RC.RP-1: Recovery plan execution
Recovery plan is executed during or after a cybersecurity incident
Requirement
A recovery process for disasters and information/cybersecurity incidents shall be developed and executed as appropriate.
Guidance
A process should be developed to determine what immediate actions will be taken in the event of a fire, medical emergency, burglary, natural disaster, or an information/cybersecurity incident.
This process should consider:
- Roles and Responsibilities, including who makes the decision to initiate recovery procedures and who will be the contact with appropriate external stakeholders
- What to do with the company's information and information systems in case of an incident. This includes shutting down or locking computers, moving to a backup site, physically removing important documents, etc.
- Who to call in the event of an incident
Our Implementation
We have documented a combined Disaster Recovery & Business Continuity Plan that defines recovery procedures for all critical systems.
Recovery objectives are defined for each system based on criticality:
- Critical systems (Supabase, GitHub): RTO 1–4 hours, RPO 15 minutes or near-zero
- High-criticality systems (Vercel, Azure OpenAI, Trigger.dev): RTO 1–4 hours
- Medium-criticality systems (Modal, Turso, Qdrant, Upstash): RTO 2–8 hours
Cloud-native advantage: All infrastructure is cloud-hosted with no physical dependencies. Any team member can operate from any location, eliminating the need for physical disaster recovery procedures.
Recovery scenarios covered:
- Cloud provider outage — failover procedures and alternative hosting
- Data corruption/loss — restore from Supabase PITR and provider backups
- Account compromise — credential revocation, key rotation, audit review
- Physical disaster — no impact (cloud-native, remote team)
- Key person unavailability — all founders have admin access, shared password manager
Gaps
- Database restoration validated on dev and production environments (Jan–Feb 2026). Full DR tabletop exercise planned (NEX-359)
- No automated failover between providers — manual procedures only
Evidence
Cross-references
| Framework | Control |
|---|---|
| ISO 27001:2022 | A.5.29 — ICT readiness for business continuity, A.5.30 — ICT readiness |
| NIST CSF | RC.RP-1 |
| CIS Controls v8.1 | 17.4 |