BCP
BCP
Copyright 2000 2002 All Rights Reserved Rev: 2.07a Updated July 15, 2002
ii.
Additional BCP Items - Scorecards _____________________________ 17 Executive BCP Scorecard ____________________________________ 18 IT Management BCP Scorecard________________________________ 19 Business Continuity Plan Checklist _____________________________ 20 BCP Resources ____________________________________________ 21
Business Continuity Planning Companies & BIA Software ________________ 21 Disaster Recovery Articles ________________________________________ 22 Online & Print BCP Resources______________________________________ 23 Books ________________________________________________________ 25
In Closing ______________________________________________ 28
iii.
Introduction
The terrorist attacks upon the United States of September 11th, 2001 proved to be a wakeup call to many who had looked at business continuity and disaster recovery planning as a task that was going to be done "down the road." Besides the terrible toll that was taken on human life, many businesses, especially those in New York City, were effected severely. Some will never recover. There were, however, many examples where good business continuity planning resulted in successful resumption of operations. These example came from businesses and organizations that had made the investment in frequent disaster plan tests and updates, regular real-time backup of their data, and establishment of hot site capabilities to name a few. In this respect, many of our large financial organizations were able to quickly resume business due to the fact that they could quickly use alternate sites to restore their information systems. We have all had to take a new look at the meaning of the "worst-case scenario" and use it as a model for good planning. It is necessary to look how disaster recovery plans and business continuity plans can compliment each other. We need to add the potential for terrorism effecting our business structures to the equation of good, defensive planning, and use the example of the incidents of September 11th to our best advantage.
Terminology
In the early days of data processing, the mainframe computer was usually housed in a large room with very large windows so everyone could see the computer. This led to the term "glass house." The term "Disaster Recovery" is usually related to only the restoration of the
1.
2.
Essential Steps
The steps indicated here are intended as proven standard guidelines. They can be modified as needed to suit your organization.
Step One: Initiation Step Two: Business Impact Analysis Step Three: Disaster Readiness Strategies Step Four: Develop and Implement the Plan Step Five: Maintenance and Testing Additional BCP Items - Scorecards Business Continuity Plan Checklist BCP Resources
3.
4.
Meeting Closure and Follow Up Close the meeting by securing management's concurrence and support. Identify your senior management project champion; schedule a meeting with him/her to review the drafts. Once senior management has issued the project introduction memos, forward memos to all managers notifying them of the project and of suggested times and places for scheduled meetings and requesting that they involve key members of their staff. Communicate frequently about the projects goals and objectives.
5.
Conduct Second Senior Management Meeting Conduct a second senior management meeting to review the revised project schedule, the project scope statement, and the planning assumptions. Based on management feedback, revise the proposed schedule and overview documentation, as necessary, until approval is obtained. Select BIA Questionnaire Recipients Based on the scope of the planning project agreed to by senior management, the project team should identify the line managers who will be recipients of the BIA questionnaire. Introduce the Project to Division, Branch, and/or Department Management Conduct introduction meetings with the managers of all affected divisions, branches, or departments using a subset of the senior management presentation and subsequent memos as meeting material. Remember that you are asking for their support. Suggested Meeting Agenda Overview Explain that the meeting attendees and their employees, will be asked from time-totime to respond to questionnaires or give brief descriptions of their duties in timesensitive areas. Explain the resource commitments and timing required. Request their input, comments and support throughout the planning process. Review the proposed project schedule and make any adjustments that appear necessary.
6.
In addition to a BIA, it is important to conduct a facility/structural vulnerability analysis. The BIA will provide the rationale and cost justification for risk mitigation and response, resumption, recovery and restoration-related decisions.
7.
8.
9.
Business Continuity Planning Step Four: Develop and Implement the Plan
Define the Scope and Number of Business Continuity Plans
Define the scope of the planning effort. The scope will directly affect the size of the continuity organization, the number of teams involved, and the number of plans you will need to develop. For example, the largest plan development scope, enterprise-wide disaster readiness planning, may require plans for: Multiple physical locations over broad geographic areas Various operations or departments at each location Business operations, processes or functions that require multiple agency cooperation to succeed Information technology ranging from desktop personal computers to inter-connected LANs to secure work resources to multi-server data centers, etc. Telecommunications (data, voice, video, multimedia, etc.) serving all internal locations and key client locations
Consider the size, complexity and scope your project. Clear definitions of scope and how plans relate to each other are essential to a well-managed plan development project.
10.
Meeting Conclusion and Follow Up Schedule one-on-one meetings with all Team Leaders to review their specific assignments. Allow time for all team members to review, in detail, the materials that will be used. If you have selected a data gathering method for the project, familiarize each team with the approach during individual sessions.
11.
Part of this task is to collect and prepare the specific documentation necessary to execute the plan's action steps. Also integrate or reference existing documentation for business operations and processes into the overall plan. The BCP may include the physical loss or inaccessibility of the facility. You should also develop any training materials that will be used during the meetings to instruct the team members on plan development. This should include the data gathering method(s) to be used during the project: Familiarize team members with Business Continuity Planning information like that available on this site. Each team leader should review team positions. (Team leaders provide recommendations on the personnel assigned to these positions and additional positions they feel are necessary.) Review any previously developed plans that may be used as a model. Review project status reporting/problem management procedures.
12.
13.
Sample BCP Exercise - Phase 2 Restore data from archive to resume business: The application system, business operation, process, or function is restored to a normal production status using data and records retrieved from off-site archive storage. This level of exercise verifies any and all changes made in Phase 1; it also verifies vaulting and logistics procedures.
Sample BCP Exercise - Phase 3 All functions of facility exercised: Exercise all functions for the facility or organization, instead of limiting the exercise to one business operation or application system 14. The AnyKeyNow Group
15.
16.
17.
18.
19.
Duration
(days or hrs)
START
(DATE)
Finish
(date)
20.
21.
22.
23.
24.
Books
Sorted by author Enterprise Operations Management Handbook, Second Edition by Steven F. Blanding (Editor) Hardcover - 672 pages 2nd edition (October 22, 1999) CRC Press - Auerbach Publications; ISBN: 084939824X Price: $66.50 Computer-Related Risks by Peter G. Neumann Paperback - 367 pages (10/1995) Addison-Wesley Pub Co; ISBN: 020155805X Price: $29.95 Information Warfare & Security by Dorothy E. Denning Paperback - 522 pages 1st edition (12/1998) Addison-Wesley Pub Co; ISBN: 0201433036 Price: $39.99
25.
26.
27.
28.