SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
SAHANA
                       CONFERENCE 2009

                     BUSINESS CONTINUITY
                        MANAGEMENT

                     SAHANA CONFERENCE
                       MARCH 24-25, 2009
                     COLOMBO, SRI LANKA

Brent H. Woodworth                         1
Brent H. Woodworth   2
Business Continuity Management:
Steps to Preparedness
 1. GAP analysis
 2. COOP (Continuity of Operations Planning)
 3. BIA (Business Impact Analysis)
 4. Emergency Response Plan
 5. Education
 6. Testing
 7. Update


             3
Brent H. Woodworth   4
Contingency Planning Process
 The seven steps of contingency planning
            Develop the contingency planning policy statement
 1.
            Conduct the business impact analysis (BIA)
 2.
            Identify preventive controls
 3.
            Develop recovery strategies
 4.
            Define recovery roles and responsibilities
 5.
            Plan testing, training, & exercises
 6.
            Plan maintenance
 7.

   Develop
                                   Conduct                        Identify                Develop                     Develop                  Plan Testing,
  Contingency                                                                                                                                                                      Plan
                                Business Impact                  Preventive              Recovery                    Contingency               Training, and
   Planning                                                                                                                                                                     Maintenance
                                   Analysis                       Controls               Strategies                     Plan*                   Exercises
    Policy
      • Identify statutory or        • Identify critical IT                                • Identify methods          • Document recovery        • Develop test objectives        • Review and update plan
                                                                  • Implement controls
        regulatory                     resources                                           • Integrate into system       strategy                 • Develop success criteria       • Coordinate with
                                                                  • Maintain controls
        requirements for             • Identify outage impacts                               architecture                                         • Document lessons                 internal/external
        contingency plans              and allowable outage                                                                                         learned                          organizations
      • Develop IT                     times                                                                                                      • Incorporate into the plan      • Control distribution
        contingency planning         • Develop recovery                                                                                           • Train personnel                • Document changes
        policy statement               priorities
      • Obtain approval of
        policy
      • Publish policy
                                                                                                                     *Discussed in Section 4
                                                  5
Brent H. Woodworth   6
Step 1: Develop the Contingency
        Planning Policy Statement
  Policy must be supported by senior management

  Key policy elements include :
     Roles and responsibilities
     Scope
     Resource requirements
     Training requirements
     Exercise and testing schedules
     Plan maintenance schedule
     Backup frequency and storage method (applies to IT)

                  7
Brent H. Woodworth   8
Step 2: Conduct a Business Impact
Analysis
  The business impact analysis (BIA) characterizes system contingency
  requirements and priorities in the event of a disruption
            Step 1: Identify critical IT resources
            Step 2: Identify disruption impacts and allowable outage times
            Step 3: Develop recovery priorities
                                                                                                                                   Develop Recovery
                                                                                       Identify Disruption Impacts and
                                    Identify Critical IT Resources
                                                                                                                                       Priorities
                                                                                          Allowable Outage Times
  Input from users,
                                                                               PROCESS: 2. Time and Attendance Reporting           Resource        Recovery
  business process      Critical Business Process       Critical Resources                                                                          Priority
                                                                                                 Max Allowable
  owners, application
                                                                             Critical Resource                    Impact
                                                                                                    Outage
  owners, and other
                         1. Payroll Processing
  associated groups                                                                                                              • LAN Server        High
                                                       • LAN Server          • LAN Server           8 hours • Delay in time
                         2. Time and Attendance
                                                                                                                                                   Medium
                                                                                                                                 • WAN Access
                                                       • WAN Access                                           sheet processing
                           Reporting                                         • WAN Access
                                                                                                                                                     Low
                                                                                                                                 • E-mail
                                                                                                            • Inability to
                                                       • E-mail
                         3. Time and Attendance                              • Mainframe
                                                                                                              perform routine
                           Verification                                                                                                              High
                                                                               Access                                            • Mainframe
                                                       • Mainframe Access
                                                                                                              payroll              Access
                         4. Time and Attendance                              • E-mail Server                  operations
                                                       • E-mail Server
                           Approval                                                                                                                  High
                                                         .                                                                       • E-mail Server
                                                                               .
                                                         .                     .                                                   .
                                                                                                            • Delay in payroll
                                                         .
                         .                                                     .                                                   .
                         .                               .                     .                                                   .
                         .                                                                                     processing          .
                                                                                                              .
                         X                                                                                    .
                                                                                                              .




  Results are key to development of recovery strategy and should also be
  used for COOP, BCP, and BRP development
                                           9
Step 3: Identify Preventive Controls
 Preventive controls should be selected and implemented to mitigate
 some of the impacts identified

 Controls include, but are not limited to –
    Uninterruptible Power Supplies (UPS) and power generators
    Fire suppression systems and detectors
    Offsite storage and system documentation
    Technical security controls




                  10
Brent H. Woodworth   11
Step 4: Develop Recovery Strategies
  Recovery strategies are a means to restore IT operations quickly and
  effectively following a disruption
  The strategies should:
     Address residual risks and impacts identified by the BIA
     Use a combination of methods to cover full spectrum of identified
     risks
     Integrate with the design and implementation phases of the system
     development life cycle
  Strategy should consider:
     Backup methods
     Alternate sites, Cost considerations
     Equipment replacement
     Roles and responsibilities

                  12
Brent H. Woodworth   13
Step 5: Recovery Roles & Responsibilities

    Specific teams should be staffed based on their skills,
    knowledge, and normal operating responsibilities

    Team members should be trained to be ready to deploy and
    implement the plan when necessary

    Inter-team training will facilitate coordination and ease
    staff shortages during a response

    Role-based teams should be developed; do not use actual
    names and titles


                  14
Step 5 (continued):
Recovery Roles & Responsibjilities
   Senior management (e.g., CIO, CFO, CEO) should have
   authority over plan activation and execution; may be
   supported by a management team

   Line of succession should define delegation of authority

   All teams are lead by a team leader; team leaders should
   have alternatives designated




                15
Brent H. Woodworth   16
Step 6: Plan Testing, Training, &
        Exercises
Objectives, success criteria, schedule, scope, scenario, and
logistics should be defined in the test plan

Recovery staff should be trained on team procedures and
responsibilities

Plan deficiencies and ability to implement the plan should
be evaluated through testing

2 basic types of tests
   Classroom (tabletop)
   Functional (simulation)


                 17
Step 7: Plan Maintenance

 Plan effectiveness relies on up-to-date system, organization,
 and procedural information

 Reviews, followed by updates, should be conducted:
    At least annually for technical, operational, and system requirements
    At least annually for alternative site/offsite requirements and vital records
    information

 All changes made to the plan should be communicated to the
 owners of associated plans and procedures

 All changes should be recorded in the Record of Changes
 (included in the plan)
                   18
Brent H. Woodworth   19

Contenu connexe

Tendances (20)

Gary.humphreys
Gary.humphreysGary.humphreys
Gary.humphreys
 
Majerowicz
MajerowiczMajerowicz
Majerowicz
 
Eplc security approach_practices_guide
Eplc security approach_practices_guideEplc security approach_practices_guide
Eplc security approach_practices_guide
 
Canga.m.wood.j
Canga.m.wood.jCanga.m.wood.j
Canga.m.wood.j
 
Nichols.david
Nichols.davidNichols.david
Nichols.david
 
Lengyel dave
Lengyel daveLengyel dave
Lengyel dave
 
Critical Success Factors for Contract Management Automation_IACCM
Critical Success Factors for Contract Management Automation_IACCMCritical Success Factors for Contract Management Automation_IACCM
Critical Success Factors for Contract Management Automation_IACCM
 
CBS IM56 March 2011
CBS IM56 March 2011CBS IM56 March 2011
CBS IM56 March 2011
 
Dezfuli.homayoon
Dezfuli.homayoonDezfuli.homayoon
Dezfuli.homayoon
 
Front GRC Brochure
Front GRC BrochureFront GRC Brochure
Front GRC Brochure
 
Junwoo Park
Junwoo ParkJunwoo Park
Junwoo Park
 
Symons
SymonsSymons
Symons
 
IT GOVERNANCE CONSULTING
IT GOVERNANCE CONSULTINGIT GOVERNANCE CONSULTING
IT GOVERNANCE CONSULTING
 
Michael.bay
Michael.bayMichael.bay
Michael.bay
 
Control y seguimiento del proyecto herramientas
Control y seguimiento del proyecto   herramientasControl y seguimiento del proyecto   herramientas
Control y seguimiento del proyecto herramientas
 
Louis.cioletti
Louis.ciolettiLouis.cioletti
Louis.cioletti
 
Service Support Quick Reference
Service Support Quick ReferenceService Support Quick Reference
Service Support Quick Reference
 
Improving Cm Programs (Melbourne, 2008)
Improving Cm Programs (Melbourne, 2008)Improving Cm Programs (Melbourne, 2008)
Improving Cm Programs (Melbourne, 2008)
 
Implementing Lean Six Sigma for IT
Implementing Lean Six Sigma for ITImplementing Lean Six Sigma for IT
Implementing Lean Six Sigma for IT
 
Baldwin.kristen
Baldwin.kristenBaldwin.kristen
Baldwin.kristen
 

Similaire à BUSINESS CONTINUITY MANAGEMENT

Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
ECC International
 
Solvency II - Programme Assurance
Solvency II - Programme AssuranceSolvency II - Programme Assurance
Solvency II - Programme Assurance
gainline
 
Solvency - II Programme Setup
Solvency - II Programme SetupSolvency - II Programme Setup
Solvency - II Programme Setup
gainline
 
Bci gpg2011-kwt-111214121300-phpapp02
Bci gpg2011-kwt-111214121300-phpapp02Bci gpg2011-kwt-111214121300-phpapp02
Bci gpg2011-kwt-111214121300-phpapp02
aqarooni
 
Process Improvement Framework
Process Improvement FrameworkProcess Improvement Framework
Process Improvement Framework
timpco
 
Meeting the Challenge of Vivek Kundra's 25 Point Plan
Meeting the Challenge of Vivek Kundra's 25 Point PlanMeeting the Challenge of Vivek Kundra's 25 Point Plan
Meeting the Challenge of Vivek Kundra's 25 Point Plan
Planet Technologies
 
Understanding The Business Continuity Management Expectations And Good Practices
Understanding The Business Continuity Management Expectations And Good PracticesUnderstanding The Business Continuity Management Expectations And Good Practices
Understanding The Business Continuity Management Expectations And Good Practices
Enterprise Security Risk Management
 

Similaire à BUSINESS CONTINUITY MANAGEMENT (20)

What’s & Why’s of Business Continuity Planning (BCP)
What’s & Why’s of Business Continuity Planning (BCP) What’s & Why’s of Business Continuity Planning (BCP)
What’s & Why’s of Business Continuity Planning (BCP)
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
 
Business Continuity Presentation
Business Continuity PresentationBusiness Continuity Presentation
Business Continuity Presentation
 
Solvency II - Programme Assurance
Solvency II - Programme AssuranceSolvency II - Programme Assurance
Solvency II - Programme Assurance
 
Solvency - II Programme Setup
Solvency - II Programme SetupSolvency - II Programme Setup
Solvency - II Programme Setup
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Process Documentation
Process DocumentationProcess Documentation
Process Documentation
 
The BCI GPG Presentation @ The BCI
The BCI GPG Presentation @ The BCI The BCI GPG Presentation @ The BCI
The BCI GPG Presentation @ The BCI
 
Bci gpg2011-kwt-111214121300-phpapp02
Bci gpg2011-kwt-111214121300-phpapp02Bci gpg2011-kwt-111214121300-phpapp02
Bci gpg2011-kwt-111214121300-phpapp02
 
Process Improvement Framework
Process Improvement FrameworkProcess Improvement Framework
Process Improvement Framework
 
Meeting the Challenge of Vivek Kundra's 25 Point Plan
Meeting the Challenge of Vivek Kundra's 25 Point PlanMeeting the Challenge of Vivek Kundra's 25 Point Plan
Meeting the Challenge of Vivek Kundra's 25 Point Plan
 
Understanding The Business Continuity Management Expectations And Good Practices
Understanding The Business Continuity Management Expectations And Good PracticesUnderstanding The Business Continuity Management Expectations And Good Practices
Understanding The Business Continuity Management Expectations And Good Practices
 
Strategic management ppt
Strategic management pptStrategic management ppt
Strategic management ppt
 
Enhancing learning transfer in the workplace
Enhancing learning transfer in the workplaceEnhancing learning transfer in the workplace
Enhancing learning transfer in the workplace
 
9 Bcp+Drp
9 Bcp+Drp9 Bcp+Drp
9 Bcp+Drp
 
Project Portfolio Management
Project Portfolio ManagementProject Portfolio Management
Project Portfolio Management
 
Measures CGBI For KM
Measures CGBI For KMMeasures CGBI For KM
Measures CGBI For KM
 
Day In the Life of a Proactive Maintenance Manager (DILO)
Day In the Life of a Proactive Maintenance Manager (DILO)Day In the Life of a Proactive Maintenance Manager (DILO)
Day In the Life of a Proactive Maintenance Manager (DILO)
 
Project management best practices
Project management best practicesProject management best practices
Project management best practices
 
Performance improvement methodology
Performance improvement methodologyPerformance improvement methodology
Performance improvement methodology
 

Plus de TalkSahana

Plus de TalkSahana (10)

Real Time Biosurveillance Program
Real Time Biosurveillance ProgramReal Time Biosurveillance Program
Real Time Biosurveillance Program
 
Public Warning: Roles of policymakers, regulators, private sector & civil s...
Public Warning: Roles of  policymakers, regulators, private  sector & civil s...Public Warning: Roles of  policymakers, regulators, private  sector & civil s...
Public Warning: Roles of policymakers, regulators, private sector & civil s...
 
Common Alerting Protocol
Common Alerting ProtocolCommon Alerting Protocol
Common Alerting Protocol
 
Keynote: INTERNATIONAL HUMANITARIAN SERVICES: COLLABORATION, PARTNERSHIPS AN...
Keynote: INTERNATIONAL HUMANITARIAN  SERVICES: COLLABORATION, PARTNERSHIPS AN...Keynote: INTERNATIONAL HUMANITARIAN  SERVICES: COLLABORATION, PARTNERSHIPS AN...
Keynote: INTERNATIONAL HUMANITARIAN SERVICES: COLLABORATION, PARTNERSHIPS AN...
 
Sahana & Disaster Management Software: Past, Present & Future
Sahana & Disaster Management Software: Past, Present & FutureSahana & Disaster Management Software: Past, Present & Future
Sahana & Disaster Management Software: Past, Present & Future
 
Remarks: Sahana Internationalisation Languages and beyond
Remarks: Sahana Internationalisation Languages and beyondRemarks: Sahana Internationalisation Languages and beyond
Remarks: Sahana Internationalisation Languages and beyond
 
Sahana Internationalisation Languages and beyond
Sahana Internationalisation Languages and beyondSahana Internationalisation Languages and beyond
Sahana Internationalisation Languages and beyond
 
Sahana Community Building in India
Sahana Community Building in IndiaSahana Community Building in India
Sahana Community Building in India
 
Sahana Booklet
Sahana BookletSahana Booklet
Sahana Booklet
 
Sahana General 2009 Community And System
Sahana General 2009 Community And SystemSahana General 2009 Community And System
Sahana General 2009 Community And System
 

Dernier

Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
 

Dernier (20)

Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 

BUSINESS CONTINUITY MANAGEMENT

  • 1. SAHANA CONFERENCE 2009 BUSINESS CONTINUITY MANAGEMENT SAHANA CONFERENCE MARCH 24-25, 2009 COLOMBO, SRI LANKA Brent H. Woodworth 1
  • 3. Business Continuity Management: Steps to Preparedness 1. GAP analysis 2. COOP (Continuity of Operations Planning) 3. BIA (Business Impact Analysis) 4. Emergency Response Plan 5. Education 6. Testing 7. Update 3
  • 5. Contingency Planning Process The seven steps of contingency planning Develop the contingency planning policy statement 1. Conduct the business impact analysis (BIA) 2. Identify preventive controls 3. Develop recovery strategies 4. Define recovery roles and responsibilities 5. Plan testing, training, & exercises 6. Plan maintenance 7. Develop Conduct Identify Develop Develop Plan Testing, Contingency Plan Business Impact Preventive Recovery Contingency Training, and Planning Maintenance Analysis Controls Strategies Plan* Exercises Policy • Identify statutory or • Identify critical IT • Identify methods • Document recovery • Develop test objectives • Review and update plan • Implement controls regulatory resources • Integrate into system strategy • Develop success criteria • Coordinate with • Maintain controls requirements for • Identify outage impacts architecture • Document lessons internal/external contingency plans and allowable outage learned organizations • Develop IT times • Incorporate into the plan • Control distribution contingency planning • Develop recovery • Train personnel • Document changes policy statement priorities • Obtain approval of policy • Publish policy *Discussed in Section 4 5
  • 7. Step 1: Develop the Contingency Planning Policy Statement Policy must be supported by senior management Key policy elements include : Roles and responsibilities Scope Resource requirements Training requirements Exercise and testing schedules Plan maintenance schedule Backup frequency and storage method (applies to IT) 7
  • 9. Step 2: Conduct a Business Impact Analysis The business impact analysis (BIA) characterizes system contingency requirements and priorities in the event of a disruption Step 1: Identify critical IT resources Step 2: Identify disruption impacts and allowable outage times Step 3: Develop recovery priorities Develop Recovery Identify Disruption Impacts and Identify Critical IT Resources Priorities Allowable Outage Times Input from users, PROCESS: 2. Time and Attendance Reporting Resource Recovery business process Critical Business Process Critical Resources Priority Max Allowable owners, application Critical Resource Impact Outage owners, and other 1. Payroll Processing associated groups • LAN Server High • LAN Server • LAN Server 8 hours • Delay in time 2. Time and Attendance Medium • WAN Access • WAN Access sheet processing Reporting • WAN Access Low • E-mail • Inability to • E-mail 3. Time and Attendance • Mainframe perform routine Verification High Access • Mainframe • Mainframe Access payroll Access 4. Time and Attendance • E-mail Server operations • E-mail Server Approval High . • E-mail Server . . . . • Delay in payroll . . . . . . . . . processing . . X . . Results are key to development of recovery strategy and should also be used for COOP, BCP, and BRP development 9
  • 10. Step 3: Identify Preventive Controls Preventive controls should be selected and implemented to mitigate some of the impacts identified Controls include, but are not limited to – Uninterruptible Power Supplies (UPS) and power generators Fire suppression systems and detectors Offsite storage and system documentation Technical security controls 10
  • 12. Step 4: Develop Recovery Strategies Recovery strategies are a means to restore IT operations quickly and effectively following a disruption The strategies should: Address residual risks and impacts identified by the BIA Use a combination of methods to cover full spectrum of identified risks Integrate with the design and implementation phases of the system development life cycle Strategy should consider: Backup methods Alternate sites, Cost considerations Equipment replacement Roles and responsibilities 12
  • 14. Step 5: Recovery Roles & Responsibilities Specific teams should be staffed based on their skills, knowledge, and normal operating responsibilities Team members should be trained to be ready to deploy and implement the plan when necessary Inter-team training will facilitate coordination and ease staff shortages during a response Role-based teams should be developed; do not use actual names and titles 14
  • 15. Step 5 (continued): Recovery Roles & Responsibjilities Senior management (e.g., CIO, CFO, CEO) should have authority over plan activation and execution; may be supported by a management team Line of succession should define delegation of authority All teams are lead by a team leader; team leaders should have alternatives designated 15
  • 17. Step 6: Plan Testing, Training, & Exercises Objectives, success criteria, schedule, scope, scenario, and logistics should be defined in the test plan Recovery staff should be trained on team procedures and responsibilities Plan deficiencies and ability to implement the plan should be evaluated through testing 2 basic types of tests Classroom (tabletop) Functional (simulation) 17
  • 18. Step 7: Plan Maintenance Plan effectiveness relies on up-to-date system, organization, and procedural information Reviews, followed by updates, should be conducted: At least annually for technical, operational, and system requirements At least annually for alternative site/offsite requirements and vital records information All changes made to the plan should be communicated to the owners of associated plans and procedures All changes should be recorded in the Record of Changes (included in the plan) 18