Operational Resilience and Business Continuity

Use the following checklist:

Done? Security Controls and Recommendations
Check box Implement API management and protection.
Check box Establish business continuity planning.
Check box Establish security policies and procedures related to external partner and vendor management.
Check box Establish security policies and procedures related to production changes.
Check box Establish integrity checking to verify software, files, and information integrity by using tools such as Tripwire.
Check box Establish and monitor a baseline of expected data flows for users and systems.
Check box Establish policies and procedures for managing the risks associated with applying changes to applications, system-system interface (API) designs and configurations, and infrastructure components.
Check box Test your plans regularly by simulating failures, exceptions, and recovery using game days.