In previous posts, we stepped through the process of understanding the business, the threats it faces related to business continuity, and how prepared it is to prevent, detect, or respond to events. We continue with our look at Business Continuity Event Management (BCEM) planning by looking at developing and managing the two key BCEM documents: the incident response plan (IRP) and the business continuity plan (BCP).In this article, I provide an overview of these plans and their relationship to each other. In the subsequent two articles, we examine in detail the content of each document. We’ll also discuss implementation and management of the processes the documents describe.Documenting the BCEM PlanHandling business continuity events (BCE) requires two perspectives. First, recovery teams must understand the framework used to detect, contain, recover, and manage events. Second, recovery teams and business users must have solid, tested processes for mitigating BCE impact and restoring services to levels existing before the event. The BCEM planning team should document these processes, tools, and techniques in an IRP and a BCP. The combined goals of the IRP and the BCP are depicted in Figure 1. IRP activities begin immediately upon detection of an event. Impact mitigation is implementation of BCP processes intended to provide workarounds for failed processes. Recovery and management tasks, also initiated by the BCP, return the company to normalcy. Note that the Recovery & Management arrow extends beyond the event timeline. This represents the long term impact of management efforts to improve prevention, response, mitigation, and recovery outcomes via an event after action review. Figure 1Incident Response PlanProcesses defined in the IRP initiate when an event is identified. According to BS 25999-1:2006, the IRP is “concerned with the development and implementation of appropriate plans and arrangements to ensure continuity of critical activities and the management of an incident.” It is the incident response team which assesses the type and scope of the incident, who to notify, and to what extent the BCP is to be implemented. I also works with recovery teams to complete the after action review. At a high level, the IRP includes containment, mitigation, communication, eradication (malware events), and after action improvement activities. Business Continuity PlanA BCP includes all documentation necessary to mitigate business impact and to recover broken processes: Manual processes to continue product or service delivery, even if at a lower level of output, until full recovery is possible Individual device or system recovery instructions Disaster recovery processes for catastrophic events Contracts/agreements for alternate data center or business office sites as well as alternate staffing The final wordThe combination of the IRP—the overall plan for handling an incident—and the BCP should result in minimal business impact, process recovery within MTDs, and a final review of root causes as well as how the teams might do better next time… and there will be a next time. In the next article, I step through building an IRP, assembling a response team, team training, and plan testing and improvement. Related content opinion MQTT is not evil, just not always secure The MQTT messaging protocol standard used by IoT vendors is not inherenly secure enough. Solutions exist to secure it, but organizations and vendors must assess risk and properly configure IoT and network security. By Tom Olzak Jul 17, 2017 3 mins Internet of Things opinion IoT messaging protocol is big security risk Popular IoT messaging protocol lacks encryption and sufficient device authentication security. By Tom Olzak Jul 14, 2017 3 mins Cloud Security Data and Information Security Internet of Things opinion Anatomy of an insider attack Manage insider attack risks with scenarios and application of common sense. By Tom Olzak Sep 30, 2016 4 mins Business Continuity Security opinion Identity governance and admin: beyond basic access management User behavior analytics give additional power to identity management and compliance. By Tom Olzak Aug 30, 2016 5 mins Investigation and Forensics Compliance Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe