Disaster Recovery Checklist
Risk Assessment and BIA
NYDFS Part 500.09 requires a periodic written risk assessment; most Covered Entities run it annually. Cover NPI inventory, threat scenarios (ransomware, wire fraud, vendor outage, natural disaster), and the controls that mitigate each. The CISO signs off; the assessment feeds the rest of this workflow.
Rank business processes by RTO and RPO: policy issuance in PolicyCenter, FNOL intake in ClaimCenter, premium accounting, producer commission processing, and the AMS (Epic, AMS360, EZLynx). Tie each to its supporting systems so dependencies are explicit.
Per Part 500.11 and the NAIC Insurance Data Security Model Law, third-party service providers handling NPI are in scope — TPAs, document destruction, print/mail vendors, cloud-hosted rating engines. Note which carrier portals (loss runs, billing) the agency depends on for renewals.
Most states require 5–7 years of policy/claim file retention; workers comp can require life-of-claim. Document the 72-hour DOI notification window under the NAIC Insurance Data Security Model Law (and shorter timelines under NYDFS Part 500.17) so the IR runbook reflects them.
Communication Plan
Include carrier underwriting and claims contacts, appointed wholesalers, the cyber insurer's incident hotline, outside counsel, the state DOI consumer services line for each state of operation, and key TPAs. Store off-network (printed binder plus encrypted USB at the alternate site).
NYDFS uses the cybersecurity event reporting portal; NAIC-model states use their DOI's secure form. Document who has the credentials and the backup contact if the CISO is unavailable. Coordinate timing with breach counsel before submission.
Pre-draft the GLBA-aligned insured notice, the producer-of-record outage notice, and the carrier outage notice ("binding suspended pending system restoration"). Vermont opt-in language and California CCPA/CPRA disclosures need state-specific variants.
If email and the AMS are down, the tree must still work. Run a call-tree exercise using personal mobile numbers and the SMS notification platform. Capture who did not respond within the target window.
Data Backup and Recovery
Three copies, two media types, one off-site and immutable. Confirm AMS database (Epic, AMS360), document repositories (ImageRight, ePolicy), email archive, and policy/claims systems are all covered. Immutable copies defend against ransomware that targets backup volumes.
Required by NYDFS Part 500.15 and equivalent NAIC-model state regulations. Document the cipher, key custody, and rotation cadence. Backup tapes shipped off-site must be encrypted at the volume level, not just transport-encrypted.
Restore a representative sample — a Tier 1 system, a document repository, and the email archive — into an isolated environment. "Backups complete successfully" in the console is not the same as "data restores cleanly"; the only proof is a tested restore.
Track the gap, owner, and target close date. Material restore failures may require updating the BIA's RTO assumptions and notifying the cyber carrier as a control change.
Infrastructure and Vendors
Include rating engines (TurboRater, EZLynx Rating), the AMS, claims systems, and any carrier-portal credentials. Shadow-IT SaaS used by producers (e-signature, file transfer) is the most commonly missed category and a recurring NPI exposure.
Failover for the AMS, the policy admin system, and the claims system. Confirm that DNS, identity provider, and MFA still resolve at the failover site — the most common drill failure is SSO breaking when the primary IdP is offline.
Part 500.12(b) requires MFA for any individual accessing internal networks from external — including TPAs, claims vendors, and IT contractors with VPN access. Treating MFA as employee-only is a common Part 500 finding.
For any vendor without MFA, suspend access until enrolled or move them to a jump-host with carrier-side MFA. Update the vendor risk register and the next quarterly attestation.
Pull current SOC 2 Type II reports for the AMS host, document repository, and any TPA touching NPI. Note any qualified opinions, bridge-letter gaps, and CUEC (complementary user entity controls) the agency is responsible for implementing.
Testing and Sign-Off
Use a realistic scenario — ransomware encrypting the AMS during open enrollment, or a regional outage during peak FNOL volume after a hurricane. Include underwriting, claims, IT, the producer-of-record, and outside counsel.
Capture each gap with an owner and target date. A drill that produces no plan changes usually means the scenario was too easy or the debrief was rushed.
Required under Part 500.14 and the NAIC model. Cover phishing scenarios specific to insurance — fake loss-run requests, wire-instruction changes on a closing, fraudulent producer appointment emails.
Part 500.17(b) requires an annual written certification or acknowledgement of compliance, signed by the senior governing body or senior officer. File the supporting evidence (risk assessment, restore test logs, training records, tabletop AAR) with the certification.
Use this template in Manifestly
- Annual Insurance Review Checklist
- Risk Management Checklist
- Commercial Policy Renewal Checklist
- Customer Inquiry Checklist
- Insurance Compliance Checklist
- Cyber Security Checklist
- Claims Investigation Checklist
- Complaint Resolution Checklist
- Financial Audit Checklist
- Data Security Checklist
- Risk Mitigation Checklist
- Customer Service Request Handling Checklist
- Policy Renewal Checklist
- Customer Retention Checklist
- Policy Issuance Checklist
- Sales Proposal Checklist
- Claims Auditing Checklist
- Policy Cancellation Checklist
- Customer Onboarding Checklist
- Insurance Training and Development Checklist
- Anti-Money Laundering Checklist
- Training Evaluation Checklist
- Insurance Producer Performance Review
- Cybersecurity Incident Response Checklist
- Office Opening Checklist
- Training Needs Assessment Checklist
- Insurance Committee Meeting Planning Checklist
- Skills Development Checklist
- Audit Preparation Checklist
- Network Security Checklist
- Premium Billing and Collection Checklist
- IT Asset Inventory Management Checklist
- Annual Budgeting Checklist
- Financial Reporting Checklist
- Insurance Agency Lead Generation Checklist
- Compliance Audit Checklist
- Commercial Underwriting Checklist
- Policyholder Feedback Cycle
- Insurance Project Planning Checklist
- Tax Compliance Checklist
- Insurance Agency Office Closing Checklist
- Client Engagement Checklist
- Data Protection Checklist
- Insurance Agency Employee Onboarding
- Enterprise Risk Assessment Checklist
- Training Materials Checklist
- Anti-Fraud Checklist
- Policy Endorsement Checklist
- Quarterly Risk Monitoring Checklist
- Expense Management Checklist
- Insurance IT Security Review Checklist
- Insurance Account Cross-Sell Checklist
- Insurance Project Closure Checklist
- Insurance Marketing Campaign Checklist
- Statutory Financial Reporting Checklist
- Claim Processing Checklist
- Policy Administration Checklist
- Disaster Recovery Plan Checklist
- Business Continuity Checklist
- Business Continuity Planning Checklist
- Business Continuity Plan Checklist
- Disaster Recovery Plan Checklist
- Business Continuity Checklist
- Disaster Recovery Checklist
- Business Continuity Planning Checklist
- Restaurant Technology Backup Checklist
- Business Continuity Planning Checklist
- Business Continuity Planning Checklist
- Cybersecurity Protocol Checklist
- Cybersecurity Checklist for Real Estate
- Manufacturing Cybersecurity Checklist
- Cyber Security Checklist
- Data Security Checklist
- Cybersecurity Incident Response Checklist
- Network Security Checklist
- IT Asset Inventory Management Checklist
- Insurance IT Security Review Checklist
- Data Security Review Checklist
- Cybersecurity Risk Assessment Checklist
- Financial Services IT Security Audit Checklist
- Cybersecurity Incident Response Checklist
- Motor Carrier Cybersecurity Protocol Checklist
Ready to take control of your recurring tasks?
Start Free 14-Day TrialUse Slack? Sign up with one click
