Ch16 - 16.01 - Intro to Disaster Recovery and Business Continuity Flashcards
Business Continuity Plan (BCP)
A business continuity plan (BCP) is an important element in the security of your organization because it is a plan that helps ensure that business operations can continue when disaster strikes by implementing failover not only in your technology but in your business operations.
The BCP is a comprehensive document that identifies procedures for the business to recover from any disaster in an acceptable amount of time. The BCP also includes all the risks to the business and how to mitigate those risks. The end value of the BCP is that it reduces the impact of a disaster on your organization because you are prepared for the disaster and business operations can continue.
Steps to Creating a BCP
- Project Initiation
2. Business Impact Assessment/Business Impact Analysis (BIA)
BCP - 1. Project Initiation - p1
The first phase of the BCP is project initiation, which involves deciding that you need a BCP and getting management to buy into the need for it. You will need the support of management because you are going to need to commit your time, and that of others, to the creation of the BCP.
To get management support, you will need to make a business case as to why a BCP is needed. The following list summarizes some of these reasons:
- Continued Business
- Compliance
- Past Scenarios
BCP - 1. Project Initiation - p2
Once you have the support from management, you can continue with the project initiation phase by creating a BCP committee. The BCP committee is a group of individuals from different departments within the company who are selected to represent their department and give insight to the operational requirements of that department.
BCP - 2. Business Impact Assessment/Business Impact Analysis (BIA)
Once the committee has been selected, you are then ready for the next phase of
building a BCP—the business impact assessment, or BIA. The BIA is the risk assessment part of a BCP. It involves identifying critical business functions and determining the risks against those functions, and how long the company can last without those functions.
Steps to Performing the BIA
- Identify critical business functions
- Identify resources used by functions
- Determine allowable downtime of functions.
- Identify threats to (those resources used by) function.
- Determine impact of threat (Tangible vs. Intangible Impacts)
- Determine mitigation techniques
Steps to Performing the BIA - 1. Identify critical business functions
The first step in the BIA is to determine what functions are critical to the business; these functions are known as mission-essential functions. The primary method of identifying the critical functions is to identify any loss of function that would result in huge revenue loss or that would present a safety concern to employees. Another example of how to identify critical business tasks or functions is to determine whether, if the function goes down, you may be failing to meet contractual agreements or to comply with regulations, both of which could result in lawsuits against the business.
Steps to Performing the BIA - 2. Identify resources used by functions
After you have identified the critical business functions, you then identify the resources each function requires. This involves identification of critical systems, which are systems that the mission-essential functions cannot do without. For example, you may have identified the sales of online
products as being a critical function to your business. This function relies on resources such as the Internet connection, web site, or product database—if any of those resources is lost, online sales cannot occur.
Steps to Performing the BIA - 3. Determine allowable downtime of functions.
You next look at determining the maximum tolerable downtime (MTD) of each business function, which indicates an amount of time the business can survive without that function. The following outlines some examples of tolerable downtimes for types of functions in the business:
Nonessential services = 30 days
Normal priority services = 7 days
Important functions to the business = 72 hours
Urgent functions = 24 hours
Critical functions = within 3 hours
Steps to Performing the BIA - 4. Identify threats to (those resources used by) function.
Once you have identified the different functions of the business and determined the allowable downtime, you are ready to identify the different threats against each function:
Manmade threats
These are threats such as fires, vandals, hackers, and even employee strikes.
Natural disasters
These could be floods, hurricanes, earthquakes, or anything else that is a force of nature.
Technical threats
Your company could experience loss of power for long periods, system failures, communication link failure, or device failures.
Steps to Performing the BIA - 5. Determine impact of threat (Tangible vs. Intangible Impacts)
After you determine the threats against each asset, you are then ready to determine the impact that the threat would have on your business. Determining the impact is important because it helps justify the cost of the mitigation technique used to protect the asset.
Steps to Performing the BIA - 6. Determine mitigation techniques
As a final step in the BIA, you will determine mitigation techniques for each of the threats you have identified in the previous steps.
Examples of mitigation techniques are performing backups, implementing fault tolerance, and implementing high-availability solutions. You can also implement redundant power and WAN links.
BCP - 3. Develop the Plan
Once you have completed the BIA, focus on developing the business continuity plan, which includes the methods used to minimize downtime when a disaster strikes the organization. The many aspects to this plan include the disaster recovery plan (DRP), which is a step-by-step document that demonstrates the steps needed to recover systems from failures.
BCP - 4. Test the Plan
The BCP will need to be thoroughly tested before it can be relied on in an emergency situation. You can test your BCP with different types of testing (Increase by the level of involvement):
- Checklist review
- Tabletop exercise/structured walkthrough
- Simulation test
- Parallel test
- Full disruption test
BCP - 4. Test the Plan - 1. Checklist review
With a checklist review, the BCP is distributed to the representative for each department to review and to verify that no
major components of the BCP have been left out.