Business continuity planning: Difference between revisions
No edit summary |
|||
(272 intermediate revisions by more than 100 users not shown) | |||
Line 1: | Line 1: | ||
{{Short description|Prevention and recovery from threats that might affect a company}} |
|||
{{multiple issues| |
|||
{{more footnotes|date=June 2012}} |
|||
{{tone|date=September 2013}} |
|||
{{globalize|date=September 2013}} |
|||
{{overly detailed|date=September 2013}} |
|||
}} |
|||
[[Image:BCPLifecycle.gif|thumb|Business continuity planning life cycle]] |
[[Image:BCPLifecycle.gif|thumb|Business continuity planning life cycle]] |
||
'''Business continuity''' may be defined as "the capability of an organization to continue the delivery of products or services at pre-defined acceptable levels following a disruptive incident",<ref>BCI Good Practice Guidelines 2013, quoted in [[Mid Sussex District Council]], [https://www.midsussex.gov.uk/media/1838/mid-sussex-business-continuity-plan.pdf Business Continuity Policy Statement], published April 2018, accessed 19 February 2021</ref> and '''business continuity planning'''<ref>{{cite magazine |magazine=[[Forbes]] |date=June 26, 2015 |url=https://www.forbes.com/sites/johnrampton/2015/06/26/how-to-build-an-effective-and-organized-business-continuity-plan |title=How to Build an Effective and Organized Business Continuity Plan}}</ref><ref>{{cite web |website=[[American Bar]].org (American Bar Association) |url=https://www.americanbar.org/content/dam/aba/events/disaster/surviving_a_disaster_a_lawyers_guide_to_disaster_planning.authcheckdam.pdf |archive-url=https://ghostarchive.org/archive/20221009/https://www.americanbar.org/content/dam/aba/events/disaster/surviving_a_disaster_a_lawyers_guide_to_disaster_planning.authcheckdam.pdf |archive-date=2022-10-09 |url-status=live |date=2011 |title=Surviving a Disaster}}</ref> (or '''business continuity and resiliency planning''') is the process of creating systems of prevention and recovery to deal with potential threats to a company.<ref>Elliot, D.; Swartz, E.; Herbane, B. (1999) Just waiting for the next big bang: business continuity planning in the UK finance sector. Journal of Applied Management Studies, Vol. 8, No, pp. 43–60. Here: p. 48.</ref> In addition to prevention, the goal is to enable ongoing operations before and during execution of [[IT disaster recovery|disaster recovery]].<ref>{{cite magazine |magazine=Business Insurance Magazine |author=Alan Berman |date=March 9, 2015 |url=http://www.businessinsurance.com/article/20150309/ISSUE0401/303159991/constructing-a-successful-business-continuity-plan |title=Constructing a Successful Business Continuity Plan}}</ref> Business continuity is the intended outcome of proper execution of both business continuity planning and disaster recovery. |
|||
'''Business continuity planning''' ('''BCP''', also called ''business continuity and resiliency planning'' ''BCRP'') {{quote|identifies an organization's exposure to internal and external threats and synthesizes hard and soft assets to provide effective prevention and recovery for the organization, while maintaining [[competitive advantage]] and value system integrity|Elliot et al. 1999<ref>Elliot, D.; Swartz, E.; Herbane, B. (1999) Just waiting for the next big bang: business continuity planning in the UK finance sector. Journal of Applied Management Studies, Vol. 8, No, pp. 43–60. Here: p. 48.</ref>}} |
|||
A [[business continuity]] plan is a plan to continue operations if a place of business is affected by different levels of disaster which can be localized short term disasters, to days long building wide problems, to a permanent loss of a building. Such a plan typically explains how the business would recover its operations or move operations to another location after damage by events like [[natural disaster]]s, [[theft]], or flooding. For example, if a fire destroys an office building or data center, the people and business or data center operations would relocate to a recovery site. |
|||
Several [[business continuity standards]] have been published by various standards bodies to assist in checklisting ongoing planning tasks.<ref>{{cite web |title=Business Continuity Plan |publisher=United States Department of Homeland Security |url=https://www.ready.gov/business/implementation/continuity |access-date=4 October 2018 |archive-date=7 December 2018 |archive-url=https://web.archive.org/web/20181207233700/https://www.ready.gov/business/implementation/continuity |url-status=dead }}</ref> |
|||
Business continuity requires a top-down approach to identify an organisation's minimum requirements to ensure its viability as an entity. An organization's resistance to failure is "the ability ... to withstand changes in its environment and still function".<ref name=auto>{{Cite journal |author1=Ian McCarthy |author2=Mark Collard |author3=Michael Johnson |title=Adaptive organizational resilience: an evolutionary perspective |journal=Current Opinion in Environmental Sustainability |volume=28 |pages=33–40 |doi=10.1016/j.cosust.2017.07.005|year=2017 |bibcode=2017COES...28...33M }}</ref> Often called resilience, resistance to failure is a capability that enables organizations to either endure environmental changes without having to permanently adapt, or the organization is forced to adapt a new way of working that better suits the new environmental conditions.<ref name=auto/> |
|||
==Overview== |
|||
Any event that could negatively impact operations should be included in the plan, such as [[supply chain]] interruption, loss of or damage to critical infrastructure (major machinery or computing/network resource). As such, BCP is a [[subset]] of [[risk management]].<ref>{{cite web|url=http://flevy.com/blog/business-continuity-planning/|title=Business Continuity Planning |last=Intrieri|first=Charles|date=10 September 2013|publisher=Flevy|access-date=29 September 2013}}</ref> In the U.S., government entities refer to the process as ''[[Continuity of Operations Plan|continuity of operations planning]]'' (COOP).<ref>{{Cite web|url=https://www.fema.gov/emergency-managers/national-preparedness/continuity|title=Continuity Resources and Technical Assistance | FEMA.gov|website=www.fema.gov}}</ref> A '''business continuity plan'''<ref name=D.BCP>{{Cite web|url=https://www.aig.co.uk/content/dam/aig/emea/united-kingdom/documents/property-insights/business-continuity-planning-guidelines-for-preparation-of-your-plan.pdf|title=A Guide to the preparation of a Business Continuity Plan|access-date=2019-02-08|archive-date=2019-02-09|archive-url=https://web.archive.org/web/20190209125238/https://www.aig.co.uk/content/dam/aig/emea/united-kingdom/documents/property-insights/business-continuity-planning-guidelines-for-preparation-of-your-plan.pdf|url-status=dead}}</ref> outlines a range of disaster scenarios and the steps the business will take in any particular scenario to return to regular trade. BCP's are written ahead of time and can also include precautions to be put in place. Usually created with the input of key staff as well as stakeholders, a BCP is a set of contingencies to minimize potential harm to businesses during adverse scenarios.<ref>{{cite web|title=Business Continuity Planning (BCP) for Businesses of all Sizes|url=http://www.williamadvisorygroup.com/business-continuity-planning-bcp-for-businesses-of-all-sizes/|date=19 April 2017|access-date=28 April 2017|archive-url=https://web.archive.org/web/20170424090047/http://www.williamadvisorygroup.com/business-continuity-planning-bcp-for-businesses-of-all-sizes/|archive-date=24 April 2017|url-status=dead}}</ref> |
|||
===Resilience=== |
|||
A 2005 analysis of how disruptions can adversely affect the operations of corporations and how investments in resilience can give a [[competitive advantage]] over entities not prepared for various contingencies<ref>{{cite book |author=Yossi Sheffi |url=http://resilient-enterprise.mit.edu |title=The Resilient Enterprise: Overcoming Vulnerability for Competitive Enterprise |publisher=MIT Press |date=October 2005|author-link=Yossi Sheffi}}</ref> extended then-common business continuity planning practices. Business organizations such as the [[Council on Competitiveness]] embraced this resilience goal.<ref>{{cite web |url=http://www.compete.org/publications/detail/31/the-resilient-economy-integrating-competitiveness-and-security |title=Transform. The Resilient Economy |access-date=2019-02-04 |archive-date=2013-10-22 |archive-url=https://web.archive.org/web/20131022142939/http://www.compete.org/publications/detail/31/the-resilient-economy-integrating-competitiveness-and-security/ |url-status=dead }}</ref> |
|||
Adapting to change in an apparently slower, more evolutionary manner - sometimes over many years or decades - has been described as being more resilient,<ref>{{Cite web | url=https://www.newsday.com/2.811/jamie-herzlich/small-business-a-good-plan-shields-from-storm-clouds-1.1322137?firstfree=yes |title = Newsday | Long Island's & NYC's News Source | Newsday}}</ref> and the term "strategic resilience" is now used to go beyond resisting a one-time crisis, but rather continuously anticipating and adjusting, "before the case for change becomes desperately obvious". |
|||
This approach is sometimes summarized as: [[preparedness]],<ref>{{cite conference |title=Business Continuity Preparedness and the Mindfulness State of Mind |book-title=AMCIS 2007 Proceedings |quote= "An estimated 80 percent of companies without a well-conceived and tested business continuity plan, go out of business within two years of a major disaster" (Santangelo 2004) |author1=Tiffany Braun |author2=Benjamin Martz |s2cid=7698286 |date=2007}}</ref> protection, response and recovery.<ref>{{cite web |url=https://www.isms.online/iso-27001/annex-a-17-information-security-aspects-of-business-continuity-management/ |title=Annex A.17: Information Security Aspects of Business Continuity Management |publisher=ISMS.online |date=November 2021}}</ref> |
|||
Resilience Theory can be related to the field of Public Relations. Resilience is a communicative process that is constructed by citizens, families, media system, organizations and governments through everyday talk and mediated conversation.<ref>{{Cite web|url=https://www.researchgate.net/publication/322693327|title=Communication and resilience: concluding thoughts and key issues for future research|website=www.researchgate.net}}</ref> |
|||
Any event that could negatively impact operations is included in the plan, such as [[supply chain]] interruption, loss of or damage to critical infrastructure (major machinery or computing /network resource). As such, [[risk management]] must be incorporated as part of BCP.<ref>{{cite web|url=http://flevy.com/blog/business-continuity-planning/|title=Business Continuity Planning|last=Intrieri|first=Charles|date=10 September 2013|publisher=Flevy|accessdate=29 September 2013}}</ref>In the US, government entities refer to the process as ''continuity of operations planning'' (COOP).<ref>http://www.fema.gov/guidance-directives</ref> |
|||
The theory is based on the work of [[Patrice Buzzanell|Patrice M. Buzzanell]], a professor at the Brian Lamb School of Communication at [[Purdue University]]. In her 2010 article, "Resilience: Talking, Resisting, and Imagining New Normalcies Into Being"<ref>{{Cite journal|last=Buzzanell|first=Patrice M.|date=2010|title=Resilience: Talking, Resisting, and Imagining New Normalcies Into Being|journal=Journal of Communication|volume=60|issue=1|pages=1–14|doi=10.1111/j.1460-2466.2009.01469.x|issn=1460-2466}}</ref> Buzzanell discussed the ability for organizations to thrive after having a crisis through building resistance. Buzzanell notes that there are five different processes that individuals use when trying to maintain resilience- crafting normalcy, affirming identity anchors, maintaining and using communication networks, putting alternative logics to work and downplaying negative feelings while foregrounding positive emotions. |
|||
In December 2006, the [[BSI Group|British Standards Institution]] (BSI) released an independent standard for BCP — BS 25999-1. Prior to the introduction of [[BS 25999]], BCP professionals relied on information security standard [[BS 7799]], which only peripherally addressed BCP to improve an organization's information security procedures. BS 25999's applicability extends to all organizations. In 2007, the BSI published BS 25999-2 "Specification for Business Continuity Management", which specifies requirements for implementing, operating and improving a documented business continuity management system (BCMS). |
|||
When looking at the resilience theory, the crisis communication theory is similar, but not the same. The crisis communication theory is based on the reputation of the company, but the resilience theory is based on the process of recovery of the company. There are five main components of resilience: crafting normalcy, affirming identity anchors, maintaining and using communication networks, putting alternative logics to work, and downplaying negative feelings while foregrounding negative emotions.<ref>{{Cite journal|last=Buzzanell|first=Patrice M.|date=March 2010|title=Resilience: Talking, Resisting, and Imagining New Normalcies Into Being|journal=Journal of Communication|volume=60|issue=1|pages=1–14|doi=10.1111/j.1460-2466.2009.01469.x|issn=0021-9916}}</ref> Each of these processes can be applicable to businesses in crisis times, making resilience an important factor for companies to focus on while training. |
|||
Business continuity management is standardised across the UK by British Standards (BS) through BS 25999-2:2007 and BS 25999-1:2006. |
|||
BS 25999-2:2007 business continuity management is the British Standard for business continuity management across all organizations. This includes industry and its sectors. The standard provides a best practice framework to minimize disruption during unexpected events that could bring business to a standstill. The document gives you a practical plan to deal with most eventualities – from extreme weather conditions to terrorism, IT system failure and staff sickness.<ref>British Standards Institution (2006). Business continuity management-Part 1: Code of practice :London</ref> |
|||
There are three main groups that are affected by a crisis. They are [[wikt:micro|micro]] (individual), [[wikt:meso|meso]] (group or organization) and [[wikt:macro|macro]] (national or interorganizational). There are also two main types of resilience, which are proactive and post resilience. Proactive resilience is preparing for a crisis and creating a solid foundation for the company. Post resilience includes continuing to maintain communication and check in with employees.<ref>{{Cite journal|last=Buzzanell|first=Patrice M.|date=2018-01-02|title=Organizing resilience as adaptive-transformational tensions|journal=Journal of Applied Communication Research|volume=46|issue=1|pages=14–18|doi=10.1080/00909882.2018.1426711|s2cid=149004681|issn=0090-9882}}</ref> Proactive resilience is dealing with issues at hand before they cause a possible shift in the work environment and post resilience maintaining communication and accepting changes after an incident has happened. Resilience can be applied to any organization. |
|||
This document was superseded in November 2012 by the British standard BS ISO22301:2012.<ref>British Standards Institution (2012). Societal security – Business continuity management Systems – Requirements: London</ref> |
|||
In New Zealand, the Canterbury University Resilient Organisations programme developed an assessment tool for benchmarking the Resilience of Organisations.<ref>{{cite web |url=http://www.resorgs.org.nz |date=March 22, 2011 |title=Resilient Organisations}}</ref> It covers 11 categories, each having 5 to 7 questions. A ''Resilience Ratio'' summarizes this evaluation.<ref>{{cite web |url=https://resiliencei.com/resilience-diagnostic |title=Resilience Diagnostic |date=November 28, 2017}}</ref> |
|||
===Continuity=== |
|||
In 2004, following crises in the preceding years, the UK government passed the Civil Contingencies Act 2004 (The Act). This provides the legislation for civil protection in the UK. |
|||
Plans and procedures are used in business continuity planning to ensure that the critical organizational operations required to keep an organization running continue to operate during events when key dependencies of operations are disrupted. Continuity does not need to apply to every activity which the organization undertakes. For example, under [[ISO 22301|ISO 22301:2019]], organizations are required to define their business continuity objectives, the minimum levels of product and service operations which will be considered acceptable and the [[#Maximum RTO|maximum tolerable period of disruption]] (MTPD) which can be allowed.<ref>ISO, [https://www.bsigroup.com/globalassets/Documents/iso-22301/resources/iso-22301-implementation-guide-2016.pdf ISO 22301 Business Continuity Management: Your implementation guide], published, accessed 20 February 2021</ref> |
|||
A major cost in planning for this is the preparation of audit compliance management documents; automation tools are available to reduce the time and cost associated with manually producing this information. |
|||
The Act was separated into two distinct parts: |
|||
Part 1 focuses on local arrangements for civil protection, establishing a statutory framework of roles and responsibilities for local responders. Part 2 focused on emergency powers, establishing a modern framework for the use of special legislative measures that might be necessary to deal with the effects of the most serious emergency. |
|||
==Inventory== |
|||
The Act is telling responders and planners that businesses need to have continuity planning measures in place in order to survive and continue to thrive whilst working towards keeping the incident as minimal as possible.<ref>Cabinet Office. (2004). overview of the Act. In: Civil Contingencies Secretariat Civil Contingencies Act 2004: a short. London: Civil Contingencies Secretariat</ref> |
|||
Planners must have information about: |
|||
* Equipment |
|||
* Supplies and suppliers |
|||
* Locations, including other offices and [[Backup site|backup]]/work area recovery (WAR) sites |
|||
* Documents and documentation, including which have off-site backup copies:<ref name=D.BCP/> |
|||
** Business documents |
|||
** Procedure documentation |
|||
==Analysis== |
==Analysis== |
||
The analysis phase consists of |
The analysis phase consists of: |
||
* Impact analysis |
|||
* Threat and risks analysis |
|||
* Impact scenarios |
|||
Quantifying of loss ratios must also include "dollars to defend a lawsuit."<ref>{{Cite web|url=http://www.jcrcny.org/wp-content/uploads/2013/10/EmergencyManual.2.0.pdf |archive-url=https://ghostarchive.org/archive/20221009/http://www.jcrcny.org/wp-content/uploads/2013/10/EmergencyManual.2.0.pdf |archive-date=2022-10-09 |url-status=live|title=Emergency Planning}}</ref> It has been estimated that a dollar spent in loss prevention can prevent "seven dollars of disaster-related economic loss."<ref>{{cite web |website=RI.gov |title=Can your Organization survive a natural disaster? |url=http://www.riema.ri.gov/berhodyready/files/Session_1_Business%20Continuity.pdf |archive-url=https://ghostarchive.org/archive/20221009/http://www.riema.ri.gov/berhodyready/files/Session_1_Business%20Continuity.pdf |archive-date=2022-10-09 |url-status=live |
|||
| author=Helen Clark |date=August 15, 2012}}</ref> |
|||
===Business impact analysis (BIA)=== |
===Business impact analysis (BIA)=== |
||
A |
A business impact analysis (BIA) differentiates [[Critical system|critical]] (urgent) and non-critical (non-urgent) organization functions/activities. A [[Mission-essential function|function]] may be considered critical if dictated by law. |
||
* [[Recovery Point Objective]] (RPO) – the acceptable latency of data that will not be recovered. For example is it acceptable for the company to lose 2 days of data?<ref>{{cite web|last1=May|first1=Richard|title=Finding RPO and RTO|url=http://www.virtualdcs.co.uk/blog/business-continuity-planning-rpo-and-rto.html}}</ref> |
|||
* [[Recovery Time Objective]] (RTO) – the acceptable amount of time to restore the function. |
|||
Each function/activity typically relies on a combination of constituent components in order to operate: |
|||
The recovery point objective must ensure that the maximum tolerable data loss for each activity is not exceeded. |
|||
The recovery time objective must ensure that the [[Maximum Tolerable Period of Disruption]] (MTPoD) for each activity is not exceeded. |
|||
* Human resources (full-time staff, part-time staff, or contractors) |
|||
Next, the impact analysis results in the recovery requirements for each critical function. Recovery requirements consist of the following information: |
|||
* IT systems |
|||
* The business requirements for recovery of the critical function, and/or |
|||
* Physical assets (mobile phones, laptops/workstations etc.) |
|||
* The technical requirements for recovery of the critical function |
|||
* Documents (electronic or physical) |
|||
For each function, two values are assigned: |
|||
===Threat and risk analysis (TRA)=== |
|||
* Recovery point objective (RPO) – the acceptable latency of data that will not be recovered. For example, is it acceptable for the company to lose 2 days of data?<ref>{{cite web |last1=May|first1=Richard|title=Finding RPO and RTO |url=http://www.virtualdcs.co.uk/blog/business-continuity-planning-rpo-and-rto.html|url-status=dead |archive-url=https://web.archive.org/web/20160303224604/http://www.virtualdcs.co.uk/blog/business-continuity-planning-rpo-and-rto.html|archive-date=2016-03-03}}</ref> The recovery point objective must ensure that the maximum tolerable data loss for each activity is not exceeded. |
|||
* Recovery time objective (RTO) – the acceptable amount of time to restore the function |
|||
==== Maximum RTO ==== |
|||
After defining recovery requirements, each potential threat may require unique recovery steps. Common threats include: |
|||
Maximum time constraints for how long an enterprise's key products or services can be unavailable or undeliverable before stakeholders perceive unacceptable consequences have been named as: |
|||
{{columns-list|3| |
|||
* {{visible anchor|Maximum tolerable period of disruption}} (MTPoD) |
|||
* [[Epidemic]] |
|||
* Maximum tolerable downtime (MTD) |
|||
* Maximum tolerable outage (MTO) |
|||
* Maximum acceptable outage (MAO)<ref>{{cite web |title=Maximum Acceptable Outage (Definition) |url=http://www.riskythinking.com/glossary/maximum_acceptable_outage.php |access-date=4 October 2018 |website=riskythinking.com |publisher=Albion Research Ltd.}}</ref><ref>{{cite web |title=BIA Instructions, BUSINESS CONTINUITY MANAGEMENT - WORKSHOP | url=http://www.driecentral.org/biainstructions.pdf |archive-url=https://ghostarchive.org/archive/20221009/http://www.driecentral.org/biainstructions.pdf |archive-date=2022-10-09 |url-status=live |website=driecentral.org |access-date=4 October 2018 |publisher=Disaster Recovery Information Exchange (DRIE) Central}}</ref> |
|||
According to ISO 22301 the terms ''maximum acceptable outage'' and ''maximum tolerable period of disruption'' mean the same thing and are defined using exactly the same words.<ref>{{cite web |title=Plain English ISO 22301 2012 Business Continuity Definitions |url=http://www.praxiom.com/iso-22301-definitions.htm |website=praxiom.com |publisher=Praxiom Research Group LTD. |access-date=4 October 2018}}</ref> Some standards use the term ''maximum downtime limit''.<ref>{{cite web |url=https://www.ncsc.gov.bh/assets/static_images/policies/baseline-cybersecurity-controls-v1.pdf |page=12 |title=Baseline Cyber Security Controls |publisher=[[Ministry of Interior (Bahrain)|Ministry of Interior]] - National Cyber Security Center |year=2022}}</ref> |
|||
====Consistency==== |
|||
When more than one system crashes, recovery plans must balance the need for data consistency with other objectives, such as RTO and RPO. |
|||
<ref name=OpsBLog.Consistency>{{cite web |url=https://www.opscentre.com/blog/2016/03/22/recovery-consistency-objective |title=The Rise and Rise of the Recovery Consistency Objective |access-date=September 9, 2019 |date=2016-03-22 |archive-date=2020-09-26 |archive-url=https://web.archive.org/web/20200926060225/https://www.opscentre.com/blog/2016/03/22/recovery-consistency-objective/ |url-status=dead }}</ref> '''Recovery Consistency Objective''' (RCO) is the name of this goal. It applies [[data consistency]] objectives, to define a measurement for the consistency of distributed business data within interlinked systems after a disaster incident. Similar terms used in this context are "Recovery Consistency Characteristics" (RCC) and "Recovery Object Granularity" (ROG).<ref>"How to evaluate a recovery management solution." West World Productions, 2006 [http://www.thefreelibrary.com/How+to+evaluate+a+recovery+management+solution-a0147748661]</ref> |
|||
While RTO and RPO are absolute per-system values, RCO is expressed as a percentage that measures the deviation between actual and targeted state of business data across systems for process groups or individual business processes. |
|||
The following formula calculates RCO with "n" representing the number of business processes and "entities" representing an abstract value for business data: |
|||
<math>\text{RCO} = 1 - \frac{(\text{number of inconsistent entities})_n}{(\text{number of entities})_n}</math> |
|||
100% RCO means that post recovery, no business data deviation occurs.<ref>{{cite web |author1=Josh Krischer |author2=Donna Scott |author3=Roberta J. Witty |title=Six Myths About Business Continuity Management and Disaster Recovery |publisher=Gartner Research | url=http://www.gartner.com/it/content/868800/868812/six_myths_about_bcm.pdf |archive-url=https://ghostarchive.org/archive/20221009/http://www.gartner.com/it/content/868800/868812/six_myths_about_bcm.pdf |archive-date=2022-10-09 |url-status=live}}</ref> |
|||
===Threat and risk analysis (TRA)=== |
|||
After defining recovery requirements, each potential threat may require unique recovery steps (contingency plans or playbooks). Common threats include: |
|||
{{columns-list|colwidth=18em| |
|||
* [[Epidemic]]/pandemic |
|||
* [[Earthquake]] |
* [[Earthquake]] |
||
* Fire |
* Fire |
||
Line 52: | Line 94: | ||
* [[Sabotage]] (insider or external threat) |
* [[Sabotage]] (insider or external threat) |
||
* [[Hurricane]] or other major storm |
* [[Hurricane]] or other major storm |
||
* [[Power |
* [[Power outage]] |
||
* Water outage (supply interruption, contamination) |
|||
* Telecomms outage |
|||
* IT outage |
|||
* [[Terrorism]]/[[Piracy]] |
* [[Terrorism]]/[[Piracy]] |
||
* [[War]]/civil disorder |
* [[War]]/civil disorder |
||
* Theft (insider or external threat, vital information or material) |
* Theft (insider or external threat, vital information or material) |
||
* Random failure of mission-critical systems |
* Random failure of mission-critical systems |
||
* Single point dependency |
|||
* Power cut |
|||
* Supplier failure |
|||
* Data corruption |
|||
* Misconfiguration |
|||
* Network outage |
|||
}} |
}} |
||
The impact of an epidemic can be regarded as purely human, and may be alleviated with technical and business solutions. However, if people behind these plans are affected by the disease, then the process can stumble. |
|||
During the 2002–2003 [[SARS]] outbreak, some organizations |
The above areas can cascade: Responders can stumble. Supplies may become depleted. During the 2002–2003 [[SARS]] outbreak, some organizations compartmentalized and rotated teams to match the [[incubation period]] of the disease. They also banned in-person contact during both business and non-business hours. This increased [[Resilience (organizational)|resiliency]] against the threat. |
||
===Impact scenarios=== |
===Impact scenarios=== |
||
Impact scenarios are identified and documented: |
|||
After identifying the applicable threats, impact scenarios are considered to support the development of a business recovery plan. Business continuity testing plans may document scenarios for each identified threats and impact scenarios. More localized impact scenarios – for example loss of a specific floor in a building – may also be documented. The BC plans should reflect the requirements to recover the business in the widest possible damage. The risk assessment should cater to developing impact scenarios that are applicable to the business or the premises it operates. For example, it might not be logical to consider tsunami in the region of Mideast since the likelihood of such a threat is negligible.etc |
|||
* need for medical supplies<ref>{{cite journal|doi=10.1016/j.ijpe.2009.10.004 |title=Medical supply location and distribution in disasters}}{{clarify|reason={{pipe}}doi= does not match {{pipe}}title=|date=December 2021}}</ref> |
|||
* need for transportation options<ref>{{cite web |
|||
|url=https://scholar.google.com/scholar_url?url=https://orbi.uliege.be/bitstream/2268/8333/1/JORS_Barbarosoglu_Arda_2004.pdf%26hl=en%26sa=X%26scisig=AAGBfm0xx_ynzP503rz-gtdgZVSN_h-m7w%26nossl=1%26oi=scholarr |archive-url=https://ghostarchive.org/archive/20221009/https://orbi.uliege.be/bitstream/2268/8333/1/JORS_Barbarosoglu_Arda_2004.pdf%26hl=en%26sa=X%26scisig=AAGBfm0xx_ynzP503rz-gtdgZVSN_h-m7w%26nossl=1%26oi=scholarr |archive-date=2022-10-09 |url-status=live |
|||
|title=transportation planning in disaster recovery |website=SCHOLAR.google.com}}</ref> |
|||
* civilian impact of nuclear disasters<ref>{{Cite web|url=https://www.globalsecurity.org/security/library/report/2004/hsc-planning-scenarios-jul04_exec-sum.pdf |archive-url=https://ghostarchive.org/archive/20221009/https://www.globalsecurity.org/security/library/report/2004/hsc-planning-scenarios-jul04_exec-sum.pdf |archive-date=2022-10-09 |url-status=live|title=PLANNING SCENARIOS Executive Summaries}}</ref> |
|||
* need for business and data processing supplies<ref>{{cite magazine |
|||
|author=Chloe Demrovsky |
|||
|title=Holding It All Together |
|||
|magazine=Manufacturing Business Technology |date=December 22, 2017}}</ref> |
|||
These should reflect the widest possible damage. |
|||
===Recovery requirement=== |
|||
After the analysis phase, business and technical recovery requirements precede the solutions phase. Asset inventories allow for quick identification of deployable resources. For an office-based, IT-intensive business, the plan requirements may cover desks, human resources, applications, data, manual workarounds, computers and peripherals. Other business environments, such as production, distribution, warehousing etc. will need to cover these elements, but likely have additional issues. |
|||
==Tiers of preparedness== |
|||
The robustness of an [[emergency management]] plan is dependent on how much money an organization or business can place into the plan. The organization must balance realistic feasibility with the need to properly prepare. In general, every $1 put into an emergency management plan will prevent $7 of loss.<ref>{{cite web|title=Can Your Organization Survive a Natural Disaster?|url=http://msmonline.bu.edu/survive-a-natural-disaster/|website=Boston University|accessdate=22 December 2014}}</ref> |
|||
[[SHARE (computing)|SHARE]]'s seven tiers of [[IT disaster recovery|disaster recovery]]<ref>developed by SHARE's Technical Steering Committee, working with IBM</ref> released in 1992, were updated in 2012 by IBM as an eight tier model:<ref name=IBM.2012>{{cite web |
|||
|url=https://share.confex.com/share/118/webprogram/Handout/Session10387/Session%2010387%20Business%20Continuity%20Soloution%20Selection%20Methodology%2003-7-2012.pdf |archive-url=https://ghostarchive.org/archive/20221009/https://share.confex.com/share/118/webprogram/Handout/Session10387/Session%2010387%20Business%20Continuity%20Soloution%20Selection%20Methodology%2003-7-2012.pdf |archive-date=2022-10-09 |url-status=live |
|||
|title=A Business Continuity Solution Selection Methodology |publisher=IBM Corp. |
|||
|author=Ellis Holman |date=March 13, 2012}}</ref> |
|||
* '''Tier 0''' – '''No off-site data''' • Businesses with a Tier 0 Disaster Recovery solution have no Disaster Recovery Plan. There is no saved information, no documentation, no backup hardware, and no contingency plan. Typical recovery time: ''The length of recovery time in this instance is unpredictable''. In fact, it may not be possible to recover at all. |
|||
*'''Tier 1''' – '''Data backup with no Hot Site''' • Businesses that use Tier 1 Disaster Recovery solutions back up their data at an off-site facility. Depending on how often backups are made, they are prepared to accept ''several days to weeks of data loss'', but their backups are secure off-site. However, this Tier lacks the systems on which to restore data. Pickup Truck Access Method (PTAM). |
|||
*'''Tier 2''' – '''Data backup with Hot Site''' • Tier 2 Disaster Recovery solutions make regular backups on tape. This is combined with an off-site facility and infrastructure (known as a hot site) in which to restore systems from those tapes in the event of a disaster. This tier solution will still result in the need to recreate several hours to days worth of data, but ''it is less unpredictable in recovery time''. Examples include: PTAM with Hot Site available, IBM Tivoli Storage Manager. |
|||
*'''Tier 3''' – '''Electronic vaulting''' • Tier 3 solutions utilize components of Tier 2. Additionally, some mission-critical data is electronically vaulted. This electronically vaulted data is typically more current than that which is shipped via PTAM. As a result there is ''less data recreation or loss after a disaster occurs''. |
|||
*'''Tier 4''' – '''Point-in-time copies''' • Tier 4 solutions are used by businesses that require both greater data currency and faster recovery than users of lower tiers. Rather than relying largely on shipping tape, as is common in the lower tiers, Tier 4 solutions begin to incorporate more disk-based solutions. ''Several hours of data loss is still possible'', but it is easier to make such point-in-time (PIT) copies with greater frequency than data that can be replicated through tape-based solutions. |
|||
*'''Tier 5''' – '''Transaction integrity''' • Tier 5 solutions are used by businesses with a requirement for consistency of data between production and recovery data centers. There is ''little to no data loss'' in such solutions; however, the presence of this functionality is entirely dependent on the application in use. |
|||
*'''Tier 6''' – '''Zero or little data loss''' • Tier 6 Disaster Recovery solutions ''maintain the highest levels of data currency''. They are used by businesses with little or no tolerance for data loss and who need to restore data to applications rapidly. These solutions have no dependence on the applications to provide data consistency. |
|||
*'''Tier 7''' – '''Highly automated, business-integrated solution''' • Tier 7 solutions include all the major components being used for a Tier 6 solution with the additional integration of automation. This allows a Tier 7 solution to ensure consistency of data above that of which is granted by Tier 6 solutions. Additionally, recovery of the applications is automated, allowing for restoration of systems and applications much faster and more reliably than would be possible through manual Disaster Recovery procedures. |
|||
==Solution design== |
==Solution design== |
||
Two main requirements from the impact analysis stage are: |
|||
The solution design phase identifies the most cost-effective [[disaster recovery]] solution that meets two main requirements from the impact analysis stage. For IT purposes, this is commonly expressed as the minimum application and data requirements and the time in which the minimum application and application data must be available. |
|||
* For IT: the minimum application and data requirements and the time in which they must be available. |
|||
* Outside IT: preservation of hard copy (such as contracts). A process plan must consider skilled staff and embedded technology. |
|||
This phase overlaps with [[IT disaster recovery|disaster recovery planning]]. |
|||
The solution phase determines: |
|||
* [[crisis management]] command structure |
|||
* [[Crisis management]] command structure |
|||
* [[Backup site|secondary work sites]] |
|||
* |
* Telecommunication architecture between primary and secondary work sites |
||
* [[ |
* [[Data replication]] methodology between primary and secondary work sites |
||
* [[Backup site]] with applications, data and work space |
|||
* applications and data required at the secondary work site |
|||
* physical data requirements at the secondary work site. |
|||
=={{anchor|published standards}} Standards== |
|||
==Implementation== |
|||
===ISO Standards === |
|||
The implementation phase involves policy changes, material acquisitions, staffing and testing. |
|||
There are many standards that are available to support business continuity planning and management.<ref name="Tierney">{{cite journal |last1=Tierney |first1=Kathleen |title=Disaster Governance: Social, Political, and Economic Dimensions |journal=Annual Review of Environment and Resources |date=21 November 2012 |volume=37 |issue=1 |pages=341–363 |doi=10.1146/annurev-environ-020911-095618 |s2cid=154422711 |language=en |issn=1543-5938|doi-access=free }}</ref><ref name="Partridge">{{cite book |last1=Partridge |first1=Kevin G. |date= 2011 |last2=Young |first2=Lisa R. |title=CERT® Resilience Management Model (RMM) v1.1: Code of Practice Crosswalk Commercial Version 1.1 |url=https://apps.dtic.mil/sti/pdfs/ADA585451.pdf |publisher=Carnegie Mellon University |location=Pittsburgh, PA |access-date=5 January 2023}}</ref> |
|||
The [[International Organization for Standardization]] (ISO) has for example developed a whole series of standards on Business continuity management systems <ref>{{Cite web|url=https://www.iso.org/committee/5259148/x/catalogue/p/1/u/0/enwiki/w/0/d/0|title=ISO - ISO/TC 292 - Security and resilience |website=International Organization for Standardization}}</ref> under responsibility of technical committee [[ISO/TC 292]]: |
|||
* [[ISO 22300]]:2021 Security and resilience – Vocabulary (Replaces [[ISO 22300]]:2018 Security and resilience - Vocabulary and [[ISO 22300]]:2012 Security and resilience - Vocabulary.)<ref>{{Cite web|url=https://www.iso.org/cms/render/live/en/sites/isoorg/contents/data/standard/06/84/68436.html|title=ISO 22300:2018|website=ISO|date=12 July 2019 }}</ref> |
|||
==Testing and organizational acceptance== |
|||
* [[ISO 22301]]:2019 Security and resilience – Business continuity management systems – Requirements (Replaces [[ISO 22301]]:2012.)<ref>{{Cite web|url=https://www.iso.org/cms/render/live/en/sites/isoorg/contents/data/standard/07/51/75106.html|title=ISO 22301:2019|website=ISO|date=5 June 2023 }}</ref> |
|||
The purpose of testing is to achieve organizational acceptance that the solution satisfies the recovery requirements. Plans may fail to meet expectations due to insufficient or inaccurate recovery requirements, solution design flaws or solution implementation errors. Testing may include: |
|||
* [[ISO 22313]]:2020 Security and resilience – Business continuity management systems – Guidance on the use of ISO 22301 (Replaces [[ISO 22313]]:2012 Security and resilience - Business continuity management systems - Guidance on the use of ISO 22301.)<ref>{{Cite web|url=https://www.iso.org/cms/render/live/en/sites/isoorg/contents/data/standard/07/51/75107.html|title=ISO 22313:2020|website=ISO}}</ref> |
|||
* Crisis command team call-out testing |
|||
* Technical swing test from primary to secondary work locations |
|||
* Technical swing test from secondary to primary work locations |
|||
* Application test |
|||
* Business process test |
|||
* [[ISO/TS 22317]]:2021 Security and resilience – Business continuity management systems – Guidelines for business impact analysis - (Replaces ISO/TS 22315:2015 Societal security – Business continuity management systems – Guidelines for business impact analysis.)<ref>{{Cite web|url=https://www.iso.org/standard/79000.html|title=Iso/Ts 22317:2021}}</ref> |
|||
At minimum, testing is conducted on a biannual schedule. |
|||
* [[ISO/TS 22318]]:2021 Security and resilience – Business continuity management systems – Guidelines for supply chain continuity (Replaces ISO/TS 22318:2015 Societal security — Business continuity management systems — Guidelines for supply chain continuity.)<ref>{{Cite web|url=https://www.iso.org/standard/79001.html|title=Iso/Ts 22318:2021}}</ref> |
|||
* [[ISO/TS 22330]]:2018 Security and resilience – Business continuity management systems – Guidelines for people aspects on business continuity (Current as of 2022.)<ref>{{Cite web|url=https://www.iso.org/cms/render/live/en/sites/isoorg/contents/data/standard/05/00/50067.html|title=ISO/TS 22330:2018|website=ISO|date=12 July 2019 }}</ref> |
|||
* [[ISO/TS 22331]]:2018 Security and resilience – Business continuity management systems – Guidelines for business continuity strategy - (Current as of 2022.)<ref>{{Cite web|url=https://www.iso.org/cms/render/live/en/sites/isoorg/contents/data/standard/05/00/50068.html|title=ISO/TS 22331:2018|website=ISO}}</ref> |
|||
* [[ISO/TS 22332]]:2021 Security and resilience – Business continuity management systems – Guidelines for developing business continuity plans and procedures (Current as of 2022.)<ref>{{Cite web|url=https://www.iso.org/standard/50069.html|title=Iso/Ts 22332:2021}}</ref> |
|||
* [[ISO/IEC/TS 17021-6]]:2014 Conformity assessment – Requirements for bodies providing audit and certification of management systems – Part 6: Competence requirements for auditing and certification of business continuity management systems.<ref>{{Cite web|url=https://www.iso.org/cms/render/live/en/sites/isoorg/contents/data/standard/06/49/64956.html|title=ISO/IEC TS 17021-6:2014|website=ISO}}</ref> |
|||
* ISO/IEC 24762:2008 Information technology — Security techniques — Guidelines for information and communications technology disaster recovery services (withdrawn)<ref>{{cite web |title=ISO/IEC 24762:2008 |url=https://www.iso.org/standard/41532.html |website=ISO |date=6 March 2008 |access-date=5 January 2023 |language=en}}</ref> |
|||
The 2008 book ''Exercising for Excellence'', published by The [[British Standards Institution]] identified three types of exercises that can be employed when testing business continuity plans. |
|||
* ISO/IEC 27001:2022 [[Information security]], cybersecurity and privacy protection — Information security management systems — Requirements. (Replaces ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements.)<ref>{{cite web |title=ISO/IEC 27001:2022 |url=https://www.iso.org/standard/82875.html |website=ISO |access-date=5 January 2023 |language=en}}</ref> |
|||
* ISO/IEC 27002:2022 Information security, cybersecurity and privacy protection — Information security controls. (Replaces ISO/IEC 27002:2013 Information technology — Security techniques — Code of practice for information security controls.)<ref>{{cite web |title=ISO/IEC 27002:2022 |url=https://www.iso.org/standard/75652.html |website=ISO |access-date=5 January 2023 |language=en}}</ref> |
|||
* [[ISO/IEC 27031]]:2011 Information technology – Security techniques – Guidelines for information and communication technology readiness for business continuity.<ref>{{cite web |title=ISO/IEC 27031:2011 |url=https://www.iso.org/standard/44374.html |website=ISO |date=5 September 2016 |access-date=5 January 2023 |language=en}}</ref> |
|||
* ISO/PAS 22399:2007 Societal security - Guideline for incident preparedness and operational continuity management (withdrawn)<ref>{{cite web |title=ISO/PAS 22399:2007 |url=https://www.iso.org/standard/50295.html |website=ISO |date=18 June 2012 |access-date=5 January 2023 |language=en}}</ref> |
|||
* IWA 5:2006 Emergency Preparedness (withdrawn)<ref>{{cite web |title=IWA 5:2006 |url=https://www.iso.org/standard/44985.html |website=ISO |access-date=5 January 2023 |language=en}}</ref> |
|||
=== |
===British standards=== |
||
The [[British Standards Institution]] (BSI Group) released a series of standards which have since been withdrawn and replaced by the ISO standards above. |
|||
Tabletop exercises typically involve a small number of people and concentrates on a specific aspect of a BCP. They can easily accommodate complete teams from a specific area of a business. |
|||
* [[BS 7799]]-1:1995 - peripherally addressed information security procedures. (withdrawn)<ref>{{cite web |title=BS 7799-1:1995 Information security management - Code of practice for information security management systems |url=https://knowledge.bsigroup.com/products/information-security-management-code-of-practice-for-information-security-management-systems/standard |website=BSI Group |access-date=5 January 2023}}</ref> |
|||
* [[BS 25999]]-1:2006 - Business continuity management Part 1: Code of practice (superseded, withdrawn)<ref>{{cite web |title=BS 25999-1:2006 Business continuity management - Code of practice |url=https://knowledge.bsigroup.com/products/bs-25999-1-2006-business-continuity-management-code-of-practice/standard |website=BSI Group |access-date=5 January 2023}}</ref> |
|||
* BS 25999-2:2007 Business Continuity Management Part 2: Specification (superseded, withdrawn)<ref>{{cite web |title=BS 25999-2:2007 (USA Edition) Business continuity management - Specification |url=https://knowledge.bsigroup.com/products/business-continuity-management-specification-1/standard |website=BSI Group |access-date=5 January 2023}}</ref> |
|||
* 2008: BS 25777, Information and communications technology continuity management. Code of practice. (withdrawn)<ref>{{cite web |title=BS 25777:2008 (Paperback) Information and communications technology continuity management. Code of practice |url=https://knowledge.bsigroup.com/products/information-and-communications-technology-continuity-management-code-of-practice-1/standard |website=BSI Group |access-date=5 January 2023}}</ref> |
|||
Within the UK, BS 25999-2:2007 and BS 25999-1:2006 were being used for business continuity management across all organizations, industries and sectors. These documents give a practical plan to deal with most eventualities—from extreme weather conditions to terrorism, IT system failure, and staff sickness.<ref>British Standards Institution (2006). Business continuity management-Part 1: Code of practice :London</ref> |
|||
Another form involves a single representative from each of several teams. Typically, participants work through simple scenario and then discuss specific aspects of the plan. For example, a fire is discovered out of working hours. |
|||
In 2004, following crises in the preceding years, the UK government passed the [[Civil Contingencies Act 2004|Civil Contingencies Act of 2004]]: Businesses must have continuity planning measures to survive and continue to thrive whilst working towards keeping the incident as minimal as possible. |
|||
The exercise consumes only a few hours and is often split into two or three sessions, each concentrating on a different theme. |
|||
The Act was separated into two parts: |
|||
Part 1: civil protection, covering roles & responsibilities for local responders |
|||
Part 2: emergency powers.<ref>Cabinet Office. (2004). overview of the Act. In: Civil Contingencies Secretariat Civil Contingencies Act 2004: a short. London: Civil Contingencies Secretariat</ref> |
|||
In the United Kingdom, resilience is implemented locally by the [[Local Resilience Forum]].<ref>{{cite web |title=July 2013 (V2) The role of Local Resilience Forums: A reference document |url=https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/62277/The_role_of_Local_Resilience_Forums-_A_reference_document_v2_July_2013.pdf |website=Cabinet Office |access-date=5 January 2023}}</ref> |
|||
=== |
===Australian standards=== |
||
* HB 292-2006, "A practitioners guide to business continuity management"<ref>{{cite web |title=HB HB 292—2006 Executive Guide to Business Continuity Management |url=https://www.saiglobal.com/PDFTemp/Previews/OSH/as/misc/handbook/HB292-2006.pdf |website=Standards Australia |access-date=5 January 2023}}</ref> |
|||
A medium exercise is conducted within a "Virtual World" and brings together several departments, teams or disciplines. It typically concentrates on multiple BCP aspects, prompting interaction between teams. The scope of a medium exercise can range from a few teams from one organisation co-located in one building to multiple teams operating across dispersed locations. The environment needs to be as realistic as practicable and team sizes should reflect a realistic situation. Realism may extend to simulated news broadcasts and websites. |
|||
* HB 293-2006, "Executive guide to business continuity management"<ref>{{cite web |title=HB 293—2006 Executive Guide to Business Continuity Management |url=https://www.saiglobal.com/PDFTemp/Previews/OSH/as/misc/handbook/HB293-2006.pdf |website=Standards Australia |access-date=5 January 2023}}</ref> |
|||
===United States=== |
|||
A medium exercise typically lasts a few hours, though they can extend over several days. They typically involve a "Scenario Cell" that adds pre-scripted "surprises" throughout the exercise. |
|||
* [[NFPA 1600|NFPA 1600 Standard on Disaster/Emergency Management and Business Continuity Programs]] (2010). ''[[National Fire Protection Association]]''. (superseded).<ref>{{cite book |title=NFPA 1600, Standard on Disaster/Emergency Management and Business Continuity Programs |date=2010 |publisher=National Fire Protection Association |location=Quincy, MA |isbn=978-161665005-6 |edition=2010 |url=https://www.nfpa.org/assets/files/AboutTheCodes/1600/1600-10-PDF.pdf}}</ref> |
|||
* [[NFPA 1600, Standard on Continuity, Emergency, and Crisis Management]] (2019, current standard), ''[[National Fire Protection Association]]''.<ref>{{cite web |title=A Comprehensive Overview of the NFPA 1600 Standard |url=https://www.alertmedia.com/blog/nfpa-1600/ |website=AlertMedia |access-date=4 January 2023 |language=en |date=29 January 2019}}</ref> |
|||
* [[United States federal government continuity of operations|Continuity of Operations]] (COOP) and National Continuity Policy Implementation Plan (NCPIP), United States Federal Government<ref name="overview"/><ref>{{cite web |title=NATIONAL CONTINUITY POLICY IMPLEMENTATION PLAN Homeland Security Council August 2007 |url=https://emilms.fema.gov/IS0545/documents/NCPIP_August_2007_508_Compliant.pdf |website=FEMA |access-date=5 January 2023}}</ref><ref>{{cite web |title=Continuity Resources and Technical Assistance {{!}} FEMA.gov |url=https://www.fema.gov/emergency-managers/national-preparedness/continuity |website=FEMA |access-date=5 January 2023 |language=en}}</ref> |
|||
* Business Continuity Planning Suite, DHS National Protection and Programs Directorate and FEMA.<ref>{{cite web |title=Continuity of operations: An overview |url=https://www.fema.gov/pdf/about/org/ncp/coop_brochure.pdf |website=FEMA |access-date=5 January 2023}}</ref><ref>{{cite web |title=Business {{!}} Ready.gov |url=https://www.ready.gov/business |website=www.ready.gov |access-date=5 January 2023}}</ref><ref>{{cite web |title=Business Continuity Planning Suite {{!}} Ready.gov |url=https://www.ready.gov/business-continuity-planning-suite |website=www.ready.gov |access-date=5 January 2023}}</ref><ref name="overview">{{cite web |title=Business Continuity Plan {{!}} Ready.gov |url=https://www.ready.gov/business-continuity-plan |website=www.ready.gov |access-date=5 January 2023}}</ref> |
|||
* ASIS SPC.1-2009, Organizational Resilience: Security, Preparedness, and Continuity Management Systems - Requirements with Guidance for Use, [[American National Standards Institute]]<ref>{{cite book |title=ASIS SPC.1-2009 Organizational Resilience: Security, Preparedness, and Continuity Management Systems - Requirements with Guidance for Use |date=2009 |publisher=American National Standards Institute |isbn=978-1-887056-92-2 |url=https://www.ndsu.edu/fileadmin/emgt/ASIS_SPC.1-2009_Item_No._1842.pdf}}</ref> |
|||
==Implementation and testing== |
|||
===Complex exercises=== |
|||
The implementation phase involves policy changes, material acquisitions, staffing and testing. |
|||
A complex exercise aims to have as few boundaries as possible. It incorporates all the aspects of a medium exercise. The exercise remains within a virtual world, but maximum realism is essential. This might include no-notice activation, actual evacuation and actual invocation of a disaster recovery site. |
|||
===Testing and organizational acceptance=== |
|||
The 2008 book ''Exercising for Excellence'', published by The [[British Standards Institution]] identified three types of exercises that can be employed when testing business continuity plans. |
|||
* '''Tabletop exercises''' - a small number of people concentrate on a specific aspect of a BCP. Another form involves a single representative from each of several teams. |
|||
* '''Medium exercises''' - Several departments, teams or disciplines concentrate on multiple BCP aspects; the scope can range from a few teams from one building to multiple teams operating across dispersed locations. Pre-scripted "surprises" are added. |
|||
* '''Complex exercises''' - All aspects of a medium exercise remain, but for maximum realism no-notice activation, actual evacuation and actual invocation of a disaster recovery site is added. |
|||
While start and stop times are pre-agreed, the actual duration might be unknown if events are allowed to run their course. |
While start and stop times are pre-agreed, the actual duration might be unknown if events are allowed to run their course. |
||
==Maintenance== |
==Maintenance== |
||
Biannual or annual maintenance cycle maintenance of a BCP manual is broken down into three periodic activities. |
Biannual or annual maintenance cycle maintenance of a BCP manual<ref name=AUdoc>{{Cite web|url=https://publications.qld.gov.au/dataset/05765d5a-91b3-45fd-af43-699ede65dd8a/resource/63f7d2dc-0f40-4abb-b75f-7e6acfeae8f3/download/businesscontinuityplantemplate.doc|title=Business Continuity Plan Template}}</ref> is broken down into three periodic activities. |
||
* Confirmation of information in the manual, roll out to staff for awareness and specific training for critical individuals. |
* Confirmation of information in the manual, roll out to staff for awareness and specific training for critical individuals. |
||
* Testing and verification of technical solutions established for recovery operations. |
* Testing and verification of technical solutions established for recovery operations. |
||
* Testing and verification of organization recovery procedures. |
* Testing and verification of organization recovery procedures. |
||
Issues found during the testing phase often must be reintroduced to the analysis phase. |
Issues found during the testing phase often must be reintroduced to the analysis phase. |
||
===Information |
===Information and targets=== |
||
The BCP manual must evolve with the organization, and maintain information about '''who has to know what''': |
|||
The BCP manual must evolve with the organization. Activating the [[call tree]] verifies the notification plan's efficiency as well as contact data accuracy. Like most business procedures, business continuity planning has its own jargon. Organisation-wide understanding of business continuity jargon is vital and glossaries are available.<ref>[http://en.bcmpedia.org/ Glossary of Business Continuity Terms]</ref> Types of organisational changes that should be identified and updated in the manual include: |
|||
* Staffing |
|||
* A series of checklists |
|||
* Important clients |
|||
** Job descriptions, skillsets needed, training requirements |
|||
* Vendors/suppliers |
|||
** Documentation and document management |
|||
* Organization structure changes |
|||
* Definitions of terminology to facilitate timely communication during [[IT disaster recovery|disaster recovery]],<ref>{{Cite web|url=https://drii.org/resources/viewglossary|title=Glossary | DRI International|website=drii.org}}</ref> |
|||
* Company investment portfolio and mission statement |
|||
* Distribution lists (staff, important clients, vendors/suppliers) |
|||
* Communication and transportation infrastructure such as roads and bridges |
|||
* Information about communication and transportation infrastructure (roads, bridges)<ref>{{cite web |website=CMS.gov |
|||
|url=https://www.cms.gov/Medicare/Medicare-Contracting/FFSProvCustSvcGen/Downloads/Disaster-Recovery-Plan-Checklist.pdf |archive-url=https://ghostarchive.org/archive/20221009/https://www.cms.gov/Medicare/Medicare-Contracting/FFSProvCustSvcGen/Downloads/Disaster-Recovery-Plan-Checklist.pdf |archive-date=2022-10-09 |url-status=live |title=Disaster Recovery Plan Checklist}}</ref> |
|||
===Technical=== |
===Technical=== |
||
Line 142: | Line 242: | ||
===Testing and verification of recovery procedures=== |
===Testing and verification of recovery procedures=== |
||
Software and work process changes must be documented and validated, including verification that documented work process recovery tasks and supporting disaster recovery infrastructure allow staff to recover within the predetermined recovery time objective.<ref>{{cite web |
|||
As work processes change, previous recovery procedures may no longer be suitable. Checks include: |
|||
|title=Validation of a Disaster Management Metamodel (DMM) |author=Othman |
|||
* Are all work processes for critical functions documented? |
|||
|url=https://scholar.google.com/scholar_url?url=http://ro.uow.edu.au/cgi/viewcontent.cgi%253Farticle%253D2748%2526context%253Deispapers%26hl=en%26sa=X%26scisig=AAGBfm0CkEknKpMQtJeZBAWSgF_CqnzjNg%26nossl=1%26oi=scholarr |website=SCHOLAR.google.com}}</ref> |
|||
* Have the systems used for critical functions changed? |
|||
* Are the documented work checklists meaningful and accurate? |
|||
* Do the documented work process recovery tasks and supporting disaster recovery infrastructure allow staff to recover within the predetermined recovery time objective? |
|||
==See also== |
==See also== |
||
{{columns-list| |
{{columns-list|colwidth=22em| |
||
* [[Capacity planning]] |
|||
* [[Catastrophe modeling]] |
* [[Catastrophe modeling]] |
||
* [[ |
* [[Crisis management]] |
||
* [[Cyber resilience]] |
|||
* [[Digital continuity]] |
|||
* [[Disaster]] |
* [[Disaster]] |
||
** [[IT disaster recovery|Disaster recovery]] |
|||
** [[Disaster recovery and business continuity auditing]] |
|||
** [[Disaster risk reduction]] |
|||
* [[Emergency management]] |
* [[Emergency management]] |
||
* [[Man-made hazards]] |
|||
* [[Natural disasters|Natural hazards]] |
* [[Natural disasters|Natural hazards]] |
||
* [[Man-made hazards]] |
|||
* [[Risk management]] |
* [[Risk management]] |
||
* [[Scenario planning]] |
|||
* [[Disaster recovery and business continuity auditing]] |
|||
* [[Systems engineering]] |
* [[Systems engineering]] |
||
* [[System lifecycle]] |
* [[System lifecycle]] |
||
* [[Systems thinking]] |
|||
*[[Seven tiers of disaster recovery]] |
|||
}} |
}} |
||
==References== |
==References== |
||
{{reflist}} |
|||
===Notes=== |
|||
<references/> |
|||
===Bibliography=== |
|||
* [http://www.ready.gov/business/implementation/continuity Business Continuity Planning, FEMA], Retrieved: June 16, 2012 |
|||
* [http://www.ready.gov/business/plan/planning.html Continuity of Operations Planning] (no date). ''[[U.S. Department of Homeland Security]]''. Retrieved July 26, 2006. |
|||
* [http://www.fema.gov/business/bc.shtm Purpose of Standard Checklist Criteria For Business Recovery] (no date). ''[[Federal Emergency Management Agency]]''. Retrieved July 26, 2006. |
|||
* [http://www.nfpa.org/assets/files//PDF/NFPA16002010.pdf NFPA 1600 Standard on Disaster/Emergency Management and Business Continuity Programs — PDF] (2010). ''[[National Fire Protection Association]]''. |
|||
* [http://www.gao.gov/special.pubs/bcpguide.pdf United States General Accounting Office Y2k BCP Guide] (August 1998). ''[[Government Accountability Office|United States Government Accountability Office]]''. |
|||
==Further reading== |
==Further reading== |
||
* {{cite book|title=A Guide to Business Continuity Planning|author=James C. Barnes|isbn=978-0471530152|date=2001-06-08|publisher=Wiley }} |
|||
* {{cite book|title=Business Continuity Planning, A Step-by-Step Guide|author=Kenneth L Fulmer|isbn= 978-1931332217|date=2004-10-04|publisher=Rothstein }} |
|||
===International Organization for Standardization=== |
|||
* ISO/IEC 27001:2005 (formerly BS 7799-2:2002) Information Security Management System |
|||
* ISO/IEC 27002:2005 (renumerated ISO17999:2005) Information Security Management – Code of Practice |
|||
* ISO/IEC 27031:2011 Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity |
|||
* ISO/PAS 22399:2007 Guideline for incident preparedness and operational continuity management |
|||
* ISO/IEC 24762:2008 Guidelines for information and communications technology disaster recovery services |
|||
* IWA 5:2006 Emergency Preparedness |
|||
* ISO 22301:2012 Societal security - Business continuity management systems - Requirements |
|||
* ISO 22313:2012 Societal security - Business continuity management systems - Guidance |
|||
===British Standards Institution=== |
|||
* [[BS 25999|BS 25999-]]1:2006 Business Continuity Management Part 1: Code of practice |
|||
* BS 25999-2:2007 Business Continuity Management Part 2: Specification |
|||
===Others=== |
|||
* {{cite book|title=A Guide to Business Continuity Planning|author=James C. Barnes|isbn=978-0471530152}} |
|||
* {{cite book|title=Business Continuity Planning, A Step-by-Step Guide|author=Kenneth L Fulmer|isbn= 978-1931332217}} |
|||
* {{cite book|title=Business Continuity Plan Design, 8 Steps for Getting Started Designing a Plan|author=Richard Kepenach}} |
* {{cite book|title=Business Continuity Plan Design, 8 Steps for Getting Started Designing a Plan|author=Richard Kepenach}} |
||
* {{cite book|title=Disaster Survival Planning: A Practical Guide for Businesses|author=Judy Bell|isbn=978-0963058003}} |
* {{cite book|title=Disaster Survival Planning: A Practical Guide for Businesses|author=Judy Bell|date=October 1991|publisher=Disaster Survival Planning, Incorporated |isbn=978-0963058003}} |
||
* {{cite journal|author=Dimattia, S.|date=November 15, 2001|title=Planning for Continuity|journal=Library Journal|volume=126|issue=19|url=http://eric.ed.gov/?id=EJ645580|pages=32–34}} |
|||
* {{cite book|title=Resilience: Why Things Bounce Back|author1=Andrew Zolli|author2=Ann Marie Healy|isbn=978-1451683813|publisher=Simon & Schuster|year=2013}} |
|||
* [[[AIIM]] E-Doc Magazine, 18(4), 42–48. --> |
|||
*[https://drii.org/resources/glossary International Glossary for Resilience], DRI International. |
|||
* {{cite journal|author=Dimattia, S.|date=November 15, 2001|title=Planning for Continuity|journal=Library Journal|url=http://eric.ed.gov/?id=EJ645580|pages=32–34}} |
|||
==External links== |
==External links== |
||
* ''[https://web.archive.org/web/20150801223921/http://www.redbooks.ibm.com/redbooks/SG246844.html The tiers of Disaster Recovery and TSM.]'' Charlotte Brooks, Matthew Bedernjak, Igor Juran, and John Merryman. In, ''Disaster Recovery Strategies with Tivoli Storage Management.'' Chapter 2. Pages 21–36. Red Books Series. IBM. Tivoli Software. 2002. |
|||
* [https://web.archive.org/web/20140811064656/https://splash.riverbed.com/servlet/JiveServlet/downloadBody/3897-102-2-5505/Best%20Practices%20Guide%20-%20SteelStore%20DR%20Replication.pdf ''SteelStore Cloud Storage Gateway: Disaster Recovery Best Practices Guide.''] Riverbed Technology, Inc. October 2011. |
|||
* [https://web.archive.org/web/20181203152111/http://ibmsystemsmag.com/mainframe/administrator/backuprecovery/disaster-recovery-levels/?page=2 ''Disaster Recovery Levels.''] Robert Kern and Victor Peltz. IBM Systems Magazine. November 2003. |
|||
* [https://scalar.usc.edu/works/training-news/business-continuity-plan-disaster-recovery ''Business Continuity: The 5-tiers of Disaster Recovery.''] {{Webarchive|url=https://web.archive.org/web/20180926124124/http://recoveryspecialties.com/7-tiers.html |date=2018-09-26 }} Recovery Specialties. 2007. |
|||
* [http://storagecommunity.org/forums/t/326.aspx ''Continuous Operations: The Seven Tiers of Disaster Recovery.''] Mary Hall. The Storage Community (IBM). 18 July 2011. Retrieved 26 March 2013. |
|||
* [http://www.continuitycentral.com/feature0675.html Maximum Tolerable Period of Disruption (MTPOD)] |
|||
* [http://www.continuitycentral.com/feature0677.html Maximum Tolerable Period of Disruption (MTPOD): BSI committee response] |
|||
* [https://web.archive.org/web/20160303215200/http://www.bccmanagement.com/mtpod.html Wayback Machine] |
|||
* [https://web.archive.org/web/20090717220729/http://e-janco.com/MaximumTolerablePeriodofDisruption%20.html Janco Associates] |
|||
* [https://brcci.org/seminars/business-continuity-training/ Business Continuity Plan] |
|||
{{Sister project links}} |
{{Sister project links}} |
||
* [https://web.archive.org/web/20041207212256/http://www.ready.gov/business/index.html Department of Homeland Security Emergency Plan Guidelines] |
|||
{{External links |date=August 2010}} |
|||
* [http://www.cidrap.umn.edu/cidrap/files/33/cidrap-shrm-hr-pandemic-toolkit.pdf CIDRAP/SHRM Pandemic HR Guide Toolkit] {{Webarchive|url=https://web.archive.org/web/20130518120833/http://www.cidrap.umn.edu/cidrap/files/33/cidrap-shrm-hr-pandemic-toolkit.pdf |date=2013-05-18 }} |
|||
* [http://en.wikibooks.org/wiki/Business_continuity_planning#Introduction ''Business Continuity Planning (BCP) life cycle''] - Wikibooks |
|||
* [ |
* [https://www.ibm.com/services/business-continuity/plan Adapt and respond to risks with a business continuity plan (BCP)] |
||
* [http://www.cidrap.umn.edu/cidrap/files/33/cidrap-shrm-hr-pandemic-toolkit.pdf CIDRAP/SHRM Pandemic HR Guide Toolkit] |
|||
{{Authority control}} |
|||
* [http://17799-news.the-hamster.com ISO 17799 Newsletter] |
|||
{{Aspects of organizations}} |
|||
* [http://www.17799central.com 17799 Central - THE A-Z GUIDE FOR ISO 27001 AND ISO17799 / ISO27002 ] |
|||
{{DEFAULTSORT:Business Continuity Planning}} |
{{DEFAULTSORT:Business Continuity Planning}} |
||
[[Category:Systems thinking]] |
[[Category:Systems thinking]] |
||
[[Category:Business continuity |
[[Category:Business continuity|Business continuity and disaster recovery]] |
||
[[Category:Collaboration]] |
[[Category:Collaboration]] |
||
[[Category:Backup]] |
|||
[[Category:Disaster preparedness]] |
|||
[[Category:Disaster recovery]] |
|||
[[Category:Emergency management]] |
|||
[[Category:IT risk management]] |
|||
[[Category:Management cybernetics]] |
Latest revision as of 14:08, 19 December 2024
Business continuity may be defined as "the capability of an organization to continue the delivery of products or services at pre-defined acceptable levels following a disruptive incident",[1] and business continuity planning[2][3] (or business continuity and resiliency planning) is the process of creating systems of prevention and recovery to deal with potential threats to a company.[4] In addition to prevention, the goal is to enable ongoing operations before and during execution of disaster recovery.[5] Business continuity is the intended outcome of proper execution of both business continuity planning and disaster recovery.
Several business continuity standards have been published by various standards bodies to assist in checklisting ongoing planning tasks.[6]
Business continuity requires a top-down approach to identify an organisation's minimum requirements to ensure its viability as an entity. An organization's resistance to failure is "the ability ... to withstand changes in its environment and still function".[7] Often called resilience, resistance to failure is a capability that enables organizations to either endure environmental changes without having to permanently adapt, or the organization is forced to adapt a new way of working that better suits the new environmental conditions.[7]
Overview
[edit]Any event that could negatively impact operations should be included in the plan, such as supply chain interruption, loss of or damage to critical infrastructure (major machinery or computing/network resource). As such, BCP is a subset of risk management.[8] In the U.S., government entities refer to the process as continuity of operations planning (COOP).[9] A business continuity plan[10] outlines a range of disaster scenarios and the steps the business will take in any particular scenario to return to regular trade. BCP's are written ahead of time and can also include precautions to be put in place. Usually created with the input of key staff as well as stakeholders, a BCP is a set of contingencies to minimize potential harm to businesses during adverse scenarios.[11]
Resilience
[edit]A 2005 analysis of how disruptions can adversely affect the operations of corporations and how investments in resilience can give a competitive advantage over entities not prepared for various contingencies[12] extended then-common business continuity planning practices. Business organizations such as the Council on Competitiveness embraced this resilience goal.[13]
Adapting to change in an apparently slower, more evolutionary manner - sometimes over many years or decades - has been described as being more resilient,[14] and the term "strategic resilience" is now used to go beyond resisting a one-time crisis, but rather continuously anticipating and adjusting, "before the case for change becomes desperately obvious".
This approach is sometimes summarized as: preparedness,[15] protection, response and recovery.[16]
Resilience Theory can be related to the field of Public Relations. Resilience is a communicative process that is constructed by citizens, families, media system, organizations and governments through everyday talk and mediated conversation.[17]
The theory is based on the work of Patrice M. Buzzanell, a professor at the Brian Lamb School of Communication at Purdue University. In her 2010 article, "Resilience: Talking, Resisting, and Imagining New Normalcies Into Being"[18] Buzzanell discussed the ability for organizations to thrive after having a crisis through building resistance. Buzzanell notes that there are five different processes that individuals use when trying to maintain resilience- crafting normalcy, affirming identity anchors, maintaining and using communication networks, putting alternative logics to work and downplaying negative feelings while foregrounding positive emotions.
When looking at the resilience theory, the crisis communication theory is similar, but not the same. The crisis communication theory is based on the reputation of the company, but the resilience theory is based on the process of recovery of the company. There are five main components of resilience: crafting normalcy, affirming identity anchors, maintaining and using communication networks, putting alternative logics to work, and downplaying negative feelings while foregrounding negative emotions.[19] Each of these processes can be applicable to businesses in crisis times, making resilience an important factor for companies to focus on while training.
There are three main groups that are affected by a crisis. They are micro (individual), meso (group or organization) and macro (national or interorganizational). There are also two main types of resilience, which are proactive and post resilience. Proactive resilience is preparing for a crisis and creating a solid foundation for the company. Post resilience includes continuing to maintain communication and check in with employees.[20] Proactive resilience is dealing with issues at hand before they cause a possible shift in the work environment and post resilience maintaining communication and accepting changes after an incident has happened. Resilience can be applied to any organization. In New Zealand, the Canterbury University Resilient Organisations programme developed an assessment tool for benchmarking the Resilience of Organisations.[21] It covers 11 categories, each having 5 to 7 questions. A Resilience Ratio summarizes this evaluation.[22]
Continuity
[edit]Plans and procedures are used in business continuity planning to ensure that the critical organizational operations required to keep an organization running continue to operate during events when key dependencies of operations are disrupted. Continuity does not need to apply to every activity which the organization undertakes. For example, under ISO 22301:2019, organizations are required to define their business continuity objectives, the minimum levels of product and service operations which will be considered acceptable and the maximum tolerable period of disruption (MTPD) which can be allowed.[23]
A major cost in planning for this is the preparation of audit compliance management documents; automation tools are available to reduce the time and cost associated with manually producing this information.
Inventory
[edit]Planners must have information about:
- Equipment
- Supplies and suppliers
- Locations, including other offices and backup/work area recovery (WAR) sites
- Documents and documentation, including which have off-site backup copies:[10]
- Business documents
- Procedure documentation
Analysis
[edit]The analysis phase consists of:
- Impact analysis
- Threat and risks analysis
- Impact scenarios
Quantifying of loss ratios must also include "dollars to defend a lawsuit."[24] It has been estimated that a dollar spent in loss prevention can prevent "seven dollars of disaster-related economic loss."[25]
Business impact analysis (BIA)
[edit]A business impact analysis (BIA) differentiates critical (urgent) and non-critical (non-urgent) organization functions/activities. A function may be considered critical if dictated by law.
Each function/activity typically relies on a combination of constituent components in order to operate:
- Human resources (full-time staff, part-time staff, or contractors)
- IT systems
- Physical assets (mobile phones, laptops/workstations etc.)
- Documents (electronic or physical)
For each function, two values are assigned:
- Recovery point objective (RPO) – the acceptable latency of data that will not be recovered. For example, is it acceptable for the company to lose 2 days of data?[26] The recovery point objective must ensure that the maximum tolerable data loss for each activity is not exceeded.
- Recovery time objective (RTO) – the acceptable amount of time to restore the function
Maximum RTO
[edit]Maximum time constraints for how long an enterprise's key products or services can be unavailable or undeliverable before stakeholders perceive unacceptable consequences have been named as:
- Maximum tolerable period of disruption (MTPoD)
- Maximum tolerable downtime (MTD)
- Maximum tolerable outage (MTO)
- Maximum acceptable outage (MAO)[27][28]
According to ISO 22301 the terms maximum acceptable outage and maximum tolerable period of disruption mean the same thing and are defined using exactly the same words.[29] Some standards use the term maximum downtime limit.[30]
Consistency
[edit]When more than one system crashes, recovery plans must balance the need for data consistency with other objectives, such as RTO and RPO. [31] Recovery Consistency Objective (RCO) is the name of this goal. It applies data consistency objectives, to define a measurement for the consistency of distributed business data within interlinked systems after a disaster incident. Similar terms used in this context are "Recovery Consistency Characteristics" (RCC) and "Recovery Object Granularity" (ROG).[32]
While RTO and RPO are absolute per-system values, RCO is expressed as a percentage that measures the deviation between actual and targeted state of business data across systems for process groups or individual business processes.
The following formula calculates RCO with "n" representing the number of business processes and "entities" representing an abstract value for business data:
100% RCO means that post recovery, no business data deviation occurs.[33]
Threat and risk analysis (TRA)
[edit]After defining recovery requirements, each potential threat may require unique recovery steps (contingency plans or playbooks). Common threats include:
- Epidemic/pandemic
- Earthquake
- Fire
- Flood
- Cyber attack
- Sabotage (insider or external threat)
- Hurricane or other major storm
- Power outage
- Water outage (supply interruption, contamination)
- Telecomms outage
- IT outage
- Terrorism/Piracy
- War/civil disorder
- Theft (insider or external threat, vital information or material)
- Random failure of mission-critical systems
- Single point dependency
- Supplier failure
- Data corruption
- Misconfiguration
- Network outage
The above areas can cascade: Responders can stumble. Supplies may become depleted. During the 2002–2003 SARS outbreak, some organizations compartmentalized and rotated teams to match the incubation period of the disease. They also banned in-person contact during both business and non-business hours. This increased resiliency against the threat.
Impact scenarios
[edit]Impact scenarios are identified and documented:
- need for medical supplies[34]
- need for transportation options[35]
- civilian impact of nuclear disasters[36]
- need for business and data processing supplies[37]
These should reflect the widest possible damage.
Tiers of preparedness
[edit]SHARE's seven tiers of disaster recovery[38] released in 1992, were updated in 2012 by IBM as an eight tier model:[39]
- Tier 0 – No off-site data • Businesses with a Tier 0 Disaster Recovery solution have no Disaster Recovery Plan. There is no saved information, no documentation, no backup hardware, and no contingency plan. Typical recovery time: The length of recovery time in this instance is unpredictable. In fact, it may not be possible to recover at all.
- Tier 1 – Data backup with no Hot Site • Businesses that use Tier 1 Disaster Recovery solutions back up their data at an off-site facility. Depending on how often backups are made, they are prepared to accept several days to weeks of data loss, but their backups are secure off-site. However, this Tier lacks the systems on which to restore data. Pickup Truck Access Method (PTAM).
- Tier 2 – Data backup with Hot Site • Tier 2 Disaster Recovery solutions make regular backups on tape. This is combined with an off-site facility and infrastructure (known as a hot site) in which to restore systems from those tapes in the event of a disaster. This tier solution will still result in the need to recreate several hours to days worth of data, but it is less unpredictable in recovery time. Examples include: PTAM with Hot Site available, IBM Tivoli Storage Manager.
- Tier 3 – Electronic vaulting • Tier 3 solutions utilize components of Tier 2. Additionally, some mission-critical data is electronically vaulted. This electronically vaulted data is typically more current than that which is shipped via PTAM. As a result there is less data recreation or loss after a disaster occurs.
- Tier 4 – Point-in-time copies • Tier 4 solutions are used by businesses that require both greater data currency and faster recovery than users of lower tiers. Rather than relying largely on shipping tape, as is common in the lower tiers, Tier 4 solutions begin to incorporate more disk-based solutions. Several hours of data loss is still possible, but it is easier to make such point-in-time (PIT) copies with greater frequency than data that can be replicated through tape-based solutions.
- Tier 5 – Transaction integrity • Tier 5 solutions are used by businesses with a requirement for consistency of data between production and recovery data centers. There is little to no data loss in such solutions; however, the presence of this functionality is entirely dependent on the application in use.
- Tier 6 – Zero or little data loss • Tier 6 Disaster Recovery solutions maintain the highest levels of data currency. They are used by businesses with little or no tolerance for data loss and who need to restore data to applications rapidly. These solutions have no dependence on the applications to provide data consistency.
- Tier 7 – Highly automated, business-integrated solution • Tier 7 solutions include all the major components being used for a Tier 6 solution with the additional integration of automation. This allows a Tier 7 solution to ensure consistency of data above that of which is granted by Tier 6 solutions. Additionally, recovery of the applications is automated, allowing for restoration of systems and applications much faster and more reliably than would be possible through manual Disaster Recovery procedures.
Solution design
[edit]Two main requirements from the impact analysis stage are:
- For IT: the minimum application and data requirements and the time in which they must be available.
- Outside IT: preservation of hard copy (such as contracts). A process plan must consider skilled staff and embedded technology.
This phase overlaps with disaster recovery planning.
The solution phase determines:
- Crisis management command structure
- Telecommunication architecture between primary and secondary work sites
- Data replication methodology between primary and secondary work sites
- Backup site with applications, data and work space
Standards
[edit]ISO Standards
[edit]There are many standards that are available to support business continuity planning and management.[40][41] The International Organization for Standardization (ISO) has for example developed a whole series of standards on Business continuity management systems [42] under responsibility of technical committee ISO/TC 292:
- ISO 22300:2021 Security and resilience – Vocabulary (Replaces ISO 22300:2018 Security and resilience - Vocabulary and ISO 22300:2012 Security and resilience - Vocabulary.)[43]
- ISO 22301:2019 Security and resilience – Business continuity management systems – Requirements (Replaces ISO 22301:2012.)[44]
- ISO 22313:2020 Security and resilience – Business continuity management systems – Guidance on the use of ISO 22301 (Replaces ISO 22313:2012 Security and resilience - Business continuity management systems - Guidance on the use of ISO 22301.)[45]
- ISO/TS 22317:2021 Security and resilience – Business continuity management systems – Guidelines for business impact analysis - (Replaces ISO/TS 22315:2015 Societal security – Business continuity management systems – Guidelines for business impact analysis.)[46]
- ISO/TS 22318:2021 Security and resilience – Business continuity management systems – Guidelines for supply chain continuity (Replaces ISO/TS 22318:2015 Societal security — Business continuity management systems — Guidelines for supply chain continuity.)[47]
- ISO/TS 22330:2018 Security and resilience – Business continuity management systems – Guidelines for people aspects on business continuity (Current as of 2022.)[48]
- ISO/TS 22331:2018 Security and resilience – Business continuity management systems – Guidelines for business continuity strategy - (Current as of 2022.)[49]
- ISO/TS 22332:2021 Security and resilience – Business continuity management systems – Guidelines for developing business continuity plans and procedures (Current as of 2022.)[50]
- ISO/IEC/TS 17021-6:2014 Conformity assessment – Requirements for bodies providing audit and certification of management systems – Part 6: Competence requirements for auditing and certification of business continuity management systems.[51]
- ISO/IEC 24762:2008 Information technology — Security techniques — Guidelines for information and communications technology disaster recovery services (withdrawn)[52]
- ISO/IEC 27001:2022 Information security, cybersecurity and privacy protection — Information security management systems — Requirements. (Replaces ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements.)[53]
- ISO/IEC 27002:2022 Information security, cybersecurity and privacy protection — Information security controls. (Replaces ISO/IEC 27002:2013 Information technology — Security techniques — Code of practice for information security controls.)[54]
- ISO/IEC 27031:2011 Information technology – Security techniques – Guidelines for information and communication technology readiness for business continuity.[55]
- ISO/PAS 22399:2007 Societal security - Guideline for incident preparedness and operational continuity management (withdrawn)[56]
- IWA 5:2006 Emergency Preparedness (withdrawn)[57]
British standards
[edit]The British Standards Institution (BSI Group) released a series of standards which have since been withdrawn and replaced by the ISO standards above.
- BS 7799-1:1995 - peripherally addressed information security procedures. (withdrawn)[58]
- BS 25999-1:2006 - Business continuity management Part 1: Code of practice (superseded, withdrawn)[59]
- BS 25999-2:2007 Business Continuity Management Part 2: Specification (superseded, withdrawn)[60]
- 2008: BS 25777, Information and communications technology continuity management. Code of practice. (withdrawn)[61]
Within the UK, BS 25999-2:2007 and BS 25999-1:2006 were being used for business continuity management across all organizations, industries and sectors. These documents give a practical plan to deal with most eventualities—from extreme weather conditions to terrorism, IT system failure, and staff sickness.[62]
In 2004, following crises in the preceding years, the UK government passed the Civil Contingencies Act of 2004: Businesses must have continuity planning measures to survive and continue to thrive whilst working towards keeping the incident as minimal as possible. The Act was separated into two parts: Part 1: civil protection, covering roles & responsibilities for local responders Part 2: emergency powers.[63] In the United Kingdom, resilience is implemented locally by the Local Resilience Forum.[64]
Australian standards
[edit]- HB 292-2006, "A practitioners guide to business continuity management"[65]
- HB 293-2006, "Executive guide to business continuity management"[66]
United States
[edit]- NFPA 1600 Standard on Disaster/Emergency Management and Business Continuity Programs (2010). National Fire Protection Association. (superseded).[67]
- NFPA 1600, Standard on Continuity, Emergency, and Crisis Management (2019, current standard), National Fire Protection Association.[68]
- Continuity of Operations (COOP) and National Continuity Policy Implementation Plan (NCPIP), United States Federal Government[69][70][71]
- Business Continuity Planning Suite, DHS National Protection and Programs Directorate and FEMA.[72][73][74][69]
- ASIS SPC.1-2009, Organizational Resilience: Security, Preparedness, and Continuity Management Systems - Requirements with Guidance for Use, American National Standards Institute[75]
Implementation and testing
[edit]The implementation phase involves policy changes, material acquisitions, staffing and testing.
Testing and organizational acceptance
[edit]The 2008 book Exercising for Excellence, published by The British Standards Institution identified three types of exercises that can be employed when testing business continuity plans.
- Tabletop exercises - a small number of people concentrate on a specific aspect of a BCP. Another form involves a single representative from each of several teams.
- Medium exercises - Several departments, teams or disciplines concentrate on multiple BCP aspects; the scope can range from a few teams from one building to multiple teams operating across dispersed locations. Pre-scripted "surprises" are added.
- Complex exercises - All aspects of a medium exercise remain, but for maximum realism no-notice activation, actual evacuation and actual invocation of a disaster recovery site is added.
While start and stop times are pre-agreed, the actual duration might be unknown if events are allowed to run their course.
Maintenance
[edit]Biannual or annual maintenance cycle maintenance of a BCP manual[76] is broken down into three periodic activities.
- Confirmation of information in the manual, roll out to staff for awareness and specific training for critical individuals.
- Testing and verification of technical solutions established for recovery operations.
- Testing and verification of organization recovery procedures.
Issues found during the testing phase often must be reintroduced to the analysis phase.
Information and targets
[edit]The BCP manual must evolve with the organization, and maintain information about who has to know what:
- A series of checklists
- Job descriptions, skillsets needed, training requirements
- Documentation and document management
- Definitions of terminology to facilitate timely communication during disaster recovery,[77]
- Distribution lists (staff, important clients, vendors/suppliers)
- Information about communication and transportation infrastructure (roads, bridges)[78]
Technical
[edit]Specialized technical resources must be maintained. Checks include:
- Virus definition distribution
- Application security and service patch distribution
- Hardware operability
- Application operability
- Data verification
- Data application
Testing and verification of recovery procedures
[edit]Software and work process changes must be documented and validated, including verification that documented work process recovery tasks and supporting disaster recovery infrastructure allow staff to recover within the predetermined recovery time objective.[79]
See also
[edit]References
[edit]- ^ BCI Good Practice Guidelines 2013, quoted in Mid Sussex District Council, Business Continuity Policy Statement, published April 2018, accessed 19 February 2021
- ^ "How to Build an Effective and Organized Business Continuity Plan". Forbes. June 26, 2015.
- ^ "Surviving a Disaster" (PDF). American Bar.org (American Bar Association). 2011. Archived (PDF) from the original on 2022-10-09.
- ^ Elliot, D.; Swartz, E.; Herbane, B. (1999) Just waiting for the next big bang: business continuity planning in the UK finance sector. Journal of Applied Management Studies, Vol. 8, No, pp. 43–60. Here: p. 48.
- ^ Alan Berman (March 9, 2015). "Constructing a Successful Business Continuity Plan". Business Insurance Magazine.
- ^ "Business Continuity Plan". United States Department of Homeland Security. Archived from the original on 7 December 2018. Retrieved 4 October 2018.
- ^ a b Ian McCarthy; Mark Collard; Michael Johnson (2017). "Adaptive organizational resilience: an evolutionary perspective". Current Opinion in Environmental Sustainability. 28: 33–40. Bibcode:2017COES...28...33M. doi:10.1016/j.cosust.2017.07.005.
- ^ Intrieri, Charles (10 September 2013). "Business Continuity Planning". Flevy. Retrieved 29 September 2013.
- ^ "Continuity Resources and Technical Assistance | FEMA.gov". www.fema.gov.
- ^ a b "A Guide to the preparation of a Business Continuity Plan" (PDF). Archived from the original (PDF) on 2019-02-09. Retrieved 2019-02-08.
- ^ "Business Continuity Planning (BCP) for Businesses of all Sizes". 19 April 2017. Archived from the original on 24 April 2017. Retrieved 28 April 2017.
- ^ Yossi Sheffi (October 2005). The Resilient Enterprise: Overcoming Vulnerability for Competitive Enterprise. MIT Press.
- ^ "Transform. The Resilient Economy". Archived from the original on 2013-10-22. Retrieved 2019-02-04.
- ^ "Newsday | Long Island's & NYC's News Source | Newsday".
- ^ Tiffany Braun; Benjamin Martz (2007). "Business Continuity Preparedness and the Mindfulness State of Mind". AMCIS 2007 Proceedings. S2CID 7698286.
"An estimated 80 percent of companies without a well-conceived and tested business continuity plan, go out of business within two years of a major disaster" (Santangelo 2004)
- ^ "Annex A.17: Information Security Aspects of Business Continuity Management". ISMS.online. November 2021.
- ^ "Communication and resilience: concluding thoughts and key issues for future research". www.researchgate.net.
- ^ Buzzanell, Patrice M. (2010). "Resilience: Talking, Resisting, and Imagining New Normalcies Into Being". Journal of Communication. 60 (1): 1–14. doi:10.1111/j.1460-2466.2009.01469.x. ISSN 1460-2466.
- ^ Buzzanell, Patrice M. (March 2010). "Resilience: Talking, Resisting, and Imagining New Normalcies Into Being". Journal of Communication. 60 (1): 1–14. doi:10.1111/j.1460-2466.2009.01469.x. ISSN 0021-9916.
- ^ Buzzanell, Patrice M. (2018-01-02). "Organizing resilience as adaptive-transformational tensions". Journal of Applied Communication Research. 46 (1): 14–18. doi:10.1080/00909882.2018.1426711. ISSN 0090-9882. S2CID 149004681.
- ^ "Resilient Organisations". March 22, 2011.
- ^ "Resilience Diagnostic". November 28, 2017.
- ^ ISO, ISO 22301 Business Continuity Management: Your implementation guide, published, accessed 20 February 2021
- ^ "Emergency Planning" (PDF). Archived (PDF) from the original on 2022-10-09.
- ^ Helen Clark (August 15, 2012). "Can your Organization survive a natural disaster?" (PDF). RI.gov. Archived (PDF) from the original on 2022-10-09.
- ^ May, Richard. "Finding RPO and RTO". Archived from the original on 2016-03-03.
- ^ "Maximum Acceptable Outage (Definition)". riskythinking.com. Albion Research Ltd. Retrieved 4 October 2018.
- ^ "BIA Instructions, BUSINESS CONTINUITY MANAGEMENT - WORKSHOP" (PDF). driecentral.org. Disaster Recovery Information Exchange (DRIE) Central. Archived (PDF) from the original on 2022-10-09. Retrieved 4 October 2018.
- ^ "Plain English ISO 22301 2012 Business Continuity Definitions". praxiom.com. Praxiom Research Group LTD. Retrieved 4 October 2018.
- ^ "Baseline Cyber Security Controls" (PDF). Ministry of Interior - National Cyber Security Center. 2022. p. 12.
- ^ "The Rise and Rise of the Recovery Consistency Objective". 2016-03-22. Archived from the original on 2020-09-26. Retrieved September 9, 2019.
- ^ "How to evaluate a recovery management solution." West World Productions, 2006 [1]
- ^ Josh Krischer; Donna Scott; Roberta J. Witty. "Six Myths About Business Continuity Management and Disaster Recovery" (PDF). Gartner Research. Archived (PDF) from the original on 2022-10-09.
- ^ "Medical supply location and distribution in disasters". doi:10.1016/j.ijpe.2009.10.004.
{{cite journal}}
: Cite journal requires|journal=
(help)[clarification needed] - ^ "transportation planning in disaster recovery". SCHOLAR.google.com. Archived from the original on 2022-10-09.
- ^ "PLANNING SCENARIOS Executive Summaries" (PDF). Archived (PDF) from the original on 2022-10-09.
- ^ Chloe Demrovsky (December 22, 2017). "Holding It All Together". Manufacturing Business Technology.
- ^ developed by SHARE's Technical Steering Committee, working with IBM
- ^ Ellis Holman (March 13, 2012). "A Business Continuity Solution Selection Methodology" (PDF). IBM Corp. Archived (PDF) from the original on 2022-10-09.
- ^ Tierney, Kathleen (21 November 2012). "Disaster Governance: Social, Political, and Economic Dimensions". Annual Review of Environment and Resources. 37 (1): 341–363. doi:10.1146/annurev-environ-020911-095618. ISSN 1543-5938. S2CID 154422711.
- ^ Partridge, Kevin G.; Young, Lisa R. (2011). CERT® Resilience Management Model (RMM) v1.1: Code of Practice Crosswalk Commercial Version 1.1 (PDF). Pittsburgh, PA: Carnegie Mellon University. Retrieved 5 January 2023.
- ^ "ISO - ISO/TC 292 - Security and resilience". International Organization for Standardization.
- ^ "ISO 22300:2018". ISO. 12 July 2019.
- ^ "ISO 22301:2019". ISO. 5 June 2023.
- ^ "ISO 22313:2020". ISO.
- ^ "Iso/Ts 22317:2021".
- ^ "Iso/Ts 22318:2021".
- ^ "ISO/TS 22330:2018". ISO. 12 July 2019.
- ^ "ISO/TS 22331:2018". ISO.
- ^ "Iso/Ts 22332:2021".
- ^ "ISO/IEC TS 17021-6:2014". ISO.
- ^ "ISO/IEC 24762:2008". ISO. 6 March 2008. Retrieved 5 January 2023.
- ^ "ISO/IEC 27001:2022". ISO. Retrieved 5 January 2023.
- ^ "ISO/IEC 27002:2022". ISO. Retrieved 5 January 2023.
- ^ "ISO/IEC 27031:2011". ISO. 5 September 2016. Retrieved 5 January 2023.
- ^ "ISO/PAS 22399:2007". ISO. 18 June 2012. Retrieved 5 January 2023.
- ^ "IWA 5:2006". ISO. Retrieved 5 January 2023.
- ^ "BS 7799-1:1995 Information security management - Code of practice for information security management systems". BSI Group. Retrieved 5 January 2023.
- ^ "BS 25999-1:2006 Business continuity management - Code of practice". BSI Group. Retrieved 5 January 2023.
- ^ "BS 25999-2:2007 (USA Edition) Business continuity management - Specification". BSI Group. Retrieved 5 January 2023.
- ^ "BS 25777:2008 (Paperback) Information and communications technology continuity management. Code of practice". BSI Group. Retrieved 5 January 2023.
- ^ British Standards Institution (2006). Business continuity management-Part 1: Code of practice :London
- ^ Cabinet Office. (2004). overview of the Act. In: Civil Contingencies Secretariat Civil Contingencies Act 2004: a short. London: Civil Contingencies Secretariat
- ^ "July 2013 (V2) The role of Local Resilience Forums: A reference document" (PDF). Cabinet Office. Retrieved 5 January 2023.
- ^ "HB HB 292—2006 Executive Guide to Business Continuity Management" (PDF). Standards Australia. Retrieved 5 January 2023.
- ^ "HB 293—2006 Executive Guide to Business Continuity Management" (PDF). Standards Australia. Retrieved 5 January 2023.
- ^ NFPA 1600, Standard on Disaster/Emergency Management and Business Continuity Programs (PDF) (2010 ed.). Quincy, MA: National Fire Protection Association. 2010. ISBN 978-161665005-6.
- ^ "A Comprehensive Overview of the NFPA 1600 Standard". AlertMedia. 29 January 2019. Retrieved 4 January 2023.
- ^ a b "Business Continuity Plan | Ready.gov". www.ready.gov. Retrieved 5 January 2023.
- ^ "NATIONAL CONTINUITY POLICY IMPLEMENTATION PLAN Homeland Security Council August 2007" (PDF). FEMA. Retrieved 5 January 2023.
- ^ "Continuity Resources and Technical Assistance | FEMA.gov". FEMA. Retrieved 5 January 2023.
- ^ "Continuity of operations: An overview" (PDF). FEMA. Retrieved 5 January 2023.
- ^ "Business | Ready.gov". www.ready.gov. Retrieved 5 January 2023.
- ^ "Business Continuity Planning Suite | Ready.gov". www.ready.gov. Retrieved 5 January 2023.
- ^ ASIS SPC.1-2009 Organizational Resilience: Security, Preparedness, and Continuity Management Systems - Requirements with Guidance for Use (PDF). American National Standards Institute. 2009. ISBN 978-1-887056-92-2.
- ^ "Business Continuity Plan Template".
- ^ "Glossary | DRI International". drii.org.
- ^ "Disaster Recovery Plan Checklist" (PDF). CMS.gov. Archived (PDF) from the original on 2022-10-09.
- ^ Othman. "Validation of a Disaster Management Metamodel (DMM)". SCHOLAR.google.com.
Further reading
[edit]- James C. Barnes (2001-06-08). A Guide to Business Continuity Planning. Wiley. ISBN 978-0471530152.
- Kenneth L Fulmer (2004-10-04). Business Continuity Planning, A Step-by-Step Guide. Rothstein. ISBN 978-1931332217.
- Richard Kepenach. Business Continuity Plan Design, 8 Steps for Getting Started Designing a Plan.
- Judy Bell (October 1991). Disaster Survival Planning: A Practical Guide for Businesses. Disaster Survival Planning, Incorporated. ISBN 978-0963058003.
- Dimattia, S. (November 15, 2001). "Planning for Continuity". Library Journal. 126 (19): 32–34.
- Andrew Zolli; Ann Marie Healy (2013). Resilience: Why Things Bounce Back. Simon & Schuster. ISBN 978-1451683813.
- International Glossary for Resilience, DRI International.
External links
[edit]- The tiers of Disaster Recovery and TSM. Charlotte Brooks, Matthew Bedernjak, Igor Juran, and John Merryman. In, Disaster Recovery Strategies with Tivoli Storage Management. Chapter 2. Pages 21–36. Red Books Series. IBM. Tivoli Software. 2002.
- SteelStore Cloud Storage Gateway: Disaster Recovery Best Practices Guide. Riverbed Technology, Inc. October 2011.
- Disaster Recovery Levels. Robert Kern and Victor Peltz. IBM Systems Magazine. November 2003.
- Business Continuity: The 5-tiers of Disaster Recovery. Archived 2018-09-26 at the Wayback Machine Recovery Specialties. 2007.
- Continuous Operations: The Seven Tiers of Disaster Recovery. Mary Hall. The Storage Community (IBM). 18 July 2011. Retrieved 26 March 2013.
- Maximum Tolerable Period of Disruption (MTPOD)
- Maximum Tolerable Period of Disruption (MTPOD): BSI committee response
- Wayback Machine
- Janco Associates
- Business Continuity Plan
- Department of Homeland Security Emergency Plan Guidelines
- CIDRAP/SHRM Pandemic HR Guide Toolkit Archived 2013-05-18 at the Wayback Machine
- Adapt and respond to risks with a business continuity plan (BCP)