Business Continuity and ISO22301 Preparing For Disruption EU Sep 22
Business Continuity and ISO22301 Preparing For Disruption EU Sep 22
Business Continuity
and ISO 22301
www.itgovernance.eu
The most comprehensive way to ensure your organisation returns to business as usual as quickly as The BIA outputs – especially what your critical business activities are and their recovery time
possible in the event of a disruption is to implement a business continuity management system objectives and priorities – provide key information for your BCPs.
(BCMS), preferably aligned to its international standard, ISO 22301.
This green paper will discuss the fundamentals of best-practice business continuity management, as
well as our nine-step approach to implementing ISO 22301.
The same business activities may be affected, but the implications of the disruption are very This approach has a good balance of focus, so you do not end up with one large, unwieldy plan, and
different, and require different solutions as part of your response. Going back to the earlier efficiency, combining scenarios where it is practical to do so.
example, remote working technologies can help keep your business going to begin with, but while
your primary site is being restored (which in itself will require a range of recovery solutions) you
may need to take steps to temporarily migrate to another site – another solution you should
prepare.
As you combine solutions, you are effectively building your response strategies. Your strategy
should detail the solutions you will use, and at what stage of the disruption (before, during or after)
you will use them. This will provide the outline for your BCPs.
Step 1: Project mandate • Key ‘foundation’ processes – leadership, planning and support – requiring you to identify and
take into account the needs of interested parties.
The first stage in any major project should be to ensure that the project has support from the very
top. Senior management or the board are unlikely to commit to a project that has not been The management framework must also formalise key arrangements, including the necessary
defined, so this step will involve defining the scope of the BCMS and producing a business resources, communication and awareness strategies, and competence requirements.
continuity policy that reflects your organisation’s needs and objectives.
Step 5: Risk assessment and BIA
Step 2: Project initiation These processes – discussed in more detail in The foundations of a BCMS – are pivotal to the BCMS
With the project approved, the project leader can begin to develop the BCMS from the information and the basis upon which effective resilience and recovery capabilities are built.
established in step 1. The nascent project should be developed to ensure that both it and the BCMS
are capable of achieving their objectives. Part of this will involve defining the project plan, key Step 6: Business continuity strategy and plans
deliverables and delivery dates, which will allow the organisation to keep track of milestones and Each business continuity strategy should comprise multiple solutions, which should be selected
ensure the project is delivered on time, as intended and within budget. based on your risk assessment and BIA outputs. Business continuity solutions and strategies
discusses this in more detail.
Step 3: BCMS initiation
Once the project has been initiated, the BCMS itself can be started. This stage involves listing the The strategies you develop will form the outlines of your BCPs, which are discussed further in
requirements of each BCMS process and the tasks needed to develop and implement them. These Business continuity plans.
will relate directly to the principal stages in the project plan and inform the assignment of the tasks
required to execute the plan. Step 7: Implementation
This phase involves implementing the processes for incident detection; alerting and escalation;
One of the key elements of this will be establishing the Plan–Do–Check–Act (PDCA) process model response and communication; recovery or continuity of business activities; and final resumption of
for the BCMS, ensuring its processes can be run, evaluated and amended to meet the organisation’s a business-as-usual state. Crucially, these processes must be documented so that anyone who
requirements on an ongoing basis. Part of the BCMS initiation will also involve establishing the needs to be involved can follow them through.
documentation structure.
Of course, these procedures must be validated before relying on them, so it is sensible to conduct
at least one exercise when implementing them, and repeating them at least annually, to establish a
minimum level of effectiveness. The same applies to BCPs: it is a good idea to test them upon
implementation and as an annual exercise to make sure that they are working as intended, as well
as ensure staff will know what to do, should an incident occur.
Step 9: Certification
The final stage is to seek external validation. This serves two key purposes:
1. It checks that the BCMS aligns with the Standard and best practice, which will give the
organisation the best chance of surviving disruption.
2. Certification allows the organisation to demonstrate this to partners, clients and other
stakeholders.
The certification audit will look for several things to determine whether the BCMS is worthy of ISO
22301 certification. There are a few things you can do to maximise your chances of passing:
Speak to an expert
• Your documentation is complete, comprehensive and available for the auditors to inspect.
• You have records of internal audits and testing to prove your BCMS is an active management
system that is subject to genuine continual improvement, as opposed to just a set of static
documents.
• Staff have thorough knowledge of the business continuity areas for which they are responsible.
Subscribe now
Business Continuity Staff Awareness E-learning Certified ISO 22301 BCMS Foundation Training
Course Course
Prepare your employees to respond to workplace disruptions with our This one-day course provides a comprehensive introduction to ISO
interactive, 45-minute business continuity elearning course. Teach your 22301:2019 and its requirements for an effective BCMS, including key
staff what business continuity is, how it is applied in your organisation, business continuity concepts, terms and definitions, and the principles of
and the key role they play. The course includes an assessment at the end BIA and risk assessment. As this is a Live Online course, you can take it
to test staff understanding, and tracks participation and test results. from anywhere with an Internet connection.
Business Continuity and the Pandemic Threat – Pandemic Business Continuity Plan Template
Learning from COVID-19 while preparing for Pandemics are by their nature widespread, indiscriminate and impossible
the next pandemic to prevent. Create your own pandemic BCP in minutes with our easy-to-
use, customisable template, developed by our expert business continuity
A must-have for facing the pandemic threat, this book reveals what you
practitioners. Areas covered within the template include a
should do to mitigate the risk and limit the damage, while designing
communications strategy, home/remote working, legal and contractual
suitable contingency measures.
obligations, and minimising the disruption to key products and services.
Business Impact Analysis – Step by step Cyber Security and Business Resilience – Thinking strategically
Want to learn more about BIA? This green paper discusses exactly what BIA is (and is not), Want to learn more about how business continuity can interact with cyber security? This
where BIA fits into your overall recovery strategy, and our six-step approach to conducting a green paper explains the value of thinking resiliently when it comes to security, and the value
BIA, including how to identify relevant business activities, analyse the impact over time and of incorporating business continuity elements into your cyber defences. It also covers the
determine your recovery priorities. basics of risk assessment, and key points around prevention, detection and response.
Books Consultancy
Our sister company IT Governance Publishing (ITGP) is the world’s only niche IT governance Whatever your IT GRC needs and budget, we have consultancy options to suit you. From fixed-price
publisher, collaborating with industry experts to produce high-quality publications about best- packaged solutions to bespoke and corporate consultancy services, we can help you meet your
practice frameworks, compliance and technical subjects. objectives efficiently and cost-effectively.
Our books cover a wide range of GRC topics, including cyber security and resilience, data privacy Our unique combination of technical expertise and practical experience managing hundreds of
and business continuity. They also come in a range of formats, including softcover, PDF, ePub, projects around the world means we can deliver a complete solution, managing your project from
Kindle and audiobook. start to finish. Join the more than 5,000 organisations we have already helped, and let us offer you
cost-saving and risk-reducing solutions based on international best practice and frameworks.
Visit www.itgovernance.eu/en-ie/shop/category/it-governance-eu-books to view our full catalogue.
Visit www.itgovernance.eu/en-ie/consulting-ie for more information.
Toolkits
Created by expert practitioners and used by more than 9,000 organisations worldwide, our toolkits Penetration testing
contain fully customisable documentation templates designed to help you meet your compliance Identify and mitigate your vulnerabilities before criminal hackers can exploit them. Our CREST-
obligations, ranging from ISO 27001 to the General Data Protection Regulation (GDPR), the accredited penetration testing solutions can support your organisation’s security by identifying
Payment Card Industry Data Security Standard (PCI DSS), ISO 22301, and more. vulnerabilities in your infrastructure, applications, wireless networks and people through our fixed-
price penetration testing packages.
A number of our toolkits are hosted on our Cloud-based DocumentKits platform, enabling us to
regularly update them and making it easier for you to collaborate. These toolkits also come with At the end of each engagement, you will receive a comprehensive report that clearly explains any
unlimited support for account setup and assistance to help you customise and use the templates. issues we have identified from both technical and non-technical perspectives, how those issues
affect your organisation, and recommendations for remediating them.
Visit www.itgovernance.eu/en-ie/documentation-toolkits-ie to view and take a free trial of our
toolkits. Visit www.itgovernance.eu/en-ie/penetration-testing-services-ie for more information.
Training Software
We provide a wide range of training courses, covering areas including data privacy, information Our sister company Vigilant Software develops industry-leading software tools designed to make
security and ISO 27001, cyber security, ethical hacking, and professional certification courses such meeting your security obligations and complying with privacy laws simple and affordable.
as CISA®, CISM®, CGEIT® and CRISC®. To date, we have trained more than 28,000 individuals.
The CyberComply platform comprises six Cloud-based tools: Compliance Manager, the Data Flow
Our courses range from introductory to advanced training, and are available as Live Online and self- Mapping Tool, the Data Protection Impact Assessment (DPIA) Tool, GDPR Manager, Incident
paced online courses. Visit www.itgovernance.eu/en-ie/training-ie for more information. Manager and vsRisk.
More interested in short awareness courses that deliver a consistent, interactive and Visit www.itgovernance.eu/en-ie/shop/category/software for more information.
comprehensive message to all your staff? Visit www.itgovernance.eu/en-ie/it-governance-e-
learning-ie for more information.
© 2003–2023 GRC International Group PLC | Trademark Acknowledgement Statements | GRC International Group Trademarks Notice | September 2022