0% found this document useful (0 votes)
31 views

Example Coop Continuity of Operations Program

The document outlines a continuity of operations plan (COOP) for an organization. It details the plan's scope and applicability, key terminology, conceptual operations including locations and requirements, devolution of control and direction including roles, and a two phase plan - prepare and react. The plan aims to ensure the organization can continue operating during disruptive events.

Uploaded by

eser
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

Example Coop Continuity of Operations Program

The document outlines a continuity of operations plan (COOP) for an organization. It details the plan's scope and applicability, key terminology, conceptual operations including locations and requirements, devolution of control and direction including roles, and a two phase plan - prepare and react. The plan aims to ensure the organization can continue operating during disruptive events.

Uploaded by

eser
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

CONTINUITY OF OPERATIONS PLAN

(COOP)

[Official Company Name]

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
TABLE OF CONTENTS
NOTICE 6
REFERENCED FRAMEWORKS & SUPPORTING PRACTICES 6
CONTINUITY OF OPERATIONS PLAN (COOP) OVERVIEW 7
INTRODUCTION 7
PURPOSE 7
SCOPE & APPLICABILITY 8
EXCEPTIONS 8
UPDATES 8
KEY TERMINOLOGY 8
CONCEPT OF OPERATIONS (CONOPS) 11
CONTINUITY OF OPERATIONS PLAN (COOP) FRAMEWORK 11
COOP STRATEGY 12
COOP MISSION 12
OPERATIONAL LOCATIONS 12
WORLD HEADQUARTERS (WHQ) 12
PRIMARY PROCESSING SITE (PPS) 12
ALTERNATE PROCESSING SITE (APS) 12
PRIMARY STORAGE SITE (PSS) 12
ALTERNATE STORAGE SITE (ASS) 12
OTHER OPERATIONAL LOCATIONS 12
OPERATIONAL REQUIREMENTS 13
CAPABILITY RESILIENCE LEVEL (CRL) 13
MAXIMUM TOLERABLE DOWNTIME (MTD) 13
RECOVERY POINT OBJECTIVE (RPO) 13
RECOVERY TIME OBJECTIVE (RTO) 14
LINES OF BUSINESS (LOB) 14
HUMAN RESOURCES (HR) 14
FINANCE 14
SALES 14
[INSERT LINE OF BUSINESS NAME] 14
[INSERT LINE OF BUSINESS NAME] 15
[INSERT LINE OF BUSINESS NAME] 15
THIRD-PARTY SERVICE PROVIDERS (TSP) 15
[INSERT THIRD-PARTY SERVICE PROVIDER NAME] 15
[INSERT THIRD-PARTY SERVICE PROVIDER NAME] 15
[INSERT THIRD-PARTY SERVICE PROVIDER NAME] 15
[INSERT THIRD-PARTY SERVICE PROVIDER NAME] 15
SUPPORTING ORGANIZATIONS 16
[INSERT ELECTRICAL COMPANY NAME] 16
[INSERT WATER COMPANY NAME] 16
[INSERT TELECOMMUNICATIONS COMPANY NAME] 16
[INSERT INTERNET SERVICE PROVIDER (ISP) COMPANY NAME] 16
[INSERT PHYSICAL SECURITY COMPANY NAME] 16
[INSERT LOCAL LAW ENFORCEMENT DEPARTMENT] 16
[INSERT LOCAL FEDERAL BUREAU OF INVESTIGATIONS (FBI) FIELD OFFICE] 16
[INSERT INSURANCE COMPANY NAME] 16
[INSERT LOCAL RED CROSS LOCATION NAME] 16
DEVOLUTION OF CONTROL & DIRECTION 17
DELEGATION OF AUTHORITY 17
UNITY OF EFFORT 17
BUSINESS OPERATIONS 17
KEY STAFF ROLES 18
BUSINESS CONTINUITY TEAM (BCT) 18
SENIOR MANAGEMENT 18
INTEGRATED SECURITY INCIDENT RESPONSE TEAM (ISIRT) 19

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 2 of 59
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
DAMAGE ASSESSMENT TEAM (DAT) 20
INFRASTRUCTURE TEAM 20
END USER COMPUTING (EUC) TEAM 21
PROCUREMENT TEAM 21
PHASE 1 – PREPARE 23
MISSION ESSENTIAL FUNCTIONS (MEF) 23
BUSINESS IMPACT ANALYSIS (BIA) 23
CAPABILITY DEVELOPMENT 24
PEOPLE 24
Emergency Contact Lists 24
Training 24
PROCESSES 24
Inventory of Critical Processes 24
Critical Records & Files 24
TECHNOLOGY 24
Inventory of Critical Systems & Applications 24
TESTING & EXERCISES 25
TABLETOP EXERCISES 25
FUNCTIONAL EXERCISES 25
EXERCISE SCENARIOS 26
AFTER ACTION REPORT (AAR) 26
PLAN DISTRIBUTION 26
DISTRIBUTION OF HARDCOPIES 26
LOCATION OF DIGITAL VERSION 26
PLAN REVIEW CYCLE 26
PHASE 2 – REACT 27
INCIDENT RESPONSE PLANS (IRPS) 27
REPORTING OBLIGATIONS 27
ACTIVATION CRITERIA 27
RISK CATEGORIES 27
EVENTS WITH PRIOR WARNING 28
EVENTS WITHOUT WARNING 28
SITUATIONAL AWARENESS 29
COMMON RECOGNIZED INFORMATION PICTURE (CRIP) 29
WARNING ORDERS (WARNO) 29
COMMUNICATIONS & STATUS REPORTING 30
RELOCATION OPERATIONS 30
TEMPORARY ACCOMMODATIONS 30
DEPARTMENT OF TRANSPORTATION (DOT) 30
SUPPORTING LOGISTICS 30
PHASE 3 – RECOVER 31
RECOVERY PRIORITY 31
DISASTER RECOVERY PLANS (DRPS) 31
FOLLOW-UP SUPPORT 31
COMMUNICATIONS & STATUS REPORTING 31
PHASE 4 – TRANSITION 33
SUSTAINABLE OPERATIONS 33
TEMPORARY OR REPLACEMENT STAFF 33
BUSINESS CONTINUITY PLANS (BCPS) 33
DAMAGE ASSESSMENT SURVEY 33
TRANSITION COURSES OF ACTION (COA) 34
COA APPROVAL 34
COMMUNICATIONS & STATUS REPORTING 34
PHASE 5 – REVIEW & IMPROVE 35
PERFORMANCE EVALUATION 35
PLAN REVISION 35

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 3 of 59
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
PLAN DISTRIBUTION & TRAINING 35
APPENDICES 36
APPENDIX A: BASELINE SECURITY CATEGORIZATION GUIDELINES 36
A-1: DATA SENSITIVITY 36
A-2: SAFETY & CRITICALITY 36
A-3: BASIC ASSURANCE REQUIREMENTS 37
A-4: ENHANCED ASSURANCE REQUIREMENTS 37
APPENDIX B: MEF RECOVERY PRIORITIZATION 38
B-1: TIER 1 - IMMEDIATE 38
B-2: TIER 2 - MISSION CRITICAL 38
B-3: TIER 3 - BUSINESS CRITICAL 38
B-4: TIER 4 - NON-CRITICAL 39
APPENDIX C: CRITICAL RECORDS & FILES 40
APPENDIX D: COOP ACTIVATION SCENARIOS 41
D-1: LOSS OF PRIMARY WORKSPACE 41
D-2: LOSS OF SUPPORTING INFRASTRUCTURE 42
D-3: DISRUPTION OF VOICE COMMUNICATIONS 43
D-4: DISRUPTION OF DATA COMMUNICATIONS 44
D-5: DISRUPTION OF INTERNAL NETWORK(S) 45
D-6: LOSS OF KEY THIRD-PARTY SERVICE PROVIDER (KTSP) 46
D-7: LOSS OF STAFF / PANDEMIC 47
D-8: BLACK SWAN EVENT 48
APPENDIX E: AFTER ACTION REPORT (AAR) TEMPLATE 49
APPENDIX F: LINES OF BUSINESS (LOB) RECONSTITUTION CRITERIA 50
UTILITIES 50
PREMISES, FIXTURES AND FURNITURE 50
SALES AND CUSTOMER SERVICE 50
INFORMATION AND DOCUMENTATION 50
OFFICE SUPPLIES 50
APPENDIX G: FORMS & TEMPLATES 51
GLOSSARY: ACRONYMS & DEFINITIONS ERROR! BOOKMARK NOT DEFINED.
ACRONYMS ERROR! BOOKMARK NOT DEFINED.
DEFINITIONS ERROR! BOOKMARK NOT DEFINED.
RECORD OF CHANGES 53
ANNEX 1: DISASTER RECOVERY PLAN (DRP) TEMPLATE 54
TECHNOLOGY ASSET RECOVERY – ACTIVITY SEQUENCE 54
RESOURCES NEEDED FOR TECHNOLOGY ASSET RECOVERY 54
CORE SYSTEMS, APPLICATIONS & SERVICES 54
SUPPORTING INFRASTRUCTURE, SYSTEMS, APPLICATIONS, SERVICES & VENDORS 55
DISASTER RECOVERY VERIFICATION 55
FUNCTIONALITY VALIDATION 55
DATA VALIDATION 55
DISASTER RECOVERY DECLARATION 55
CREATE BACKUP 55
EVENT DOCUMENTATION 56
DEACTIVATION 56
ANNEX 2: BUSINESS CONTINUITY PLAN (BCP) TEMPLATE 57
BUSINESS PROCESS RECOVERY – ACTIVITY SEQUENCE 57
RESOURCES NEEDED FOR BUSINESS PROCESS RECOVERY 57
CORE BUSINESS PROCESSES 57
SUPPORTING SERVICES & BUSINESS PROCESSES 58
BUSINESS CONTINUITY RECOVERY VERIFICATION 58
PROCESS VALIDATION 58
DATA VALIDATION 58
BUSINESS CONTINUITY RECOVERY DECLARATION 58
EVENT DOCUMENTATION 59

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 4 of 59
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
DEACTIVATION 59

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 5 of 59
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
NOTICE

REFERENCED FRAMEWORKS & SUPPORTING PRACTICES


This document references numerous leading industry frameworks in an effort to provide a holistic approach to designing and
maintain processes to ensure the confidentiality, integrity, availability and safety (CIAS) of [Official Company Name] ([Company
Name])’s systems, applications, services and data. The following external content is referenced by or supports this Continuity of
Operations Plan (COOP):

 The National Institute of Standards and Technology (NIST): 1


o NIST 800-34: Contingency Planning Guide for Federal Information Systems
o NIST 800-37: Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life
Cycle Approach
o NIST 800-39: Managing Cybersecurity Risk: Organization, Mission and Information System View
o NIST 800-50: Building An Information Technology Security Awareness and Training Program
o NIST 800-53: Security and Privacy Controls for Federal Information Systems and Organizations
o NIST 800-84: Guide To Test, Training and Exercise Programs for IT Plans and Capabilities
o NIST 800-171: Protecting Controlled Unclassified Information in Nonfederal Information Systems and
Organizations
o NIST 800-181: National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework
o NIST IR 7298: Glossary of Key Cybersecurity Terms
o NIST IR 8179: Criticality Analysis Process Model: Prioritizing Systems and Components [draft]
o NIST Framework for Improving Critical Cybersecurity (Cybersecurity Framework)
 The International Organization for Standardization (ISO):2
o ISO 15288: Systems and Software Engineering -- System Life Cycle Processes
o ISO 22301: Societal Security – Business Continuity Management Systems – Requirements
o ISO 27002: Information Technology -- Security Techniques -- Code of Practice for Cybersecurity Controls
 Other Frameworks:
o Federal Emergency Management Agency Incident Command System (FEMA ICS)3
o FEMA Natural Disaster Recovery Framework (FEMA NDRF)4
o FEMA National Response Framework (FEMA NRF)5
o Cloud Security Alliance Cloud Controls Matrix (CSA CCM)6
o Center for Internet Security Critical Security Controls (CIS CSC)7
o Control Objectives for Information and Related Technologies (COBIT)8
o European Union Regulation 2016/279 (General Data Protection Regulation (EU GDPR))9

1
National Institute of Standards and Technology - http://csrc.nist.gov/publications/PubsSPs.html
2
International Organization for Standardization - https://www.iso.org
3
Federal Emergency Management Agency - https://training.fema.gov/EMIWeb/IS/ICSResource/index.htm
4
FEMA NDRF - https://www.fema.gov/national-disaster-recovery-framework
5
FEMA NRF - https://www.fema.gov/media-library-data/1466014682982-9bcf8245ba4c60c120aa915abe74e15d/National_Response_Framework3rd.pdf
6
Cloud Security Alliance - https://cloudsecurityalliance.org/
7
Center for Internet Security - https://www.cisecurity.org/
8
COBIT - http://www.isaca.org/COBIT/Pages/default.aspx
9
EU General Data Protection Regulation - http://ec.europa.eu/justice/data-protection/reform/files/regulation_oj_en.pdf

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 6 of 59
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
CONTINUITY OF OPERATIONS PLAN (COOP) OVERVIEW

INTRODUCTION
The Continuity of Operations Plan (COOP) provides authoritative guidance on the prescribed measures used to establish and
maintain Business Continuity and Disaster Recovery (BC/DR) capabilities at [Company Name].

Protecting [Company Name] data and the systems that collect, process and store this information is of critical importance.
Consequently, the security of systems must include controls and safeguards to offset possible threats, as well as controls to ensure
accountability, availability, integrity, confidentiality and safety of the data:

 Confidentiality – Confidentiality addresses preserving restrictions on information access and disclosure so that access is
restricted to only authorized users and services.
 Integrity – Integrity addresses the concern that sensitive data has not been modified or deleted in an unauthorized and
undetected manner.
 Availability – Availability addresses ensuring timely and reliable access to and use of information.
 Safety – Safety addresses reducing risk associated with embedded technologies that could fail or be manipulated by
nefarious actors.

PURPOSE
The purpose of the Continuity of Operations Plan (COOP) is to prescribe a comprehensive framework for:
 Creating a Business Continuity Management System (BCMS);
 Protecting the Confidentiality, Integrity, Availability and Safety (CIAS) of [Company Name]’s systems, applications, services
and data;
 Recognizing the highly-networked nature of the current computing environment and provide effective company-wide
management and oversight of those related cybersecurity risks; and
 Providing for the development, review and maintenance of security controls required to ensure the continuity of business
processes.

Commensurate with assessed risk, security measures must be implemented to provide cost-effective and sustainable ways to
protect [Company Name] assets against reasonably-foreseeable natural and man-made disasters.

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 7 of 59
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
CONCEPT OF OPERATIONS (CONOPS)

The concept of the Continuity of Operations Plan (COOP) is to establish Business Continuity & Disaster Recovery (BC/DR) processes
that will enable [Company Name] to recover from adverse situations with a minimal negative impact on operations.

CONTINUITY OF OPERATIONS PLAN (COOP) FRAMEWORK


The COOP takes a holistic approach to BC/DR that utilizes a phased approach to preparing for and responding to incidents.

 Phase 1 – Prepare
 Phase 2 – React
 Phase 3 – Recover
 Phase 4 – Transition
 Phase 5 – Review & Improve

This phased approach incorporates several different incident response and BC/DR components to create a centralized and strategic
approach to emergency management that can scale to deal with the size and scope of disasters and recovery efforts.

These phases overlap from incident response at a tactical level (IRPs and DRPs) to intermediate and long-term recovery efforts at a
strategic level (BCPs):
 Incident Response Plans (IRPs)
 Disaster Recovery Plans (DRPs)
 Business Continuity Plans (BCPs)

It is important to keep in mind that most disasters start off with incident response that require IRPs. As events escalate, DRPs are
activated and then transition into BCPs. The COOP covers this spectrum of response, but there are important distinctions:
 Disaster Recovery (DR) is data-centric.
 Business Continuity (BC) is business-centric.

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 11 of 59
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
COOP STRATEGY
[Company Name]’s business continuity strategy is to cost-effectively manage BC/DR risks through the development, implementation
and governance of processes and documentation to facilitate the implementation of an enterprise-wide Continuity of Operations
Plan (COOP) that is supported through associated policies, standards, controls and procedures.

COOP MISSION
To ensure the appropriate People, Processes and Technology (PPT) exist, are properly prepared, and are able to execute BC/DR
operations in less-than-optimal conditions with little or no advanced notice.

OPERATIONAL LOCATIONS
The following physical locations are within scope for [Company Name]’s COOP:

WORLD HEADQUARTERS (WHQ)


[insert physical address here]
[insert COOP Point of Contact (POC) & contact information here]

PRIMARY PROCESSING SITE (PPS)


[insert physical address here]
[insert COOP Point of Contact (POC) & contact information here]

ALTERNATE PROCESSING SITE (APS)


[insert physical address here]
[insert COOP Point of Contact (POC) & contact information here]

PRIMARY STORAGE SITE (PSS)


[insert physical address here]
[insert COOP Point of Contact (POC) & contact information here]

ALTERNATE STORAGE SITE (ASS)


[insert physical address here]
[insert COOP Point of Contact (POC) & contact information here]

OTHER OPERATIONAL LOCATIONS


[insert physical address here]
[insert COOP Point of Contact (POC) & contact information here]

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 12 of 59
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
OPERATIONAL REQUIREMENTS
BC/DR professionals rely on well-known metrics that are used to drive planning of emergency operations procedures and continuity
of operations procedures. These metrics are:

CAPABILITY RESILIENCE LEVEL (CRL)


A CRL is the relative degree to which a capability can be impacted by a single disaster event. [Company Name]’s target CRL is [insert
# from the table below that reflects the appropriate CRL].

CRL Description
1 One (1) production site with onsite storage.
2 One (1) production site with offsite storage.
3 One (1) production site with cloud-based processing and storage.
4 Two (2) production sites in close proximity with localized processing and storage.
5 Two (2) production sites in close proximity with cloud-based processing and storage.
6 Three (3) or more geographically-dispersed production sites with localized processing and storage.
7 Three (3) or more geographically-dispersed production sites with cloud-based processing and storage.

MAXIMUM TOLERABLE DOWNTIME (MTD)


The MTD is a time value that represents the greatest period of time that [Company Name] is able to tolerate the outage of a critical
process or system without sustaining permanent damage to the organization’s ongoing viability. [Company Name]’s stated MTD for
key business functions are:

MTD Target
Function Description
(s/m/h/d/w/m)
[example] 3 days Email communications Corporate email
x
x
x
x
x

RECOVERY POINT OBJECTIVE (RPO)


The RPO is a time value that describes the interval of time that might pass during a disruption before the quantity of data lost during
that period exceeds [Company Name]’s maximum allowable threshold. RPO is largely dependent on backup processes to write data
locally or replicate data to another location. [Company Name]’s stated RPOs are:

RPO Target
Function Description
(s/m/h/d/w/m)
[example] 8 hours Database X Employee Resource Management (ERM) database
x
x
x
x
x

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 13 of 59
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
PHASE 1 – PREPARE

This phase addresses the preparation aspect of the COOP, since a failure to plan is tantamount to a plan to fail.

MISSION ESSENTIAL FUNCTIONS (MEF)


As part of [Company Name]’s annual risk management activities, it is important to identify Mission Essential Functions (MEFs)
through a Business Impact Analysis (BIA) to rank applications, services, systems, supporting infrastructure and third-party services
into an appropriate MEF categorization.

Safety & Criticality MEF Recovery Time


Recovery Function Priority Description
Classification Tier Objective (RTO)
MEF Tier 1 functions involve those with the direct and immediate
1 <10 seconds
SC-1 effect on the organization.
Mission Critical MEF Tier 2 functions can be delayed until Tier 1 functions are
2 <24 hours
restored but must be operational within twenty-four (24) hours.
SC-2 MEF Tier 3 functions can be delayed until Tier 1 and 2 functions are 24 hours to 1
3
Business Critical established but must be operational within one week. week
SC-3 MEF Tier 4 functions can be delayed until Tiers 1, 2 and 3 are
4 1 week to 30 days
Non-Critical operational.

Appendix A (Baseline Security Categorization Guidelines) provides guidance on categorizing systems for criticality.

BUSINESS IMPACT ANALYSIS (BIA)


Results of the latest BIA can be viewed at the following network share: [insert location of BIA].

Appendix B (MEF Recovery Prioritization) provides a tiered list of assets, based on recovery prioritization.

These three (3) typical steps are typically involved in accomplishing the BIA:
1) Determining mission/business processes and recovery criticality.
a. Mission/business processes supported by the system are identified and the impact of a system disruption to those
processes is determined along with outage impacts and estimated downtime.
b. The downtime should reflect the maximum time that [Company Name] can tolerate while still maintaining the
mission.
2) Identifying resource requirements.
a. Realistic recovery efforts require a thorough evaluation of the resources required to resume mission/business
processes and related interdependencies as quickly as possible.
b. Examples of resources that should be identified include facilities, personnel, equipment, software, data files,
system components, and vital records.
3) Identifying recovery priorities for system resources.
a. Based upon the results from the previous activities, system resources can be linked more clearly to critical
mission/business processes and functions.
b. Priority levels can be established for sequencing recovery activities and resources.

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 23 of 59
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
CAPABILITY DEVELOPMENT
Preparedness for BC/DR incidents requires a blend of People, Processes and Technology (PPT).

PEOPLE
Staff listed within the Key Staff Roles must have the appropriate Knowledge, Skills, and Abilities (KSAs) to perform their assigned
duties. To ensure KSA are current, these individuals requires annual capability development that at a minimum includes:
 Participating in at least one (1) simulated exercise (e.g., tabletop exercise, failover exercise, etc.); and
 Reading the COOP to maintain familiarity with the content and their expected roles.

EMERGENCY CONTACT LISTS


The BCT Leader is responsible for managing the process of maintaining the accuracy of emergency contact lists to support the COOP:
 At least on an annual basis, the BCT Leader is required to work with stakeholders to ensure the names and contact
information of key individuals are verified and updated, as necessary, to accommodate changes in People, Processes and
Technology (PPT); and
 The COOP will be updated to reflect the changes in contact information.

TRAINING
Members of the BCT are expected to take the Federal Emergency Management Agency (FEMA) Introduction to Incident Command
System (ICS-100) course.12

On an annual basis, [Company Name] will conduct at least one scenario-based exercise, which may be a tabletop discussion or a full
live exercise. It is imperative that members of the following teams perform an annual review of the COOP, prior to the exercise:
 Senior Management;
 Integrated Security Incident Response Team (ISIRT);
 Business Continuity Team (BCT);
 Damage Assessment Team (DAT);
 Infrastructure Team;
 End User Computing (EUC) Team; and
 Procurement Team.

PROCESSES
The BCT Leader is responsible for managing the process of maintaining the accuracy of systems, applications and processes that are
needed for the successful execution of the COOP.

INVENTORY OF CRITICAL PROCESSES


At least on an annual basis, the BCT Leader is required to work with stakeholders to ensure any new or modified processes that
impact the COOP are identified and documented. The COOP will be updated to reflect the changes in processes.

CRITICAL RECORDS & FILES


At least on an annual basis, the BCT Leader is required to work with stakeholders to ensure any new or modified critical records or
files that impact the COOP are identified and documented.

Appendix C (Critical Records & Files) a directory and location of critical records and files that are important for the COOP.

TECHNOLOGY
The BCT Leader is responsible for managing the process of maintaining the accuracy of systems, applications and services that are
needed for the successful execution of the COOP.

INVENTORY OF CRITICAL SYSTEMS & APPLICATIONS


At least on an annual basis, the BCT Leader is required to work with stakeholders to ensure any new or modified technologies that
impact the COOP are identified and documented.

Appendix B (MEF Recovery Prioritization) provides a tiered list of systems, applications and processes, based on recovery
prioritization.

12
FEMA Emergency Management Institute - https://training.fema.gov/nims/
IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES
Page 24 of 59
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

You might also like