Testing and reviewing continuity plans related to cyber security breaches

Critical
High
Normal
Low

The organization must test and update its response to the security breach at scheduled intervals or after significant changes. For critical parts of the organization, operational plans should be tested at least annually. Test results should be documented and communicated to improve the plan.

Connected other frameworks and requirements:
PR.IP-10: Response and recovery plan tests
NIST CSF
RS.IM-2: Response strategies update
NIST CSF
RC.IM-2: Recovery strategies
NIST CSF

Regular testing and review of continuity plans

Critical
High
Normal
Low

The organization should regularly and at least annually test and review information security continuity plans to ensure that they are valid and effective in adverse situations.

Stakeholders critical to each plan will be involved in the testing of continuity plans, as appropriate.

In addition, in the event of significant changes in operations, the adequacy of continuity plans and related management mechanisms should be reassessed.

Connected other frameworks and requirements:
17.1.3: Verify, review and evaluate information security continuity
ISO 27001
ID.SC-5: Response and recovery
NIST CSF
PR.IP-10: Response and recovery plan tests
NIST CSF
RS.IM-2: Response strategies update
NIST CSF
RC.IM-2: Recovery strategies
NIST CSF
No items found.