Mechanisms exist to obtain alternate telecommunications services from providers that are separated from primary service providers to reduce susceptibility to the same threats.
Mechanisms exist to obtain alternate telecommunications services from providers that are separated from primary service providers to reduce susceptibility to the same threats.
Mechanisms exist to contractually-require external service providers to have contingency plans that meet organizational contingency requirements.
Mechanisms exist to maintain command and control capabilities via alternate communications channels and designating alternative decision makers if primary decision makers are unavailable.
Mechanisms exist to create recurring backups of data, software and/or system images, as well as verify the integrity of these backups, to ensure the availability of the data to satisfying Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs).
Mechanisms exist to routinely test backups that verify the reliability of the backup process, as well as the integrity and availability of the data.
Mechanisms exist to store backup copies of critical software and other security-related information in a separate facility or in a fire-rated container that is not collocated with the system being backed up.
Mechanisms exist to reimage assets from configuration-controlled and integrity-protected images that represent a secure, operational state.
Cryptographic mechanisms exist to prevent the unauthorized disclosure and/or modification of backup information.
Mechanisms exist to utilize sampling of available backups to test recovery capabilities as part of business continuity plan testing.
Mechanisms exist to transfer backup data to the alternate storage site at a rate that is capable of meeting both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs).