Survival is Not Compulsory: An Introduction to Business Continuity

Transcription

Survival is Not Compulsory: An Introduction to Business Continuity
Computers
& Security,
18 (1999) 35-46
Survival is Not Compulsory:
An Introduction to Business
Continuity Planning
Mario Devargas
Mancos Computers Ltd., 1 Cvewe Road, Manchester, M23 9BE, UK.
introduction
How many times in your life have you bought something not because you needed it there and then but
‘just in case’? How often do you update your A-Z
road map - just in case? Do you not insure your
home, belongings,
etc against what could happen?
When going on holiday do you not safeguard yourself
against injury, loss of money, etc? Could you binge on
any amount of fatty food without bringing
on a heart
attack?
If the answers to all these questions are obvious then
why in business do we take so many risks? Why do we
not safeguard businesses from interruption
or failure
-just
in case? Simply waiting for something
to go
wrong is sheer negligence
and will probably prove
fatal. A well-known
statistics is that over 80% (ref.
National Audit Office) of all businesses that have a
major fire fail to recover.
Perhaps one of the reasons for this is due to the naive
faith in the power of insurance to resurrect your business from the ashes or simply the lack of understanding in how to formulate your own plan. Over 90% of
UK companies
do not have a Business Continuity
Plan and of those that do some prove ineffective when
tested by an actual incident. Many feel that the cost of
undergoing
such an activity would be too high and
they would rather trust to luck. However, as has been
proven by some companies, large savings can be made
on insurance premiums.
0167-4048/99$20.00
The other perception
many have is that their company is too small to handle such a philosophy.
Large
companies
with multi-million
pound turnover
and a
large managerial
base can afford a risk manager with
their salary being justified
as a premium
to an inhouse insurance scheme. However, smaller companies
have a much
smaller
management
team
with
Managing
Director,
Commercial
Director,
etc but
rarely a specific Risk Manager.There
are many reasons
for this but mainly because such an activity is not a
profit-making
activity by its very nature it is an
introverted
‘expensive’ exercise in anticipating
gloom
and doom.
Risk management
is an exercise in caution, directing
the company activities towards conservative
activities
and proposing procedures that can be viewed by some
employees as highly inconvenient
and unnecessary
they have done it in a particular
way for years why
change now? Not surprisingly, there is rarely any great
enthusiasm
to accept responsibility
by any existing
management
team-member.
Without
this the responsibility for developing
a Business
Continuity
Plan
tends to become
everyone’s and no-one’s, Everyone
agrees that it is a good idea but actually doing it is a
different matter - it is like getting a boy to tidy his
room - it isn’t fun and he will do it later.
But like boys, managers can be persuaded to do things
they do not want to do. Being able to reduce your
insurance premiums is a persuasive argument, especially if this can be coupled with reducing your risks and
0 1999 Elsevier Science Ltd. All rights reserved.
35
Survival is Not Compulsory/Mario Devargas
even if they occur, reducing their impact. This could
lead to more business, at a lower risk due to increased
confidence,
etc. which in the long run leads to
increased profits.
claims filed against the company,
tors, officers and other personnel.
2
Implement
the procedures
contained
in the BCP
according to the type and impact of the disaster.
When implementing
these procedures,
you need
to prioritise all recovery efforts as follows:
.
Employees: Normally,
these will be your most
important
resource and, in several respects, your
number one concern.You
can break this category
further into:
Key Managers
_
Key Specialists
Mainline Operating
Personnel
_
Support Staff
Not only must we help to ensure their survival as
a basic human concern, but for their performance
in helping
other persons on company
premises
when the disaster strikes.
What is Business Continuity?
Business Continuity
Planning (BCP) is not a black art,
nor dancing round a fire and sacrificing a calf to the
Gods to help you in your hour of need. Many would
have you believe that it requires powers of foresight
akin to Pharaohs counsellors,
advising when disaster
will strike.The
reality is very far from this perception
and can be simply defined as a logical / methodical
approach to remaining
in control of the environmental issues you can control.
Hence, in terms of business requirements
it relates to
establishing
the right
processes,
procedures
and
resources
necessary
to continue
in business
in an
acceptable
form when ‘something’
interrupts
that
business.The
emphasis is on uninterrupted
availability,
not just reacting to disasters - prevention
rather than
prescription.
Note that this implies that not every
business function
needs to be restored immediately,
and probably
will not be necessary to meet senior
management’s
requirements
for an acceptable level of
operation. Degraded levels of service by certain business functions
may also be acceptable, at least for an
agreed period.
Therefore,
the process in planning
for disasters is to
logically
define the steps to be taken to maintain
acceptable operations -- where what is ‘acceptable’ is
probably different for different companies. The aim of
BCP can be summarised
into three areas:
Eliminate
or reduce the potential
for injuries or
the loss of human life, damage to facilities, and loss
of assets and records. This requires the appropriate
steps to be taken to:
a) Minimize disruption
of services to the company
and its customers.
b) Minimize
financial loss.
c) Provide for a timely resumption
of operations in
the event of a disaster.
d) Reduce or limit exposure to potential
liability
36
and its direc-
l
l
.
Customers: As you do with employees, we must
help to ensure the survival or care of customers
affected by the disaster; physically, mentally, emotionally and financially.
Facilities: After ensuring the safety of employees
and customers, we then secure the facility as shelter for both people and assets.These include office,
production
and service work sites and other fixed
assets as well as those essential support services that
are not part of your own human or information
resources.
Assets: Although
for the most part recoverable,
assets will only be addressed after people and facilities are secure.These
can be categorised as:
- Materials, Products and Customer Service Functions.
This includes your raw material and component
resources, your work-in-process
and finished
goods.
- Intangibles. These
are the other
intangibles
besides information
that can easily impact the
health, growth and continuity
of your business.
Sudden and unrecoverable
loss of market share,
degraded
customer
or vendor relations, public
image or individual
reputation,
legal or regula-
Computers & Security, Vol. 18, No. I
l
tory prohibition,
massive unanticipated
lawsuits,
stockholder
or advocacy group actions all fit
into this category.
Records: As with assets, we will only address the
recovery and reconstruction
of important
records
when all people are cared for, facilities secured, and
all assets have been audited and stored. This class
includes not only the information
itself used by the
company but also the hardware, software, telecommunications
and support
structure
required
to
keep your information
processing operational.
Risk Management
Though perhaps not always aware of it, we all manage
risks every day. Actions as routine as putting on your
car seat-belt, carrying an umbrella when rain is forecast, or writing down a list of things to do rather than
trusting to memory fall into risk management.
People
recognise various threats to their best interests and take
precautions
to guard against them or to minimize
their effects.
If business
risks are also routinely
managed,
for
example, to maximize the return on their investments,
businesses must often decide between aggressive (but
high-risk)
and slow-growth
(but more
secure)
investment
plans. These decisions require analysis of
risk, relative to potential
benefits,
consideration
of
alternatives,
and, finally, implementation
of what
management
action.
the
best
course
of
In addition, a risk management
exercise can be used to
help identify critical resources needed to support the
organization
and the likely threat to those resources.
This examination
normally
includes
gathering
data
about the threatened
area and analysing the information to make it useful focusing on those areas that
result in the greatest consequence
to the organization
(i.e., can cause the most harm).This
can be done by
ranking threats and assets.
Risk has many different components:
assets, threats,
vulnerabilities,
safeguards, consequences,
and likelihood:
i
Asset Valuation. These include the information,
software, personnel,
hardware, and physical assets.
The value of an asset consists of its intrinsic value
and the near-term
impacts and long-term
consequences of its compromise.
ii
Threat Identification. A threat is an entity or
event with the potential to harm the asset.Typical
threats are errors, fraud, disgruntled
employees,
fires, water damage, hackers, and viruses. Threats
should be identified and analysed to determine
the
likelihood
of their occurrence
and their potential
to harm assets.
Risk Assessment
A Management Perspective
What is Risk Assessment?
Comprehensive study of
potential threats, probability
of occurrence and cost of
needed deterrents.
to be
By definition
risk is therefore defined as the possibility of something
adverse happening.
Risk management is the process of assessing risk, evaluating
the
cost, taking steps to reduce risk to an acceptable level
and maintaining
that level of risk.
-
n
determines
111
Vulnerability Analysis. A vulnerability
is a condition or weakness in (or absence oI) security procedures, technical
controls, physical controls,
or
other controls that could be exploited by a threat.
Vulnerabilities
are often analysed in terms of missing safeguards. Vulnerabilities
contribute
to risk
because they may ‘allow’ a threat to harm the
system. The interrelationship
of vulnerabilities,
threats, and assets is critical to the analysis of risk.
37
Survival is Not Compulsory/Mario Devargas
iv Safeguard Analysis. A safeguard is any action,
device, procedure,
technique,
or other measure
that reduces a system’s vulnerability
to a threat.
Safeguard analysis should include an examination
of the effectiveness of the existing measures. It can
also identify new safeguards that could be implemented; however, this is normally performed
later
in the risk management
process.
V
Consequence Assessment. The consequence
assessment estimates the degree of harm or loss
that could occur. Consequences
refer to the overall, aggregate harm that occurs, not just to the
short-term
or immediate
impacts. While
such
impacts often result in disclosure, modification,
destruction,
or denial of service, consequences
are
more
the
significant long-term
effects, such as lost business,
loss of reputation,
violation
of privacy, injury, or
loss of life.The more severe the consequences
of a
threat, the greater the risk to the system (and,
therefore, the organization).
drawbacks, risk management
provides a very powerful
tool for analysing the risk associated within a business.
What can go wrong?
Although
it is impossible to anticipate
all the things
that can go wrong, it is important
to identify a likely
range of issues. Creating hypothetical
scenarios will
help you and your company develop the right BCP
to address a wide range of possible threats. These scenarios should include small and large contingencies.
While some general classes of contingency
scenarios
are obvious, imagination
and creativity, as well as
research, can point to other possible, but less obvious,
contingencies.
Risk Assessment
A
-
Management Perspective
Where do Threats come from?
Phywal
Dishonest
Employees
vi Likelihood Assessment. Likelihood is an estimation of the frequency
or chance of a threat happening.A likelihood assessment considers the presence, tenacity, and strengths of threats as well as the
effectiveness of safeguards (or presence of vulnerabilities). In general, the greater the likelihood
of a
threat occurring,
the greater the risk.
In summary, Risk management
can help you select
the most appropriate
cost effective control, however,
it is not a magic wand that will cure all your difflculties. Like the old computing
terminology
GIG0
(Garbage In Garbage Out), it all depends on the quality of the input and the type of analytical method
used. In some cases, the amount
and cost of work
required to achieve high-quality
input would not be
justified. In other cases, achieving high-quality
input
may be impossible, for instance, in terms of evaluating
the advantages of particular safeguards against a particular threat - the level of uncertainty
may negate
any quantitative
result.
It must be noted that complete information
is never
available, uncertainty
is always present.
Despite these
38
The following are examples of some of the types of
possible threats and the types of questions required to
address each area:
Human factors:
Theft, sabotage, terrorism can all have dramatic effects
on your business viability; - do you have spare tools
to cover loss of equipment?
Can people get to work?
Are key personnel
willing to cross a picket line? Are
there critical skills and knowledge
possessed by one
person? Can people easily get to an alternative site?
Processing
capability:
Most businesses rely to some extent on technology,
especially computers
and communications.
Accounts,
Computers & Security, Vol. 18, No. 1
sales information,
databases, management
reports etc
are all vital to your business; - if your computer network crashed or you lost your data, could you recover the lost information?
How much time would be
lost? How much business could you lose? Are the
computers
harmed? What happens
if some of the
computers
are inoperable,
but not all? Can the computers communicate?
To where? Can people communicate? Are information
services down? For how long?
If your phones went dead how would you cope?
Would customers assume you had gone out of business? Would unanswered
incoming
sales enquiries end
up being business for your competitors?
Has data
integrity
been affected? Is an application
sabotaged?
Can an application
run on a different
processing
platform?
“Its all insured so I’m OK...” This is one of the
biggest issues when justifying
contingencies
is that
many companies
believe that like calling the emergency sergvices they will be covered by insurance
if
the worse occurs. But like calling an ambulance,
if it
arrives too late the inevitable
fatality will occur. In
business the reality of the situation is that most insurance policies do not cover for: loss of research and
intellectual
property;
reduced
share value; lawsuits
arising from the inability to meet contractual
arrangements; loss of market opportunities;
loss of suppliers;
loss of customer confidence;
reduction
in staff morale
and productivity.
In reality you are only likely to
recover 30%-50% of the total cost of an insured interruption. Furthermore,
how will you keep your business running while your losses are assessed?
Natural disasters:
“I’m sure we would cope...” It is mistakenly
assumed that if you can cope with the day-to-day
traumas of running
a business you can cope with any
eventuality
this is just putting
on another
hat!
However, the circumstances
surrounding
a disaster are
totally different to day-to-day
business and while you
are finding your feet in muddling
through, your customers will have gone elsewhere
for their business,
your suppliers will probably have downgraded
your
credit rating and your debt will escalate.
Fire & flood damage can be incredibly
expensive.Yes,
you may be well insured, but insurance does not fully
take into account the potential of lost business and lost
time. Do people have a place to sit? Do they have
equipment
to do their jobs? Can they occupy the
building?
The common
thread in all the above is that, although
you cannot prevent risks becoming
reality you can
have plans in place to ensure that your business will
continue
effectively and with minimum
loss should
any of these happen.
Myths
Myths are widely held on what effective Business
Continuity
Planning
is and why people should bother with it. The most common
ones are:
“It will never happen to me...” In March 1998,
the Computer
Security
Institute
reported
that over
60% of companies surveyed reported a breach in 1997.
These figures are repeated over and over and the likelihood of a business not being interrupted
once within a period of five years is minimal if not zero. How
can anyone predict with 100% certainty natural disasters like storms, floods, hurracanes, etc?
“If I don’t have a disaster I’ve wasted my
money.. .“You could say this about any type of insurance policy, however, the reasoning behind taking out
any type of policy is not based on ‘wasting money’. It
is also highly probable that an effective BCP will pay
for itself by reducing
your insurance
premiums
and
improving
your processes which in turn will reduce
the risk of interruption.
What are the Business Benefits?
Establishing
the benefits of business continuity
planning is very simple in terms of defining a company’s
overall mission
which
is: “To live long and
Prosper”.
It is similar to liability insurance
providing
a certain level of comfort in the fact that if a major disaster occurs, it will not result in financial
ruin.
However, as described above, insurance, by itself, does
not provide the means to ensure continuity
of the
39
Survival is Not Compulsory/Mario Devargas
organization’s
operations, and may not compensate
for
the incalculable
loss of business during the interruption or the business that never returns.
BCP therefore provides the guidance required during
a crisis and ensures that vital issues are not overlooked.
When properly formulated,
a comprehensive
plan will
effectively guide even inexperienced
staff in helping
the company to recover. The very existence of a plan
can be a defence that the company had not neglected
preparation
for disasters in management
responsibilities and insulate its ‘offricers’ from litigation for negligence.
exceed their expected
priate to the business
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
benefits associated
BCP include:
with developing
Evaluation
and Reporting
Exercise including
Policy development
process.
Purchase and support of hardware and applications
that provide the controls.
Implementation
of the policy and its impacts upon
the organization.
Training and awareness of staff.
Administration
of the policy, staff and controls.
Auditing.
a com-
Minimized
potential economic
loss.
Reduced
legal liability.
Reduced
disruption
to normal operations.
Ensured organizational
stability.
Ensured orderly recovery.
Minimized
insurance premiums.
Ensuring the safety of personnel
and customers.
Compliance
with legal and regulatory requirements.
Minimizing
decision-making
during a crisis.
Eliminating
confusion
and errors
Providing training materials for new employees
Reducing
reliance on certain key individuals
and
functions
Decreasing potential exposures
Reducing
the probability
of occurrence
Protecting
the assets of the organization.
Minimizing
disruption
to production.
Minimizing
the impact
on customer
loss of
confidence
probability
of
loss
of
the
Reducing
invoices/orders,
etc.
costs
The
costs associated
with
Business
Continuity
Planning should be carefully examined in both monetary and non-monetary
terms to ensure that the cost
of implementing
controls
and procedures
do not
40
and are appro-
In order to evaluate the cost of BCP you will need to
do a Cost Benefit Analysis exercise that examines
assets, threats, and vulnerabilities
of the environment
in order to determine
the most appropriate cost-effective mechanisms
(note, you may not do anything and
take the risk). Once this is done you will have a set of
direct and indirect costs associated with implementing
the right Business Continuity
Plan for your organization. Included in the direct costs are:
Benefits
Additional
prehensive
business benefits
environment.
Included
-
in the indirect
costs are:
Affect on user productivity.
Additional
time taken by staff to access information necessary to accomplish
their jobs.
Employee morale.
Legal Issues
It is important
to review your Business Continuity
Plans in terms of its legal perspective
before actually
progressing
with it. There are two areas when your
BCP need to be ‘legally’ sound:
Statutory
Requirements:
- There are many laws
and regulations
that all businesses need to be aware of
and adhere to, e.g., “UK Fire Precautions
(Workplace)
Regulations
- 1997” which implement
the fire safety
requirements
of the EC Framework
and Workplace
Directives. These Directives deal with the minimum
health and safety requirements
in the workplace; UK
Computer
Misuse Act 1990 which defines criminal
offences in relation
to unauthorized
access to IT
hardware.
Computers & Security, Vol. 18, No. 1
Contractual
Requirements:
- All businesses have
contracts,
and some contracts
require suppliers
to
deliver no matter what. This means that if your BCP
does not measure up you could be left with a large
law-suit for not supplying
your products or services
on time.The
issue within the law is whether you have
woefully
been negligent
in the pursuit
of your
business.
For example, ABC Ltd loses their computer
centre,
losing its records of receivables and delaying thousands
of orders. ABC Ltd does not have adequate contingency plans and hence is unable to recover quickly
and as a consequence
ABC Ltd further looses a substantial number of contracts. The shareholders, feeling
the business has been mismanaged,
want to get their
money back. So they file a ‘suit’ against the directors of
the business, alleging that they failed to exercise good
business judgement
in failing
to have a current
in huge financial
disaster recovery
plan, resulting
losses. Depending
of the other facts of the case, the
shareholders could win such a suit.
The tendency
is now for major organizations
to
include
within
their contracts
the requirement
for
their suppliers to have business resumption
capabilities. Furthermore,
some major insurance
companies
have also insisted on this within
insurance
policies
with the inclusion
of discounts
for companies
that
maintain
effective
Business
Continuity
Planning
programmes.
What is a sound Business
Continuity Planning Approach?
Business Impact Analysis
A business impact analysis involves identifying
the
critical business functions
within
the organization,
determining
the impact of not performing
the business function and ascertaining
the cost implications.
It
could be a very simple statement
of the number
of
items not sold in a specific time-period
or an estimate
of the potential loss.The purposes of a business impact
analysis are:
To identify the potential risks.
Estimate the effects of a disaster on the organization as a whole.
Determine
the requirements
for a recovery strategy, including
the resources necessary for a successful recovery.
Provide
the financial
justification
for disaster
preparation
and recovery.
Determine
the criticality of each business function
based upon the overall impact to the organization
and prioritize
their recovery.
Assess the financial
exposures
and operational
impacts, quantifying
the effects as much as possible.
& signs on estimates of lost revenues and productivity have a higher credibility than subjective hazy
estimates.
Determine
the timeframes in which essential functions and operations must recover.
This will identify what is critical to keeping the company in operation and hence determining
the breadth
of the proposed
continuity
plan. Overprotecting
is
costly while under protecting
will give you a false
sense of security. The investigative
approach
of this
Business Impact Analysis is normally based upon getting answers to a set of basic business questions, for
instance:
If a disaster occurred,
how long could a specific
department
function
without
the existing equipment and departmental
organization?
What are the high priority tasks including
critical
manual functions
and processes in a department?
How often are these tasks performed,
e.g., daily,
weekly, monthly, etc?
What staffing, equipment,
forms and supplies would
be necessary to perform the high priority tasks?
How would the critical equipment,
forms and
supplies be replaced in a disaster situation?
What reference manuals and operating
procedure
manuals are used in the department?
How would these be replaced in the event of a
disaster?
Identify the storage and security of original documents. How would this information
be replaced in
the event of a disaster? Should any of this information be in a more protected location?
41
Survival is Not Compulsory/Mario Devargas
10
11
12
13
What are the current backup procedures? Have the
backups ever been restored? Are any critical backup copies being stored off-site?
What would the temporary
operating
procedures
be in the event of a disaster?
How would other departments
be affected by an
interruption
in a specific department?
What effect would a disaster at the main computers have on a specific department?
What outside services/vendors
are relied on for
normal operation?
Who
would
be responsible
for maintaining
a
department’s
contingency
plan?
Answering
these types of questions will identify the
potential
areas of impact within
the business as a
whole, defining
the level of Business Interruption,
Revenue
Loss and Business Embarrassment,
ie.:
of production,
Business interruption: Disruption
business, or computer
processes can be felt almost
immediately,
eg., loss of computerized
support can
slow production
processes within
an unacceptable
timeframe,
thereby
disrupting
all production
and
delivery
commitments.
However,
administrative
systems may have greater tolerance.
Revenue loss: Loss of orders can occur within minutes if customers sense an inability to quickly resume
normal production;
more quickly upon indication
of
an inability to meet commitments.
After the first 24
hours it is likely that raw material, finished goods, and
distribution
channel
slack will no longer suffice to
respond to customer order needs. It is foreseeable that
other vendors would be more than willing to step up
to these orders.
Embarrassment:
Every
company
has a certain
degree of visibility within its market sector which it
needs to safeguard. Consequently
its credibility would
almost certainly be taken to task should it fail to meet
its commitments.
The competitive
environment
has
customers very unsympathetic
to problems and very
quick to shift dependence
quickly at signs of weakness
in ability to fulfil orders.
42
Producing a Phased Plan -The
Methodology
MD
Business Continuity
Planning
can be a very complex
and labour intensive process, it therefore requires redirection
of valuable technical
staff and information
processing resources as well as appropriate
funding. It
is therefore important
that a strategic project plan be
developed to manage the Business Continuity
Process
and minimize
the impact on scarce resources.
+
The MANCOS Approach!
Typically
3 months
Stage 1 Planning for Survival
Stage 2. Identify ‘Vulnerabilities
m
1
Stage 3. Business Impact Analysis
Stage 4. Creating a Plan for Recovery
Staae 5. Implementation of the
Bus/ness Continuity Plan
Stage 6. BCP Awareness Campaign
..:
.i..i
~_ ._...
A
I
In order to achieve this undertaking
it is beneficial to
use a structured methodology
as defined by MD. MD
defines a BCP project methodology
into six separate
phases, as described below.
The last column
describes
expected from each phase.
the types
of deliverables
Computers & Security, Vol. 18, No. I
Phase
1. Project
Planning
Objectives
11
Deliverable(s)
This phase determines the scope of the Business
Continuity Assessment Programme, defining project
schedules, work programs and identifying any issues
that could have an impact on the delivery and the
success of the project. During this phase a ‘Decision’
Board should be established to take overall responsibility for providing direction and guidance to the
Project. Interview schedules for conducting the
Security Assessment and the Business Impact
Analysis should be defined at this stage.
a) Top Management
Commitment
b) Project Infrastructure
c) Project Plans
d) Awareness Campaign
Plans
Identify factors which could adversely impact on the
normal business processes and initiate a risk reduction programme. This phase should assess areas
such as physical; personnel; communications; operating procedures; backup and contingency planning;
data; systems; access control; insurance.
a) Assessment Reports
i. Worst Case Scenario
ii. Recommended
Scenario
b) Business Health Check
Report
3. Business
Impact
Analysis
Establish the critical business processes, determine
their recovery time-scale requirements and quantify
the financial consequences of all business functions,
The aim is to : identify critical systems, processes
and functions; assess the economic impact of incidents and disasters that could result; assess the ‘pain
threshold’, that is, the length of time business functions can survive without access to systems, services
and facilities; identify the timeframes in which critical
systems must be recovered after an interruption.
a) BIA Report
i. Critical Areas
ii. Important Areas
iii. Non-Essential Areas
b) Risk Assessment
Review
c) Business Continuity
Plans
4. Strategy
Development
Determine the options for recovering the critical business processes and make recommendations. The
aim of this phase is to define a profile of alternative
recovery strategies and how subsequent operational
plans can be defined. Recovery Strategies will be
based on short term, intermediate term and long
term outages.
Recovery plan components can include the implementation of changes to all procedures, vendor contract negotiations (with suppliers of recovery services) and the definition of Recovery Teams, their
roles and responsibilities. Recovery standards can
also be developed during this phase.
a) Disaster Recovery
Procedures
b) Training Plans
43
Survival is Not Compulsory/Mario Devargas
Test Results from:
Checklist tests
l Simulation tests
l Parallel tests
l Full interruption tests
Business Continuity
Test Plans
Risk Assessment
Review - Addendum
Contingency Options
Report - Addendum
The goals and strategies for tests are defined here.
These should be tailored to the business needs and
culture. Once these goals are agreed you then develop, execute and evaluate the test results.
6. Maintenance
Program
The plan needs to be kept updated or it will not reflect
the changing business needs. It is critical that any
change management processes are reviewed against
the established recovery plans.
Assist in defining change management processes.
Next Step
Awareness Campaign
Although
often many of the disasters associated with
Business Continuity
Planning are an ‘act of God’, it is
important
that your staff are informed of their responsibility to maintaining
a safe and secure environment
and how to react in the event of a disaster. It is well
known that people are one of the weakest links in
securing any environment.
The purpose of a security/safety
awareness programme,
training
and education is to enhance the processes by:
Improving
awareness of the need to protect system
resources.
Developing
skills and knowledge
so staff can
perform their jobs more securely.
Building in-depth knowledge, as needed, to design,
implement,
or operate security/safety
programmes.
A sound awareness and training programme
can help
an organization
reduce the number
and severity of
errors, omissions
and negligence
issues. Awareness
must be used to reinforce the fact that a secure environment
supports the mission of the organization
by
protecting valuable resources. However, in general staff
44
l
I
r
a) Business Continuity
Plan
often regard security and health/safety
procedures
as
an obstacle to their productivity.To
help motivate staff,
awareness should emphasise how being secure, from a
broader perspective,
contributes
to productivity.
The
consequences
of poor security should be explained,
while avoiding the fear and intimidation
that employees often associate with security.
If employees view security/health
& safety procedures
as a whole as just bothersome
rules and procedures,
they are more likely to ignore them. In addition, they
may not make any suggestions
about improving
security nor recognise and report security threats and
vulnerabilities.
Making users aware of their responsibilities
and teaching them correct practices helps them change their
behaviour.
It also supports individual
accountability,
which is one of the most important
ways to improve
security/safety.
Without
knowing
the necessary
measures (and how to use them), users cannot be truly
accountable
for their actions.
Awareness
stimulates
and motivates
those being
trained to care about security/safety
and to remind
them of important
security/safety
practices. A typical
implementation
schedule for this could be:
Computers & Security, Vol. 18, No.
Step 1: Identify Programme Scope, Goals, and
Objectives
The scope of the programme
should provide training
to all types ofpeople.The
scope of the programme
can
be an entire organization
or a department.
Since staff
need training which relates directly to their use of particular systems, a large organization-wide
programme
may need to be supplemented
by more specific
programmes.
In addition,
the organization
should
specifically
address whether
the programme
applies to employees only or also to other users of organizational
systems. The overall goal of a programme
is to sustain
an appropriate
level of protection
for resources
by increasing
employee
awareness
of their security/safety
responsibilities
and the ways to fulfil
them.
Step 2: Identify Training Staff
There are many possible candidates for conducting
the
training including internal training departments,
computer security staff, human resource staff, or contract
services. Regardless of who is chosen, it is important
knowledge
of
sufficient
trainers
have
that
security/safety
issues, principles,
and techniques.
It is
also vital that they know how to communicate
information and ideas effectively.
Step 3: Identify Target Audiences
Not everyone needs the same degree or type of security/safety information
to do their jobs. A programme
that distinguishes
between groups of people, presents
only the information
needed by the particular audience, and omits irrelevant
information
will have the
best results. Segmenting
audiences
(e.g., by their
function
or according
to existing level of awareness)
can also improve the effectiveness of a programme. For
larger organizations,
some individuals
will fit into
more than one group. For smaller organizations,
segmenting
may not be needed.
I
Step 4: Motivate Management and Employees
To successfully implement
an awareness and training
programme,
it is important
to gain the support of all
levels of management
and staff.
Motivating
management
normally relies upon increasing awareness. Management
commitment
is necessary
because
of the resources
used in developing
and
implementing
the programme
and also because the
programme
affects their staff. Motivation
of managers
alone is not enough. Employees often need to be convinced of the merits of security/safety
and how it
relates to their jobs. Without
appropriate
training,
many employees will not fully comprehend
the value
of the systems with which they work.
Step 5: Administer the Programme
There are several important
istering the programme.
considerations
for admin-
-Visibility. The visibility of a programme
plays a key
role in its success. Efforts to achieve high visibility
should begin during the early stages of program development.
However,
care should
be given
not to
promise what cannot be delivered.
- Training Methods. The methods
used in the
programme
should be consistent
with the material
presented and tailored to the audience’s needs.
are more
topics
in
- Training Topics. There
security/safety
than can be taught in any one course.
Topics should be selected based on the audience’s
requirements.
- Training Materials. In general,
higher-quality
training materials are more favourably received and are
more expensive.
- Training Presentation. Consideration
should be
given to the frequency of training (e.g., annually or as
needed), the length of training presentations
(e.g., twenty minutes
for general presentations,
one hour for
updates or one week for an off-site class), and the style
of training presentation
(e.g., formal presentation, informal discussion, computer-based
training, humorous).
45
Survival is Not Compulsory/Mario Devargas
Step 6: Maintain the Programme
Efforts should be made to keep abreast of changes in
technology
and security/safety
legislation and requirements. A training programme
that meets an organization’s needs today may become ineffective when the
organization
starts to use a new application
or changes
its environment,
such as by connecting
to the Internet.
Step 7: Evaluate the Programme
It is often
awareness
46
difficult to measure the effectiveness of an
or training
programme.
Nevertheless,
an
evaluation
should attempt
to ascertain
how much
information
is retained,
to what extent
security/
safety procedures are being followed, and general attitudes toward security/safety.
The results of such an
evaluation should help identify and correct problems.
Mario Devargas,
is MD Project Manager
Based
in
Manchester,
UK.
He
[email protected].
with Mancos
can
be
Computers
contacted
Ltd.
at: