Publisher Summary Disaster Recovery Plannings (DRPs) are a critical component of information security. They allow mapping out of critical business functions and the way to recover them in the event of failure. They should cover worst-case scenarios and minor disruptions. They should start with a Business Impact Analysis (BIA), which takes an inventory of different systems, their dependencies, and those who relies on them. Once the BIA is complete, it then ranks the systems and rates them on their criticality depending on their criticality, and determines the order of resumption. The DRP is a management document, but should also provide enough detail for a technical reader to understand their specific tasks. IR is another part of recovery planning, and is usually performed separately as it can be a more frequent activity. There are many open source network and security tools that are commonly used for specific tasks. Nessus is known for vulnerability assessment, but can also be used for checking and tracking IR roles. While forensic tools like Sleuth Kit and the coroner's toolkit were designed for forensic analysis after an incident, they can also be used for assisting in routine checks on failed machines and other data recovery operations. Network trending and analysis is important for understanding the way normal traffic flows through your infrastructure. Using tools for secure deletion— such as Secure Delete and DBAN, can keep sensitive data on drives from being released into the public.