|1. The procedures to ensure that all Changes are controlled, including the submission, recording, analysis, decision making, approval, implementation & post-implementation review of the change.
2. A method used to exercise a completed disaster recovery plan. This type of exercise is used to determine whether the information such as phone numbers, manuals, equipment, etc. in the plan is accurate and current. (Source: ENISA - the European Network and Information Security Agency. BCM & Resilience Glossary)