Business Continuity and Disaster Recovery Plan

For the below policy template anything in < Here > should be tailored to the organisation.

Purpose

This Business Continuity and Disaster Recovery Plan guides <Company> in the event of a significant business disaster or other disruption to normal service. <Company> responds to business disasters and disruptions by safeguarding employees’ lives and company assets, making a financial and operational assessment, securing data, and quickly recovering operations.

Scope

This policy applies to:

  • <Environment, servers, systems etc should be listed if in scope>

RACI matrix

<Include a RACI matrix table to cover roles and responsibilities for the processes set up by the policy>

Policy Statement

Alternate Physical Location(s) of Employees

<Here we should list out alternative locations for offices, this can be remote work, co-working locations, Hot or Warm office sites or similar, depending on your business – Below assuming remote>

<Company> employees and contractors are typically capable and available to work remotely, such as from home in a disaster. A decision on shutting a location should be made by the Business Continuity Committee.

Priorities

In the event of a disaster affecting our essential systems or team members, the Business Continuity Committee will meet and designated a Disaster Recovery Team for immediate action.

The priorities during a business disaster are to – in order:

  1. Secure the safety of team members and visitors;
  2. Mitigate threats or limit the damage that threats can cause to <Company>, and/or our stakeholders.
  3. Ensure that essential business functions can continue or determine what is required to
    restart essential business functions

Alternate Communication

<Here we include alternative communication plans for the Business Continuity Committee to use, it can be Telegram, WhatsApp, Signal or old fashioned phones. The goal is to have a way to get in touch that doesn’t rely on the standard communication tooling (emails, IM’s etc)>

Testing

Testing the plan is critical to ensuring the plan is effective and practical. Any gaps in the plan
that are discovered during the testing phase will be addressed by <> and any
designee. All tests must be thoroughly documented.
Testing of this plan may be performed using the following methods:

Walkthroughs

Team members walk through the steps documented in this plan to confirm effectiveness,
identify gaps, bottlenecks or other weaknesses. This walkthrough provides the opportunity to
review the plan with a larger subset of people, allowing <>to draw upon an increased
pool of knowledge and experiences. Team members should be familiar with
procedures, equipment, and offsite facilities.

Table Top Exercises

A disaster is simulated so normal operations will not be interrupted. Hardware, software,
personnel, communications, procedures, supplies and forms, documentation, transportation,
utilities, and alternate site processing should be thoroughly tested in a simulation test.
Validated checklists can provide a reasonable level of assurance for many of these scenarios.
Analyze the output of the previous tests carefully before the proposed simulation to ensure the
lessons learned during the previous phases of the cycle have been applied.

Exemption process

For environments that cannot meet the above requirements for any reason, the team responsible for managing the impacted systems must raise an exemption request. To raise a request please follow the below process:

  • <This process should be tailored to the organisation, it can tie into a formal risk management process or it can be an email request/approval depending on the organisations maturity.>

Enforcement

Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. A violation of this policy by a temporary worker, contractor or vendor may result in the termination of their contract or assignment with the company.

Vulnerability and Patch Management Policy

For the below policy template anything in < Here > should be tailored to the organisation. This policy will set up your patch cycle, and your vulnerability remediation timelines. The goal of this policy is to set up the goals for identifying and remediating vulnerabilities, external penetration testing and setting up standard patching cycles. It should be tailored to suit the organisation, this can mean agreeing not to patch some assets, environments or vulnerabilities, or having radically different SLA’s for each part of the organisation. Ultimately a good Vuln and Patch policy is one that your teams can follow and allows you to keep within your risk appetite.

Purpose

Vulnerability management is the process in which weaknesses are identified, evaluated, classified, and corrected. The purpose of this policy is to define the requirements for vulnerability management that will reduce the risk to The Company resulting from exploitation of vulnerabilities. It also sets out expected patching lifecycles.

Scope

This policy applies to:

  • <Environment, servers, systems etc should be listed if in scope>

RACI matrix

<Include a RACI matrix table to cover roles and responsibilities for the processes set up by the policy>

Policy Statement

Patching

Infrastructure

<This should match scope>

All systems assets should be patched every <SLA> days. Prior to deploying patches the patch should be tested in a non-production environment and any issues should be remediated prior to the patch being applied to production.

Endpoints

All endpoints should be patched every <SLA> days.

Penetration testing

<This should match scope>

The Company shall perform penetration testing on <Scope of pen tests> at least <Frequency>.

The penetration testing must be carried out by certified personnel using an industry-recognized penetration testing methodology.

The execution of penetration testing must be performed in a way that safeguards the continued operations of <scope> and The Company must ensure that business continuity is guaranteed according to the set Recovery Time Objective (RTO) and Recovery Point Objective (RPO) in the business continuity plan.

The execution of penetration testing must be performed with the formal approval of authorized personnel and the impacted business entities.

Infrastructure

<This section should be tailored to the organisations environment, SaaS vendors, products etc>

IaaS hosted infrastructure

Systems that are stored in The Companies managed IaaS accounts, and are managed by our <Responsible> Team must have vulnerabilities remediated within the below timelines. Where systems are not managed by <Responsible> Team and are managed at a “Team” level the Locally managed infrastructure SLAs should be followed.

SeverityScorePublic facing systemInternal systems (backend)
Critical9.0 – 10.0<SLA><SLA>
High7.0 – 8.9<SLA><SLA>
Medium4.0 – 6.9<SLA><SLA>
Low0.1 – 3.9<SLA><SLA>

Data-centre infrastructure

Where systems are located in on-premise offices, or in data centres, the <Responsible> Team must have vulnerabilities remediated within the below timelines. Where systems are not managed by <Responsible> Team and are managed at a “Team” level the Locally managed infrastructure SLAs should be followed. the below SLAs apply.

SeverityScorePublic facing systemInternal systems (backend)
Critical9.0 – 10.0<SLA><SLA>
High7.0 – 8.9<SLA><SLA>
Medium4.0 – 6.9<SLA><SLA>
Low0.1 – 3.9<SLA><SLA>

Locally managed infrastructure

Where systems are located in on-premise offices, or on an IaaS environment, or that are managed by the the team using the infrastructure, the below SLAs apply.

SeverityScorePublic facing systemInternal systems (backend)
Critical9.0 – 10.0<SLA><SLA>
High7.0 – 8.9<SLA><SLA>
Medium4.0 – 6.9<SLA><SLA>
Low0.1 – 3.9<SLA><SLA>

Software

<This will cover any inhouse products made or software installed/managed>

Product

For vulnerabilities identified in the product the <Responsible> Team will remediate within the below SLAs:

SeverityScoreProduction System
Critical9.0 – 10.0<SLA>
High7.0 – 8.9<SLA>
Medium4.0 – 6.9<SLA>
Low0.1 – 3.9<SLA>

Hosted Software

For vulnerabilities identified in the software that is hosted on The Companies infrastructure, the <Responsible> team will remediate within the below SLAs:

SeverityScorePublic facing systemInternal systems (backend)
Critical9.0 – 10.0<SLA><SLA>
High7.0 – 8.9<SLA><SLA>
Medium4.0 – 6.9<SLA><SLA>
Low0.1 – 3.9<SLA><SLA>

Desktop Software

For vulnerabilities identified in the software installed on The Company endpoints, the employee that uses that endpoint will remediate within the below SLAs:

SeverityScoreSoftware
Critical9.0 – 10.0<SLA>
High7.0 – 8.9<SLA>
Medium4.0 – 6.9<SLA>
Low0.1 – 3.9<SLA>

Endpoints

Globally managed Endpoints

For operating system vulnerabilities found on laptops, desktops and other endpoints that are managed by The Companies <Responsible / IT > team, the below SLAs should be applied.

SeverityScoreEndpoint
Critical9.0 – 10.0<SLA>
High7.0 – 8.9<SLA>
Medium4.0 – 6.9<SLA>
Low0.1 – 3.9<SLA

Locally managed Endpoints

Where Endpoints are not managed by our <corporate IT> teams or through our <device management tooling>, the technology owners using these machines must ensure they are patched and updated to address vulnerabilities within the timelines below.

SeverityScoreEndpoint
Critical9.0 – 10.0<SLA>
High7.0 – 8.9<SLA>
Medium4.0 – 6.9<SLA>
Low0.1 – 3.9<SLA>

Exemption process

For vulnerabilities or systems that cannot meet the above SLA’s for any reason the team responsible for managing the impacted systems must raise an exemption request. To raise a request please follow the below process:

  • <This process should be tailored to the organisation, it can tie into a formal risk management process or it can be an email request/approval depending on the organisations maturity.>

Enforcement

Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. A violation of this policy by a temporary worker, contractor or vendor may result in the termination of their contract or assignment with the company.