Business Impact Analysis (BIA) Policies

A business impact analysis (BIA) is the first step in building a security response and business continuity plan (BCP). Not all security events will require a recovery plan; however, if a security incident creates outages, you need to know which processes are most important to the business and provide for their recovery first. You can use the BIA to coordinate the security and business responses to minimize losses.

Many BIAs are based on building out multiple scenarios. Each scenario is a likely incident, and the impact of that incident is analyzed. This includes natural disasters such as a fire in the server room, as well as computer hardware failure or cyberattacks. The BIA will include the probability of each event as well as the damage from such an event.

The main intent of a BIA is to identify which assets are required for the business to recover and continue doing business. This identification of key assets and business priorities can then be used by the IRT manager to drive key decision making during an incident. These assets include critical resources, systems, facilities, personnel, and records. Additionally, the BIA identifies recovery times.

NOTE

The BIA is created by the line of business with the participation of the security team. The BIA is used for both information security and non–information security purposes. For example, it’s used to help identify market risks.

Once the data is collected, you need to perform an analysis. Compile all requirements and integrate the knowledge into the incident response processes.

TIP

Keep in mind that the BIA process is used to recover from a variety of incidents, not just security breaches. As a result, you need to pick and choose the information most relevant for the IRT’s needs.

Component Priority

Use the BIA to identify adverse effects on the organization. During this process you identify key components. A component can be a function/process or a system such as a database server. How detailed the component definition is depends on the organization. It must be of enough detail that the impact on the business is clear and a recovery strategy can be selected.

The source for this information is the business itself. A BIA cannot be conducted in isolation. It is the business that must establish the priority of components. This phase of the BIA has the following objectives:

  • Identify all business functions and processes within the business.
  • Define each BIA component.
  • Determine the financial and service impact if the component were not available.
  • Establish recovery time frames for each component.

There are specific metrics that are collected or computed for each component. One such metric is the maximum tolerable downtime (MTD). This is the amount of time that a component can be out of service without catastrophic damage to the organization. Related to that is the issue of mean time to recovery (MTTR), sometimes called mean time to repair. It is an arithmetic mean (average) of the time needed to get that component back online or replaced. These two metrics will feed into metrics like the recovery time objective, which will be discussed a bit later in this chapter.

Component Reliance

One of the most important parts of the BIA is the determination of dependencies—which components depend or rely on other components. This includes dependency on other BIA components. The BIA must also identify specific resources, such as technology and facilities. Other dependencies may include specific skills in short supply.

The key objectives of this phase of the BIA are to:

  • Identify dependencies, such as other BIA components
  • Identify resources required to recover each component
  • Identify human assets needed to recover these components

Impact Report

Once you complete the assessment, you compile the results, formulating recommendations and integration points into the IRT process.

With this in hand, the business can make decisions. The BIA impact report is not just issued unilaterally by one office or group. You should develop it as a collaborative effort among key stakeholders. These stakeholders include executive leadership, risk teams, IT, and the business. The process of producing the report creates the consensus. Most important, the collaboration process builds the political will to implement the BIA recommendations.

The key objectives of this phase of the BIA are to:

  • Validate findings of the BIA report
  • Create consensus for its findings and recommendations
  • Provide a foundation for other assessments
  • Start educating individuals who are key to recovery

The BIA final report is an essential component of an organization’s business continuity. It becomes the key document in planning the IRT process. It sets the organization’s priorities for IRT responses and for funding IT resiliency efforts. Resiliency is a term used in IT to indicate how quickly the IT infrastructure can recover from an outage.

Development and Need for Policies Based on the BIA

The BIA describes the mission-critical functions and processes. This report leads to further assessments that identify threats and vulnerabilities. You typically produce a BIA annually. Next, you compare the findings to existing security policies. This comparison identifies gaps that may be opportunities to improve policies.

As a business changes over time, the BIA is an excellent way to understand the business. This top-priority list of business processes helps focus security efforts to protect the most vital assets of the business. It also drives security decisions on how these assets are to be protected and recovered.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.137.184.75