Our Applications and Data Criticality templates are tailored based on best practices and standards for application and data criticality analysis. This package has templates, forms, and examples. Our templates will assist you to comply with following regulations and standards like SOX, HIPAA, FISMA, FDA, FISMA, COOP & COG, Basel II, FFIEC, and ISO 27002.

The Application And Data Criticality templates can be used by IT departments of different companies, Healthcare organizations, educational organizations, security consulting companies, pharmaceuticals & biotechnology companies, manufacturing company, servicing companies, financial institutions, law firms, telecommunication companies and others.

Feel free to request a sample before buying.

List of documents in this Risk Assessment templates package:

  1. Applications and Data Criticality Analysis Template  (24 pages)
  2. Example of Completed Application and Data Criticality Analysis Template (39 pages)

Cost: $90
buy-now

Applications and Data Criticality Analysis Template

Objective

The intention of the Application and Data Criticality Analysis is to find out the criticality to the covered entity of all application based components and the potential losses which may be incurred if these components were not accessible for a period of time.  This questionnaire is designed to collect the information necessary to support the development of alternative processing strategies, solutions and IS Recovery plans.

The Business Impact Analysis should be fulfilled prior to this engagement.  The results of the BIA should be used to assess technology requirements based on the business needs.

This questionnaire also serves as a compliance method for meeting many regulatory compliance rule requirements for Application & Data Criticality Analysis.

Table of Contents of Applications and Data Criticality Analysis Template

OBJECTIVE

RESPONDENT INFORMATION

APPLICATION INFORMATION

Application Information
Application Specifications
Application Users
Application Service Providers
Application Vulnerability
Application Recovery Complexity
Application Recovery Plan
Application Recovery History
Application Standard Operating Procedures
Application Source Code and Backup Information
Application Dependencies
Application Data Reconstruction

DATABASE INFORMATION

Database Information
Database Service Providers
Database Vulnerability
Database Recovery Complexity
Database Recovery Information
Database Recovery History
Database Standard Operating Procedures
Database Backup Information
Database Backup Tape Information

HARDWARE (SYSTEM) INFORMATION 

Hardware Information
Hardware Environment Information
Hardware Service Providers
Hardware Vulnerability
Hardware Recovery Complexity
Hardware Recovery Plan
Hardware Recovery History
Hardware Backup Information
Hardware Backup Tape Information

NETWORK INFORMATION

Network Equipment Requirements
Network Service Providers
Network Vulnerability
Network Recovery Complexity
Network Recovery Plan
Network Recovery History
Network Standard Operating Procedures

To view the specific section of this document, please contact us at Bob@supremusgroup.com or call us at (515) 865-4591.

To buy individual template packages, visit following links: