Business continuity planning (BCP) is the process of ensuring the continuous operation of your business before, during, and after a disaster event. The focus of BCP is totally on business continuation and it ensures that all services that the business provides or critical functions that the business performs are still carried out in the wake of the disaster. To ensure that the critical business services and functions are still operable, the organization needs to take into account the most common threats to their critical functions and also consider any associated vulnerabilities.
The Business Continuity Planning Process
The purpose of business continuity planning is to respond to disruption, activate recovery teams, handle tactical disaster status communication, assess damage caused by disruption, and recover critical assets and processes.
Developing a BCP plan is vital for an organization. It helps to minimize an interruption in normal business functions for any event, from small to catastrophic. BCP has a specific set of requirements for review and implementation to insure that all planning has been considered.
Following are the steps for BCP:
- Project initiation
- Business impact analysis
- Identify preventive control
- Recovery strategy
- Designing and development
- Implementation, training, and testing
- BCP maintenance
NIST SP800-34 provides a guideline for developing a logical BCP. It can be found at:
The scope of the project must be defined and agreed upon before developing a BCP. There are seven milestones involved:
- Develop a contingency planning policy statement.
- Conduct business impact analysis (BIA).
- Identify preventive control.
- Develop strategies for recovery.
- Develop an IT contingency plan.
- Plan testing, training, and exercises.
- Maintenance planning.
Upper-level management support is very important in BCP planning and implementation. C-level management must agree to the plan set forth and must also support the plan’s action (Read more...)
*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by InfoSec Resources. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/iA_AnE1RMl0/