Business Impact Analysis BIA Information Security - (13p)
Business Impact Analysis BIA Information Security - (13p)
Analysis (BIA) –
information
Security.
Apr.2023
Intro, Topics and Template.
Collected By:
1
1. Overview
1.1 Purpose
2
The BIA is composed of the following three steps:
3
2. Identify resource requirements. Realistic recovery efforts require
a thorough evaluation of the resources required to resume
mission/business processes and related interdependencies as
quickly as possible. Examples of resources that should be
identified include facilities, personnel, equipment, software, data
files, system components, and vital records.
2. System Description
4
processes should be ranked according to their importance, with the
most critical processes given the highest priority.
5
strategies may include backup and restore procedures, redundant
systems, and alternate processing sites.
8. Review and update the BIA: Regularly review and update the
BIA to ensure that it remains current and reflects changes in the
organization's operations, IT infrastructure, and threat landscape.
6
potential impact of a disruption, and develop recovery strategies to
minimize the impact of an incident.
Step one of the BIA process - Working with input from users,
managers, mission/business process owners, and other internal or
external points of contact (POC), identify the specific mission/business
processes that depend on or support the information system.
7
Mission/Business Process Description
Outage Impacts
8
performed. These impact categories and values are samples and
should be revised to reflect what is appropriate for the organization.
Impact Category
Mission/Business
{insert} {insert
Process {insert} {insert} Impact
}
Pay vendor invoice
9
Estimated Downtime
The table below identifies the MTD, RTO, and RPO (as applicable) for
the organizational mission/business processes that rely on {system
10
name}. Values for MTDs and RPOs are expected to be specific time
frames, identified in hourly increments (i.e., 8 hours, 36 hours, 97 hours,
etc.).
Mission/Business
MTD RTO RPO
Process
12 hours
Pay vendor invoice 72 hours 48 hours (last
backup)
Include a description of the drivers for the MTD, RTO, and RPOs listed
in the table above (e.g., mandate, workload, performance measure,
etc.).
11
System Platform/OS/Version Description
Resource/Component (as applicable)
Web Server 1 Optiplex GX280 Web Site Host
Note: Information for this section should be available from the system’s
System Security Plan (SSP) and can be copied from the SSP, or
reference the applicable section in the SSP and attach the latest version
of the SSP to this contingency plan.
The table below lists the order of recovery for {system name} resources.
The table also identifies the expected time for recovering the resource
following a “worst case” (complete rebuild/repair or replacement)
disruption.
12
resources, supported mission/business processes, and the MTD.
Determining the information system resource RTO is important
for selecting appropriate technologies that are best suited for
meeting the MTD.
System
Priority Resource/Compo Recovery Time Objective
nent
Web Server 1 Optiplex GX280 24 hours to rebuild or
replace
13