions taken once a
Veterinary Practice
Management Software
disruption has been detected or appears to be imminent.
This phase
includes activities to notify recovery personnel, conduct an outage assessment, and activate the
ISCP.
At the completion of the Activation and Notification Phase,
Veterinary Practice
Management Software
ISCP staff will be prepared to perform recovery measures.
3.1
Activation Criteria and Procedure
The
Veterinary Practice Management Software
ISCP may be activated if one or more of the
following criteria are met:
1.
The type of outage indicates
Veterinary Practice Management Software
will be down for
more than
4 hours;
2.
The facility housing
the Veterinary Practice Management Software
is damaged and may
not be available within
4 hours; and
3.
Other criteria, as appropriate.
The following persons or roles may activate the ISCP if one or more of these criteria are met:
Establish one or more roles that may activate the plan based on activation criteria.
Authorized
persons may include the system or business owner, or the operations point of contact (POC) for
system support.
Page 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
3.2
Notification
The first step upon activation of the
Veterinary Practice Management Software
ISCP is
notification of appropriate business and system support personnel.
Contact information for
appropriate POCs is included in
Appendix A
.
For
the Veterinary Practice Management Software
, the following method and procedure for
notifications are used:
The ICSP Coordinator will notify the IT Support Company via phone call and email to let them
know that the ICSP needs to be activated. After the ICSP Coordinator informs the IT Support
Company that they ICSP needs to be activated, they will notify the ICSP Coordinator and the
business unit of the activation of the ICSP via email and phone call.
3.3
Outage Assessment
Following notification, a thorough outage assessment is necessary to determine the extent of
the disruption, any damage, and expected recovery time.
This outage assessment is conducted
by
IT Support Company
Assessment results are provided to the ISCP Coordinator to assist in
the coordination of the recovery of
the Veterinary Practice Management Software.
Outline detailed procedures to include how to determine the cause of the outage; identification
of potential for additional disruption or damage; assessment of affected physical area(s); and
determination of the physical infrastructure status, IS equipment functionality, and inventory.
Procedures should include notation of items that will need to be replaced and estimated time to
restore service to normal operations.
4.
Recovery
The Recovery Phase provides formal recovery operations that begin after the ISCP has been
activated, outage assessments have been completed (if possible), personnel have been
notified, and appropriate teams have been mobilized.
Recovery Phase activities focus on
implementing recovery strategies to restore system capabilities, repair damage, and resume
operational capabilities at the original or an alternate location.
At the completion of the
Recovery Phase,
the Veterinary Practice Management Software
will be functional and capable
of performing the functions identified in Section 2.1 of this plan.
4.1
Sequence of Recovery Activities
The following activities occur during recovery of
Veterinary Practice Management Software:
Page 10
Modify the following list as appropriate for the selected system recovery strategy:
1.
Identify recovery location (if not at original location);
2.
Identify required resources to perform recovery procedures;
3.
Retrieve backup and system installation media;
4.
Recover hardware and operating system (if required); and
5.
Recover system from backup and system installation media.
4.2
Recovery Procedures
The following procedures are provided for recovery of
Veterinary Practice Management
Software
at the original or established alternate location
.
Recovery procedures are outlined per
team and should be executed in the sequence presented to maintain an efficient recovery effort.
The system will be recovered by recovering from the tape backups that are stored off-site. The
backups will be stored in Savannah, Georgia to make sure they will not be affected by the same
incident/disaster. The IT Support company will go through the procedure of recovering the data
from the backups.
4.3
Recovery Escalation Notices/Awareness
If the IT Support company will go through the procedure of recovering the data from backups.
5.
Reconstitution
Reconstitution is the process by which recovery activities are completed and normal system
operations are resumed.
If the original facility is unrecoverable, the activities in this phase can
also be applied to preparing a new permanent location to support system processing
requirements.
A determination must be made on whether the system has undergone significant
change and will require reassessment and reauthorization. The phase consists of two major
activities:
validating successful reconstitution and deactivation of the plan.
5.1
Concurrent Processing
Page 11
In concurrent processing, a system operates at two separate locations concurrently until there is
a level of assurance that the recovered system is operating correctly
.
The Veterinary Practice
Management Software
does not have concurrent processing as part of validation.
Once the
system has been tested and validated, it will be placed into normal operations.
5.2
Validation Data Testing
Validation data testing is the process of testing and validating recovered data to ensure that
data files or databases have been recovered completely.
The following procedures will be used
to determine that the recovered data is complete and current to the last available backup:
The IT Support Company will work with the veterinarians and veterinarian technicians to verify
that the patient data in the Veterinary Practice Management Software is up to date. They would
do this by checking that the most recent patient records are available and up to date.
5.3
Validation Functionality Testing
Validation functionality testing is the process of verifying that
the Veterinary Practice
Management Software
functionality has been tested, and the system is ready to return to
normal operations.
The IT Support Company will test the software by verifying that all the functions used by the
organization are functional. They will do this by having the veterinarians check to make sure
they are able to access all their data, create new entries in the database, update information in
the database, and verify functionality of other Veterinary Practice Management Software
features.
5.4
Recovery Declaration
Upon successfully completing testing and validation, the
business owner
will formally declare
recovery efforts complete, and that
the Veterinary Practice Management Software
is in normal
operations.
Veterinary Practice Management Software
business and technical POCs will be
notified of the declaration by the ISCP Coordinator.
Page 12
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
5.5
Notifications (users)
Upon return to normal system operations, Veterinary Practice Management Software users will
be notified by
IT Support Company
using
email and a phone call.
5.6
Cleanup
Cleanup is the process of cleaning up or dismantling any temporary recovery locations,
restocking supplies used, returning manuals or other documentation to their original locations,
and readying the system for a possible future contingency event.
The organization will cease operation at the temporary recovery location, and they will return all
information assets to the primary location. The ISCP Coordinator will make sure that the
hardcopy of the ISCP is returned to its rightful place, and they will make sure that the backup
media is returned to the off-site facility in Savannah, Georgia by the IT Support Company.
5.7
Offsite Data Storage
It is important that all backup and installation media used during recovery be returned to the
offsite data storage location.
The following procedures should be followed to return backup and
installation media to its offsite data storage location.
The IT Support Company will take care of returning the backup media to the off-site location in
Savannah, Georgia. They will do this by sending someone directly to the off-site location with
the backups, and the backup tapes will be logged back in at the off-site location.
5.8
Data Backup
As soon as reasonable following recovery, the system should be fully backed up and a new
copy of the current operational system stored for future recovery efforts.
This full backup is then
kept with other system backups.
The procedures for conducting a full system backup are:
The IT Support Company will complete a new, full back up of the system using a tape drive
within 4 hours of the system being fully functional, and they will transport it to the off-site
storage location following the same procedure as section 5.7.
Page 13
5.9
Event Documentation
It is important that all recovery events be well-documented, including actions taken and
problems encountered during the recovery and reconstitution effort, and lessons learned for
inclusion and update to this ISCP.
It is the responsibility of each ISCP team or person to
document their actions during the recovery and reconstitution effort, and to provide that
documentation to the ISCP Coordinator.
The IT Support Company will supply the ISCP Coordinator with the activity logs of what they did
to respond to the incident and the testing results for testing system functionality. The ISCP
Coordinator will then use these documents to write the lessons learned documentation and the
after-action report. The ISCP Coordinator will then use these documents to better the ISCP plan
in the future
5.10
Deactivation
Once all activities have been completed and documentation has been updated, the
business
owner
will formally deactivate the ISCP recovery and reconstitution effort.
Notification of this
declaration will be provided to all business and technical POCs.
SUGGESTED APPENDICES
ISCP appendices included should be based on system and plan requirements.
The following
appendices are recommended:
APPENDIX A
PERSONNEL CONTACT LIST
Provide contact information for each person with a role or responsibility for activation or
implementation of the ISCP, or coordination with the ISCP.
For each person listed, at least one
office and one non-office contact number is recommended. Note: Information may contain
personally identifiable information and should be protected.
Page 14
{System name
}
ISCP Key Personnel
Key Personnel
Contact Information
ISCP Director
Work
812-675-9034
John Finn
Home
812-678-0056
88&4
th
North Avenue
Cellular
812-000-8956
Bedford, Indiana, 47421
Email
Jfinn5@ivytech.edu
ISCP Director – Alternate
Work
Home
Cellular
Email
ISCP Coordinator
Work
905-890-9999
Jordan Thompson – Business Owner
Home
905-234-8955
66 Main St
Cellular
905-505-4534
Jacksonville, Floridia, 32034
Email
Jthompson045@coastalvetenira
ryclinic.com
ISCP Coordinator – Alternate
Work
Home
Cellular
Email
ISCP Team – Team Lead
Work
Home
Cellular
Email
ISCP Team – Team Members
Work
Home
Page 15
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cellular
Email
APPENDIX B
VENDOR CONTACT LIST
IT Support Company – 555-555-5555 – IT_Support@ITSupport.com
APPENDIX C
DETAILED RECOVERY
PROCEDURES
This appendix includes the detailed recovery procedures for the system, which may include
items such as:
§
Keystroke-level recovery steps;
§
System installation instructions from tape, CD, or other media;
§
Required configuration settings or changes;
§
Recovery of data from tape and audit logs; and
§
Other system recovery procedures, as appropriate.
If the system relies totally on another group or system for its recovery and reconstitution (such
as a mainframe system), information provided should include contact information and locations
of detailed recovery and reconstitution procedures for that supporting system.
APPENDIX D
ALTERNATE PROCESSING
PROCEDURES
This section should identify any alternate manual or technical processing procedures available
that allow the business unit to continue some processing of information that would normally be
done by the affected system.
Examples of alternate processes include manual forms
processing, input into workstations to store data until it can be uploaded and processed, or
queuing of data input.
Page 16
APPENDIX E
SYSTEM VALIDATION TEST PLAN
This appendix includes system acceptance procedures that are performed after the system has
been recovered and prior to putting the system into full operation and returned to users.
The
system validation test plan may include the regression or functionality testing conducted prior to
implementation of a system upgrade or change.
An example of a system validation test plan:
Once the system has been recovered, the following steps will be performed to validate system
data and functionality:
Procedure
Expected Results
Actual Results
Successful?
Performed
by
At the Command
Prompt, type in
sysname
System Log-in
Screen appears
Log in as user
testuser,
using
password
testpass
Initial Screen
with Main Menu
shows
From Menu - select
5- Generate
Report
Report
Generation
Screen shows
- Select
Current
Date Report
- Select
Weekly
Report is
generated on
screen with last
successful
transaction
Page 17
Procedure
Expected Results
Actual Results
Successful?
Performed
by
- Select
To Screen
included
- Select
Close
Report
Generation
Screen Shows
- Select
Return to
Main Menu
Initial Screen
with Main Menu
shows
- Select
Log-Off
Log-in Screen
appears
APPENDIX F
ALTERNATE STORAGE, SITE, AND
TELECOMMUNICATIONS
This appendix provides information for alternate storage, alternate processing site, and
alternate telecommunications for the system. Alternate storage, site, and telecommunications
information is required for high-impact systems, per NIST SP 800-53 Rev. 3.
Refer to NIST SP
800-53 Rev. 3, for details on control specifics.
Information that should be provided for each
area includes:
Alternate Storage:
§
City and state of alternate storage facility, and distance from primary facility;
§
Whether the alternate storage facility is owned by the organization or is a third-party
storage provider;
§
Name and points of contact for the alternate storage facility;
Page 18
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
§
Delivery schedule and procedures for packaging media to go to alternate storage
facility;
§
Procedures for retrieving media from the alternate storage facility;
§
Names and contact information for those persons authorized to retrieve media;
§
Alternate storage configuration features that facilitate recovery operations (such as
keyed or card reader access by authorized retrieval personnel);
§
Any potential accessibility problems to the alternate storage site in the event of a
widespread disruption or disaster;
§
Mitigation steps to access alternate storage site in the event of a widespread
disruption or disaster;
§
Types of data located at alternate storage site, including databases, application
software, operating systems, and other critical information system software; and
§
Other information as appropriate.
Alternate Processing Site:
§
City and state of alternate processing site, and distance from primary facility;
§
Whether the alternate processing site is owned by the organization or is a third-party
site provider;
§
Name and points of contact for the alternate processing site;
§
Procedures for accessing and using the alternate
processing site, and access security
features of alternate processing site;
§
Names and contact information for those persons authorized to go to alternate
processing site;
§
Type of alternate processing site, and equipment available at site;
§
Alternate processing site configuration information (such as available power, floor
space, office space, telecommunications availability, etc.);
§
Any potential accessibility problems to the alternate processing site in the event of a
widespread disruption or disaster;
§
Mitigation steps to access alternate processing site in the event of a widespread
disruption or disaster;
§
SLAs or other agreements of use of alternate processing site, available office/support
space, setup times, etc.; and
§
Other information as appropriate.
Page 19
Alternate Telecommunications:
§
Name and contact information of alternate telecommunications vendors;
§
Geographic locations of alternate telecommunications vendors facilities (such as
central offices, switch centers, etc.);
§
Contracted capacity of alternate telecommunications;
§
SLAs or other agreements for implementation of alternate telecommunications
capacity;
§
Information on alternate telecommunications vendor contingency plans;
§
Names and contact information for those persons authorized to implement or use
alternate telecommunications capacity; and
§
Other information as appropriate.
APPENDIX G
DIAGRAMS (SYSTEM AND
INPUT/OUTPUT)
NOTE: Information for this section should be available from the system’s System Security Plan
(SSP) and can be copied from the SSP,
or reference the applicable section in the SSP and
attach the latest version of the SSP to this contingency plan.
Include any system architecture,
input/output, or other technical or logical diagrams that may be useful in recovering the system.
Diagrams may also identify information about interconnection with other systems.
APPENDIX H
HARDWARE AND SOFTWARE
INVENTORY
Provide the hardware and software inventory for the system.
Inventory information should
include type of server or hardware on which the system runs, processors and memory
requirements, storage requirements, and any other pertinent details.
The software inventory
should identify the operating system (including service pack or version levels, and any other
applications necessary to operate the system, such as database software).
APPENDIX I
INTERCONNECTIONS TABLE
NOTE: Information for this section should be available from the system’s System Security Plan
(SSP) and can be copied from the SSP, or reference the applicable section in the SSP and
Page 20
attach the latest version of the SSP to this contingency plan.
This appendix includes information
on other systems that directly interconnect or exchange information with the system.
Interconnection information should include the type of connection, information transferred, and
contact person for that system.
If the system does not have any direct interconnections, then this appendix may be removed, or
the following statement may be used:
Veterinary Practice Management Software
does not directly interconnect with any other
systems.
APPENDIX J
TEST and MAINTENANCE
SCHEDULE
All ISCPs should be reviewed and tested at the organization defined frequency (e.g. yearly) or
whenever there is a significant change to the system.
Provide information and a schedule for
the testing of the system.
The full functional test should include all ISCP points of contact and
be facilitated by an outside or impartial observer.
A formal test plan is developed prior to the
functional test, and test procedures are developed to include key sections of the ISCP, including
the following:
§
Notification procedures;
§
System recovery on an alternate platform from backup media;
§
Internal and external connectivity; and
§
Reconstitution procedures.
Results of the test are documented in an After Action Report, and Lessons Learned are
developed for updating information in the ISCP.
NOTE: Full functional tests of systems normally are failover tests to the alternate locations, and
may be very disruptive to system operations if not planned well.
Other systems located in the
same physical location may be affected by or included in the full functional test.
It is highly
Page 21
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
recommended that several functional tests be conducted and evaluated prior to conducting a
full functional (failover) test.
Examples of functional tests that may be performed prior to a full functional test include:
§
Full notification and response of key personnel to recovery location;
§
Recovery of a server or database from backup media; and
§
Setup and processing from a server at an alternate location.
The following is a sample of a yearly test and maintenance schedule for a high-impact system:
Step
Date Due by
Responsible
Party
Date
Scheduled
Date Held
Identify failover test
facilitator.
March 1
ISCP
Coordinator
Determine scope of
failover test (include
other systems?).
March 15
ISCP
Coordinator, Test
Facilitator
Develop failover test
plan.
April 1
Test Facilitator
Invite participants.
July 10
Test Facilitator
Conduct functional
test.
July 31
Test Facilitator,
ISCP
Coordinator,
POCs
Page 22
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Step
Date Due by
Responsible
Party
Date
Scheduled
Date Held
Finalize after action
report and lessons
learned.
August 15
ISCP
Coordinator
Update ISCP based on
lessons learned.
September
15
ISCP
Coordinator
Approve and distribute
updated version of
ISCP.
September
30
ISCP Director,
ISCP
Coordinator
APPENDIX K
ASSOCIATED PLANS AND
PROCEDURES
NOTE: Information for this section should be available from the system’s System Security Plan
(SSP) and can be copied from the SSP, or reference the applicable section in the SSP and
attach the latest version of the SSP to this contingency plan.
ISCPs for other systems that either
interconnect or support the system should be identified in this appendix.
The most current
version of the ISCP, location of ISCP, and primary point of contact (such as the ISCP
Coordinator) should be noted.
APPENDIX L
BUSINESS IMPACT ANALYSIS
The Business Impact Analysis results should be included in this appendix.
Page 23
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
APPENDIX M
DOCUMENT CHANGE PAGE
Modifications made to this plan since the last printing are as follows:
Record of Changes
Page No.
Change Comment
Date of
Change
Signature
Page 24
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help