Module VII - BCP
Module VII - BCP
Continuity
Management
MODULE – VII – 7%
Failure of IT
2
Definitions …1
Crisis:
An abnormal situation which threatens the operations, staff, customers
or reputation of the enterprise.
Incident:
An event that has the capacity to lead to loss of or a disruption to an
organization’s operations, services, or functions – which, if not
managed, can escalate into an emergency, crisis or disaster.
3
Definitions …2
Disaster:
An unplanned interruption of normal business process.
Risk:
Combination of the probability of an event and its consequence.
Vulnerability:
The degree to which a person, asset, process, information,
infrastructure or other resources are exposed to the actions or effects
of a risk, event or other occurrence.
4
Definitions …3
5
Definitions …4
Business Continuity Planning:
Business continuity planning is the process of developing prior
arrangements and procedures that enable an organization to respond to
an event in such a manner that critical business functions can continue
within planned level of disruption.
Business Continuity Management:
A holistic management process that identifies potential threats to an
organization and the impacts to business operations that those threats
– if realized – might cause, and which provides a framework for building
organizational resilience with the capability for an effective response
that safeguards the interests of its key stake holders, reputation, brand,
and value-creating activities.
6
Related Terms
Asset • - Something of value to organisation
7
Other Terms
Emergency • team comprising of executives at all levels including IT is vested with the
responsibility of commanding the resources to recover
Management Team
Minimum Business
• the minimum level of services and/or products that is acceptable to the
Continuity Objective organizations to achieve its business objectives during a disruption
(MBCO
11
BCP Manual
Documented description of actions to be taken
Resources to be used and
Procedures to be followed before, during and after a
disruptive event.
12
BCP Manual
BCM is a framework that
13
BCM Policy
14
BCM Policy
Objective of this policy is to provide a
structure through which
• Critical services and activities will be identified.
15
Objectives and Goals of BCP
16
Objectives and Goals of BCP
Key Objectives of Contingency Plan
17
Objectives and Goals of BCP
18
Objectives and Goals of BCP
19
Business Impact Analysis (BIA)
20
Objectives of Business Continuity
Planning…1
21
Objectives of Business
Continuity Planning…2
Reduce the likelihood of a disruption occurring that affects the
business through a risk management process
Protect staff and their welfare – ensure staff know their roles
and responsibilities
22
Business Continuity Planning
23
Business Continuity Areas
Business
• The operation’s piece of business
resumption continuity planning
planning
Disaster
• The technological aspect of
recovery business continuity planning
planning
25
Elements of Business Continuity
Recover mission-critical
Disaster
technology and applications at an
Recovery alternate site.
26
Business Continuity Planning
LOW NORMAL
IGNORE
PROCEDURES
IMPACT
CHANGE
HIGH PLAN
SOMETHING
28
What comprises a Business
Continuity Management?
Business
Incident Disaster Business
Continuity
Response Recovery Continuity
Manageme
Plan Plan Plan
nt
29
Types of Disasters
Natural Disaster
E.g. fire, earthquake, tsunami, typhoon, floods, tornado,
lightning, blizzards, freezing temperatures, heavy
snowfall, pandemic, severe hailstorms, volcano .
Artificial/Man-Made Disaster
30
Phases of Disaster
CRISIS
EMERGENCY RESPONSE
RECOVERY
RESTORATION
31
Phases of Disaster - example
Examples of Disaster Impact on Phases
Very Minor fire during working Crisis Phase only, staff and public
hours evacuation but perhaps no
removal of valuable objects, Fire
Service Summoned to deal with
the fire
33
Questions
34
1. An organization's disaster recovery plan
should address early recovery of:
Answer: D
Business management should know what systems are critical and when
they need to process well in advance of a disaster. It is their responsibility
to develop and maintain the plan. Adequate time will not be available for
this determination once the disaster occurs. IS and the information
processing facility are service organizations that exist for the purpose of
assisting the general user management in successfully performing their
jobs.
35
2. Which of the following is MOST important to have in a
disaster recovery plan?
Answer: A
Of the choices, a backup of compiled object programs is the most
important in a successful recovery. A reciprocal processing agreement is
not as important, because alternative equipment can be found after a
disaster occurs. A phone contact list may aid in the immediate aftermath,
as would an accessible supply of special forms, but neither is as important
as having access to required programs.
36
4. The MOST significant level of business continuity planning program
development effort is generally required during the:
37
5. Disaster recovery planning for a company's computer
system usually focuses on
Answer: D
It is important that disaster recovery identify alternative processes that
can be put in place while the system is not available.
38
6. An unplanned interruption of normal
business process is?
A. Risk
B. Vulnerability
C. Disaster
D. Resilience
Answer: C
Disaster is event which interrupts business processes sufficiently to
threaten the viability of the organization. Risk is a combination of the
probability of an event and its consequence. Vulnerability is the degree to
which a person, asset, process, information, infrastructure or other
resources are exposed to the actions or effects of a risk, event or other
occurrence. Resilience is the ability of an organization to resist being
affected by the incident.
39
7. Which of the following strategy does not
encompass disaster recovery plan ?
A. Preventive
B. Detective
C. Corrective
D. Administrative
Answer: D
There are three basic strategies that encompass a disaster recovery plan:
preventive measures, detective measures, and corrective measures.
Preventive measures will try to prevent a disaster from occurring. These
measures seek to identify and reduce risks. Detective measures are taken
to discover the presence of any unwanted events within the IT
infrastructure. Their aim is to uncover new potential threats. Corrective
measures are aimed to restore a system after a disaster or otherwise
unwanted event takes place.
40
8. Which of the following is not a
fundamental of BCP?
Answer: D
Mitigate negative publicity is an objective of Business continuity
management is to rest all are the fundamental aim of BCP.
41
9. Which phase starts with a damage
assessment?
A. Crisis Phase
B. Emergency Response Phase
C. Recovery Phase
D. Restoration Phase
Answer: D
Restoration phase will start with a damage assessment, usually within a
day or so of the disaster, when the cause for evacuation or stopping of
operations has ended, normal working will be restarted. During the
Restoration Phase, any damage to the premises and facilities will be
repaired.
42
10. Which of the following is of utmost important
during an impact of disaster?
A. Loss of Productivity
B. Loss of Revenue
C. Loss of Human Life
D. Loss of Goodwill & Market Share
Answer: C
Protection of human life is of utmost importance and, the overriding
principle behind continuity plans. Rest all are to be considered later.
43
Developing a BCP
Phases in Development of a BCP
Phase 5 –
Phase 4 – Phase 6 –
Training and
Testing of the Maintenance of
awareness to the BCP
BCP
the employees
45
Phase 1: Business Impact Analysis
46
Business Impact Analysis (BIA)
49
Objectives of Risk Assessment
Criticality prioritization
50
Phases of Risk Assessment
Identify the risks that departments face;
51
Types of Threats
52
Risk Assessment Methods
• The ability of a company to cope with interruption of a business process
determines the TOLERANCE of the business process. The various
Risk Ranking business processes may be classified as Critical, Vital, Sensitive, Non
critical
• A range of values is set for each of the following, Asset cost, likelihood of
Value ranges threat, vulnerability and assessment of the risk.
There is no universally
appropriate formula for this • Risk = Threat x Vulnerability x Impact
process, but it approximates to
53
Phase 3: Development of BCP
Documentation BCP Manual
• BCP Policy • Purpose of BCP
• TOC
• BIA and Risk Assessment Report • Disaster Definitions
• Objectives of the Plan
• Aims, objectives, Activities • Scope of the Plan
undertaken by each function • Plan Approach/Recovery
Strategy
• BCP Manual • Plan Administration
• Plan Management
• Training Program • Disaster Notification and Plan
Notification Procedures
• Test plans
54
Some Important Teams
Business Continuity Team Administration team
55
Minimum Requirements of a BCP
56
Phase 4: Testing of BCP
The Disaster Recovery Coordinator is responsible for
testing of the disaster recovery plan at least annually
to ensure the viability of the plan.
57
Types of Test
Checklist Test
Simulation Test
Parallel Test
58
Testing Process
Develop the
Test plan as per Perform the
Initiate the Test
the type of test test
decided
59
Phase 5: Training and Awareness
Purpose of training
• To train recovery ream participants who are required to execute plan segments in the
event of a disaster.
• To train the management and key employees in disaster prevention and awareness and
the need for disaster recovery planning.
60
Training and Awareness Methods
Walkthrough
Session
Scenario
Workshop
Live Test
Simulation
61
Phase 6: Maintenance of BCP
It is critical that existing change management processes are revised to take recovery plan
maintenance into account.
BCM testing, maintenance and audit testify the enterprise BCM to prove the extent to
which its strategies and plans are complete, current and accurate; and Identifies
opportunities for improvement.
The BCM maintenance process demonstrate the documented evidence of the proactive
management and governance of the enterprise’s business continuity program; the key
people who are to implement the BCM strategy and plans are trained and competent;
62
Incident Handling and Management
63
Reaction to the Incident
64
Reaction to the incident - Post
Incident Classification
Incident Notification
65
Invoking a BCP/DRP Phase
66
Key disaster recovery activities
Redirecting
information
Notifying key
Activating the Notifying technology
management
recovery plan team leaders service to an
contacts
alternate
location
Securing a Ordering and
Reinstalling
new location configuring Reconfiguring
software and
for the data replacement the network
data
center equipment
67
Business Categorization
Business
Categorization
68
Business Categorization
• Loss of revenue
• Loss of reputation
69
Disaster Scenarios
Disaster
Scenarios
70
Disaster Scenarios
The scenario of disaster shall be decided with the matrix given below:
Business impact
71
What is a Disaster ?
Test Briefing
Assumption Checklists
Prerequisites session
Analysing Debriefing
the test session
74
Disaster Recovery Team
Management TeamRecovery - The disaster
recovery plan should contain Disaster Management
Team Call Checklist. It should specify the contact
information about Team leader as well as team
members with the details on which functionality
he/she can be contacted.
75
Disaster Recovery Team
76
Disaster Recovery Team
Technical Call team support - The disaster recovery plan should contain
Disaster Recovery Technical Support Team Call Checklist. It should specify the
contact information about Team leader as well as team members with the
details on which functionality he/she can be contacted.
77
Disaster Recovery Team
Facility Team - The disaster recovery plan should contain details about
Facility Team and its sub-teams like Salvage team, new data center,
new hardware team etc. and their respective responsibilities.
78
Disaster Recovery Team
79
Documentation of BCM
The business
The business
The business continuity
impact analysis
continuity policy; management
report;
system;
The business
continuity
strategies;
80
Documentation of BCM
Change control,
The overall and specific preventative action,
The business continuity
incident management corrective action,
plans;
plans; document control and
record control processes;
Training Program
81
BCP Policy
The BCM policy defines the processes of setting
up activities for establishing a business continuity
capability and the ongoing management and
maintenance of the business continuity capability.
82
BCP Policy
The ongoing maintenance and
management activities include
embedding business continuity within
the enterprise, exercising plans
regularly, and updating and
communicating them, particularly when
there is significant change in premises,
personnel, process, market, technology
or organizational structure.
83
BCP Policy - Objectives
The enterprise should consider defining the scope, BCM principles,
guidelines and applicable standards for the enterprise. They should
refer all relevant standards, regulations and policies that have to be
included or can be used as benchmark.
84
BCP Policy - Objectives
Invocation of incident management and business
continuity plans can be managed.
85
BCP Manual
A BCP manual is a documented
description of actions to be
taken, resources to be used and
procedures to be followed
before, during and after an
event that severely disrupts all
or part of the business
operations.
86
Elements of BCP Manual
Organization of the
Purpose of the plan Disaster Definitions
manual
Disaster
Notification and
Plan Administration Plan Management
activation
procedures
87
Data Backup Strategies
Dual Recording
of Data
Periodic
Dumping of Data
Logging input
transactions
Logging changes
to the data
88
Software and Data Back-up
Techniques
Full Backup
◦ captures all files on the disk
◦ More time & space
Incremental Backup
◦ captures files that were created or changed since the last backup (regardless of
the type of backup)
◦ Saves time, but difficult to restore
Software and Data Back-up
Techniques
Differential Backup
◦ captures files that were created or changed since the last Full backup
◦ Faster and easy to restore
Mirror Backup
◦ Extra copy of Backup
◦ Does not zip and cannot be password protected
Different Strategies
For Data
For LAN Systems
Communication
Eliminating
Single point of Dial Up
Failure
Redundant
Circuit
cabling &
Extensions
devices
On demand
service from
carriers
91
Alternative Sites
Mirror Site
Hot Site
Cold Site
Warm Site
Mobile Site
92
Alternate Processing Facility
Arrangements
Cold
site
Warm
site
Recipro
cal
Hot site
agreem
ent
93
Cold site
94
Hot site
96
Comparison of recovery sites
98
Data Vaults
Backups are stored in purpose built vaults.
Types -
• Hybrid onsite vaulting
• Hybrid offsite vaulting
99
System Resiliency Tools
102
Types of Insurance
104
1. Which of the following control concepts should be included in a
complete test of disaster recovery procedures?
Answer: A
Recovery managers should be rotated to ensure the experience of the
recovery plan is spread. Clients may be involved but not necessarily in
every case. Not all technical staff should be involved in each test. Remote
or off-site backup should always be used.
105
2. An advantage of the use of hot sites as a
backup alternative is:
Answer: D
Hot sites can be made ready for operation normally within hours. However,
the use of hot sites is expensive, should not be considered as a long-term
solution and does require that equipment and systems software be
compatible with the primary installation being backed up.
106
5. Which of the following is NOT a feature of an
uninterruptible power supply (UPS)?
Answer: D
A UPS typically cleanses the power to ensure wattage into the computer
remains consistent and does not damage the computer. All other answers
are features of a UPS.
107
7. For which of the following applications would RAID
recovery be MOST crucial?
A. Point-of-sale
B. Corporate planning
C. Regulatory reporting
D. Departmental chargeback
Answer: A
A point-of-sale system is a critical online system that when inoperable
will jeopardize the ability of a company to generate revenue and
properly track inventory.
108
8. Which of the following principles must exist to ensure the
viability of a duplicate information processing facility?
A. The site is near the primary site to ensure quick and efficient recovery is
achieved.
B. The workload of the primary site is monitored to ensure adequate backup is
complete.
C. The site contains the most advanced hardware available from the chosen
vendor.
D. The hardware is tested when it is established to ensure it is working
properly
Answer: B
Resource availability must be assured. The workload of the site must be monitored
to ensure that availability for emergency backup use is not impaired. The site
chosen should not be subject to the same natural disaster as the primary site. In
addition, a reasonable compatibility of hardware/software must exist to serve as a
basis for backup. The latest or newest hardware may not adequately serve this
need. Testing the site when established is essential, but regular testing of the
actual backup data is necessary to ensure the operation will continue to perform as
planned.
109
9. While reviewing the business continuity plan of an organization, the IS auditor
observed that the organization's data and software files are backed up on a periodic basis.
Which characteristic of an effective plan does this demonstrate?
A. Deterrence
B. Mitigation
C. Recovery
D. Response
Answer: B
An effective business continuity plan includes steps to mitigate the effects of a
disaster. To have an appropriate backup plan, an organization should have a
process capability established to restore data and files on a timely basis,
mitigating the consequence of a disaster. An example of deterrence is when a
plan includes installation of firewalls for information systems. An example of
recovery is when a plan includes an organization's hot site to restore normal
business operations.
110
10. As updates to an online order entry system are processed, the updates are recorded on
a transaction tape and a hard copy transaction log. At the end of the day, the order entry files are
backed up onto tape. During the backup procedure, the disk drive malfunctions and the order
entry files are lost. Which of the following are necessary to restore these files?
A. The previous day's backup file and the current transaction tape
B. The previous day's transaction file and the current transaction tape
C. The current transaction tape and the current hardcopy transaction log
D. The current hardcopy transaction log and the previous day's transaction file
Answer: A
The previous day's backup will be the most current historical backup of activity
in the system. The current day's transaction file will contain all of the day's
activity. Therefore, the combination of these two files will enable full recovery
up to the point of interruption
111
Audit of BCP
Steps of BCP Process
113
Tasks and resources of BCP
Human resources
Processing capability
Computer-based services
Physical infrastructure
114
Standards and Frameworks
Standards
• ISO 22301 –Business Continuity management
• ISO 27031 - Guidelines for information and communication technology readiness for
business continuity
Frameworks
• COBIT 5 – DSS04 (Deliver, Service and Support) – Manage Continuity
• COBIT 5 – APO09 (Align, Plan and Organize) – Manage Service Agreements
• COBIT 5 – BAI04 (Build, Acquire and Implement) – Manage Availability and Capacity
• COBIT 5 – BAI06 – Manage Changes
BCP Audit Approach
Confirm Assessment Expectations / Collect Business Requirements
• Process Management
• Risk Assessment and Business Impact Analysis
• Define Recovery Strategies and Business Continuity Procedures
Training and Awareness, Plan Testing Process, Auditing and Plan Maintenance
• Same Industry
• Same Size Company
Auditing BCP
Evaluate readability of
Understand and
Ensure plan business continuity
evaluate business
maintenance is in place manuals and
continuity strategy
procedures
Evaluate ability of IS
Evaluate plans for
and user personnel to
accuracy and adequacy
respond effectively
Verify plan
Evaluate offsite storage
effectiveness
BCP Audit Approach
Maintain information in the following areas:
Offer to track
Recommend
completion of
point of contact
each action item
Service Level Agreement
A service level agreement is an agreement between the organization and the
customer. The SLA details are the services(s) to be provided.
Where the functions of a BCP are outsourced, the IS auditor should determine how
management gains assurance that the controls at the third party are properly designed
and operating effectively.
Conducting Pre
implementation Audit,
Consultancy Services in Consultancy Services in
Post Implementation
Revising the BCP Risk Assessment and BIA
Audit and General Audit
of BCP
Questions
122
1. An IS auditor reviewing an organization's information systems
disaster recovery plan should verify that it is:
Answer: B
The plan must be reviewed at appropriate intervals, depending upon the nature of the business and the rate of
change of systems and personnel, otherwise it may quickly become out of date and may no longer be effective (for
example, hardware or software changes in the live processing environment are not reflected in the plan). Of
course, the plan must be subjected to regular testing, but the period between tests will again depend on the nature
of the organization and the relative importance of IS. Three months or even annually may be appropriate in
different circumstances. Although the disaster recovery plan should receive the approval of senior management, it
need not be the CEO if another executive officer is equally, or more appropriate. For a purely IS-related plan, the
executive responsible for technology may have approved the plan. Similarly, although a business continuity plan
(BCP) is likely to be circulated throughout an organization, the IS disaster recovery plan will usually be a technical
document and relevant to IS and communications staff only.
123
2. Which of the following would an IS auditor consider to be the MOST important to
review when conducting a business continuity audit?
Answer: C
More than one person would need to have a key to the vault and location of the
vault is important, but not as important as the files being synchronized. Choice A is
incorrect because more than one person would typically need to have a key to the
vault to ensure that individuals responsible for the offsite vault can take vacations
and rotate duties. Choice B is not correct because the IS auditor would not be
concerned whether paper documents are stored in the offsite vault. In fact, paper
documents such as procedural documents and a copy of the contingency plan would
most likely be stored in the offsite vault.
125
4. A company performs full back-up of data and programs on a regular basis.
The primary purpose of this practice is to:
Answer: B
Back-up procedures are designed to restore programs and data to a
previous state prior to computer or system disruption. These backup
procedures merely copy data and do not test or validate integrity. Back-up
procedures will also not prevent changes to program and data. On the
contrary, changes will simply be copied. Although backup procedures can
ease the recovery process following a disaster, they are not sufficient in
themselves.
126
5. Which of the following procedures would an IS auditor perform to BEST determine
whether adequate recovery/restart procedures exist?
127
6. An IS auditor performing a review of the back-up processing
facilities would be MOST concerned that:
Answer: C
Adequate fire insurance and fully tested backup processing facilities are
important elements for recovery, but without the offsite storage of
transaction and master files, it is generally impossible to recover.
Regular hardware maintenance does not relate to recovery.
128
7. Which of the following offsite information processing facility conditions
would cause an IS auditor the GREATEST concern?
129
8. Which of the following methods of results analysis, during the testing of the business
continuity plan (BCP), provides the BEST assurance that the plan is workable?
Answer: A
Quantitatively measuring the results of the test involves a generic
statement measuring all the activities performed during BCP, which gives
the best assurance of an effective plan. Although choices B and C are also
quantitative, they relate to specific areas or an analysis of results from one
viewpoint, namely the accuracy of the results and the elapsed time.
130
The End ☺
CA Narasimhan Elangovan
B. Com, CA, CS, DISA, DipIFR (UK), CISA (US), LLB
Mail: ca.narasi23@gmail.com / narasimhan@ken-co.in
LinkedIn / YouTube: Narasimhan Elangovan