Business Continuity For Dummies
Business Continuity For Dummies
Business Continuity For Dummies
Agenda
Welcome! Introduction Protecting Your Employees Emergency Response How to Build a Robust Business Continuity Program Execution Quick Start
Re co ve ry
People
se on sp Re cy en erg Em
Dis as ter
Strategy
Execution
Business Resumption
NEDRIX Conference June 2004
Business Impact
AAA,AA,A,B,C,D?????
Risks
Recovery Plans
Alternate Sites
Business Functions
Testing
Feeling Overwhelmed?
(contd)
(contd)
Location set up for Management and BCP to operate from during emergency situation. Maintain Contingency Plan Document and other needed resources at Command Center.
Command Center
10
(contd)
A location where critical business functions can resume processing in the event of a business interruption.
Relocation
(Primary Location)
NEDRIX Conference June 2004
(Alternate Site)
11
12
13
Life/Safety is #1
Access control Alarm monitoring Floor Warden program Evacuation drills conducted annually Shelter-in-Place drills conducted annually Background checks Procedures for emergency response in place Workplace Violence Programs
14
FIRE
xx and you find it: 1) Call Corporate Security. 2) Activate the nearest building fire alarm. 3) Follow the evacuation instructions given by the Floor Wardens, who will be wearing orange arm bands and carrying flags.
and you hear the public address system or fire alarm: 1) Follow the instructions given over the public address system. 2) Follow the evacuation instructions given by the Floor Wardens, (wearing orange arm bands and carrying flags).
EMERGENCY Numbers:
BOMB THREAT
1) TAKE NOTES -- location and type of device, time of detonation, sex and age of caller, quality of voice, accent, background noise(s), etc. -- this is VERY IMPORTANT! 2) Immediately call Corporate Security. 3) Notify your supervisor/manager. 4) Wait for instructions from your manager or the Floor Warden, or to be broadcast over the public address system. EMERGENCY Numbers:
What to do if...
1) Prepare to evacuate, but wait for specific instructions via the public address system, telephone, a Floor Warden or a Security Officer. Some routes may not be safe. 2) Follow the Floor Warden out of the building. 3) DO NOT use elevators for emergency evacuation. 4) Walk quickly when directed to do so, but do not run. 5) DO NOT go back for any reason. 6) Proceed to the Evacuation Site for your building. 7) Wait for further instructions from Corporate Security or your company's Contingency Planner. EMERGENCY Numbers:
SEVERE WEATHER
while you are at home: 1) Call the Contingency Information Line, 1-xxx-xxx-xxxx, for up-to-date information. 2) Check your local radio and TV stations for announcements.
NOTE: Remember, property damage may require that you report to work at a different location. Contact your manager or call the Contingency Information Line.
while you are at work: 1) Follow the instructions given over the public address system, SYMON*, by your manager or the Contingency Information Line.
*SYMON is a customized electronic message board displaying system status and market and critical business information. SYMON boards are located in key business areas throughout Fidelity.
EMERGENCY Numbers
MEDICAL ASSISTANCE
4) 5)
Don't try to apply first aid if you are not qualified. It could cause further injury.
If you need medical assistance, call Corporate Security and stay at your original location until help arrives .
NOTE: (The injured employee or his or her manager must complete an occupational injury/illness report form within 24 hours of the incident and submit it to HR.)
EMERGENCY
EMERGENCY RESPONSE
20
Where do I go?
what to do in an emergency?
The Press keeps asking me all of these questions. What do I tell them?
21
22
24
25
WHAT NEXT?
When disaster strikes, the most important thing --- after assuring the safety and welfare of employees--is to get vital support services functioning to the best of our ability.
26
27
28
Business Unit
Business Unit
Business Unit
Business Unit
Human Resources
Systems
Marketing
Finance
29
30
(contd)
31
Emergency Notification
Identify the different types of recovery you will plan for Identify who would have the authority to declare a disaster depending upon the scenario Identify who would be part of the recovery effort Build your notification lists based on this information
32
Sample ERT
33
Potential Scenarios
Identify potential scenarios
Geo-Centric Scenarios An event impacting both buildings and people in one location, ie. WTC Events impacting building and people in multiple locations, i.e. WTC & Pentagon People Scenarios Inability for employees to access facilities Associates unable to work due to emotional trauma Loss of workforce Loss of key members of management team
34
Potential Scenarios
(contd)
35
Risk Analysis/Mitigation
36
37
Protecting Information
Information Security policy and procedures Privacy Policy Firewalls Intrusion Detection Strong Passwords Controlling access to information Vendor Management Secure offsite storage Proprietary Waste Disposal Virus Protection and Response
38
Protecting Reputation
Strong Governance Media trained Communication Plans Internal and external audits Operational Management Recoverability Code of Ethics
39
Assets
Assets are composed of many elements Physical assets that are owned by the organization Information assets Financial assets
Revenues lost for the duration of the incident Additional costs to recover Fines and penalties incurred Lost good will or competitive advantages
NEDRIX Conference June 2004
40
Examples of mitigating factors in use: UPS (Uninterruptable Power Supply) and Generator backups for replacement power, sprinkler systems to control the spread of fire, Assess Card Readers to control physical access to Fidelity space, etc....
41
Threat/Effect Matrix
Threat/Effect Matrix R e g io n ( Y , N ) ) Site (Y,N)
Threat Earthquake Hurricane Tornado V o lc a n i c E r u p t i o n F lo o d Power Outage Falling Aircraft Transportation M ishaps Rail Road Boat F ire Smoke Denial Of access from Contamination C ivil Disorder W a ter Damage Bomb Threats Sabotage/Vandalism Mechanical Breakdown Other (specify)
Probability/Effect (H,M,L)
42
Protecting Information
Information Security policy and procedures Privacy Policy Firewalls Intrusion Detection Strong Passwords Controlling access to information Vendor Management Secure offsite storage Proprietary Waste Disposal Virus Protection and Response
43
Protecting Reputation
Strong Governance Media trained Communication Plans Internal and external audits Operational Management Recoverability Code of Ethics
44
Assets
Assets are composed of many elements Physical assets that are owned by the organization Information assets Financial assets
Revenues lost for the duration of the incident Additional costs to recover Fines and penalties incurred Lost good will or competitive advantages
NEDRIX Conference June 2004
45
Examples of mitigating factors in use: UPS (Uninterruptable Power Supply) and Generator backups for replacement power, sprinkler systems to control the spread of fire, Assess Card Readers to control physical access to Fidelity space, etc....
46
Threat/Effect Matrix
Threat/Effect Matrix R e g io n ( Y , N ) ) Site (Y,N)
Threat Earthquake Hurricane Tornado V o lc a n i c E r u p t i o n F lo o d Power Outage Falling Aircraft Transportation M ishaps Rail Road Boat F ire Smoke Denial Of access from Contamination C ivil Disorder W a ter Damage Bomb Threats Sabotage/Vandalism Mechanical Breakdown Other (specify)
Probability/Effect (H,M,L)
47
48
Components - BIA
Business Impact Analysis
Resource requirements Technology review Interdependencies defined By business function Business function description Primary Location Business function criticality Primary alternate site Cost center Function level BIA
49
Your Paycheck
A disaster may impact...........
Company Reputation
Customers
NEDRIX Conference June 2004
51
52
BIA: Interdependencies
It is critical that the internal and external dependencies for the business function be understood and documented
Inputs to the function and where they come from Outputs of the function and where they go to System Application dependencies
53
54
Customer-Critical:
Defined by the business units as those functions that are required to complete processes that are critical to the customers perception of the business
55
LDRPS Function ID
Function Name
Mailzone
Risk Code
F = Financial C = Customer R = Regulatory
Financial Impact
0 = none 1= 0 to 10K 2 = >10K but < 100K 3 = >100K but <500K 4 = > 500K but < 1 Mil 5 = > 1 Mil
Rating Total
Sum of 1 thru 4
56
Up to 4 Hours to Recover
Up to 24 hrs downtime
Vital Records
Do You Know: Where they are? What is included in them? How to get them? Who is authorized to retrieve them? How long it will take to retrieve them? Where to have them delivered? How long it will take to restore them? Who will restore them?
58
59
(contd)
60
Recovery Strategies
61
62
Alternate Sites
Mission/Scope:
Provide viable alternate site for critical business functions
Assumptions:
Must provide for on-going testing and maintenance Assume a single building and campus outage
Requirements:
Functional at impact Flexible for any business Expandable per situation Recovery of business technology Ability to test
Capabilities:
Internal owned alternate sites External Vendor-contracted alternate sites
NEDRIX Conference June 2004
63
MRO
Intra-Day Up to 24 Hours
Long Term
SLC
64
65
66
#5: Developing the Plan Master Recovery Plan: Sample Table of Contents
Planning Team Information Plan Maintenance History Executive Overview Executive Sign-Off Section 1: Emergency Response Section 2: Emergency Response Organization Section 3: Plan Overview Section 4: Recovery Strategies Section 5: Recovery Communications Section 6: Plan Activation Section 7: Alternate Sites Section 8: Business Unit Recovery Plans Appendices Business Partner Procedures
NEDRIX Conference June 2004
67
Event Management
Built by Building/Business
Teams Assessment Team Crisis Management Team Emergency Response Teams
Permanent standing conference bridge Event owners defined Escalation process defined
68
Event Management
(contd)
Contingency Plans are what we exercise when all other mitigating factors fail Contingencies start with Event Management If you do not properly manage Events, all the other Risks may occur Event Management is about Communication and Response Event Management needs to be practiced Requirements:
Strategy must be consistent regardless of event Need to establish an assessment process Event Ownership needs to be defined Management teams identified Response teams identified Process for gathering of key decision-makers Methods of communication to be defined
NEDRIX Conference June 2004
69
Event Management
Assumptions:
(contd)
Strategy will deal with non-data center events since those events should be handled by Systems Communications on all events will begin with Corporate Security Strategy will be used in every region Strategy will be consistent regardless of even Assessment group will always include Facilities, Security and Corporate If the event causes any Life Safety issues for employees, Security owns the response to the event until all life safety issues have been resolved. If the event has no life safety issues, or once the life safety issues have been addressed, Facilities owns the response to the event.
70
Event Management
Procedures:
(contd)
Security identifies or is notified of an event which requires a response escalation and notifies Assessment Team Brief assessment is conducted and if event is deemed significant, first escalation process activated. Individuals identified for that site for First Escalation are notified through an alpha numeric page. Communications should be limited to location of event, type, who generated the page, and conference bridge number. Individuals identified for that site for First Escalation are notified through an alpha-numeric page. Communications should be limited to location of event, type, who generated the page, and conference bridge number. All First Escalation responders notified must attend the conference call, even if no impact. If any group does not respond, back-ups will be contacted until response is received.
71
Event Management
Procedures:
(contd)
Assessment of impact provided to First Escalation group. If event is resolved, page sent to all interested parties to notify of event, impact and resolution. If event is not resolved, the following steps will be taken: Conference bridge will remain open for technical response and recovery management. A second conference bridge will be established if needed for management of event communications. Response Team Leader will be identified. Crisis Manager will be identified (Site GM will act as crisis manager for the site). For those sites which do not have a GM, and for escalations outside of the site, Corporate Contingency Planning will manage event. Status meeting schedule will be established. Escalations will be agreed upon (who else needs to know). All communications regarding the event and its impact will be approved by the Crisis Manager. Additional support requirements will be defined (who else needs help).
72
73
74
Administrative Support
Travel, Food and Accommodations Copying Answering Phones Arranging Courier Services Meeting Scheduling/Minutes
75
Finance Issues
Provide Channel of Authorization for Expenditures Record Emergency Costs Provide Cash Advances Order Replacement Supplies and Equipment Provide Immediate Payment of Expenditures Required to Support Recovery Effort Expense Report Processing
76
Recovery Communications
Recovery Status Updates to Contingency Information Line Communication to Employees External Communications Client Communications Problem Management
77
78
79
How to Do It:
Call them at work but require a response - no voice mails Call them at home Page them. If they do not respond within a certain timeframe, try again or try reaching the backup - require a response Page them and have them call into a conference bridge
Why We Do It:
Validate the phone numbers are accurate Find out how long it takes to reach everyone Determine what percentage of people are unavailable Exercise Call Notification Procedures
NEDRIX Conference June 2004
80
Use the test to find out how prepared your teams are to respond
81
Walk-Through Exercise
What to Do: Walk through all or a portion or your recovery procedures with your teams How to Do It: Set up meeting date and time Contact Team Members and invite them Walk through the plan with the team members Take notes of comments, action items Why We Do It: Use as Training and Awareness for Team Members Identify plan weaknesses or deficiencies Improve recovery capabilities
82
Simulated/Actual Exercise
What to Do: Simulate execution or actually execute recovery procedures How to Do It: Create test scenario Obtain Management approval Team members respond to scenario by executing recovery procedures Take notes of comments, action items Why We Do It: Use as Training and Awareness for Team Members Identify plan weaknesses or deficiencies Improve recovery capabilities Validate alternate site readiness
NEDRIX Conference June 2004
83
Success Criteria
An actual exercise should be considered successful if the required resources, equipment, and connectivity of voice and data are recovered to the satisfaction of the business unit at the designated alternate site within the timeframe required. An actual test should be considered successful if the above didnt happen so you can fix it before a real incident
Compact Exercise
What to Do: Execute call notification and actual/simulated recovery exercise during one event How to Do It: Create test scenario/Obtain Management approval Simulate disaster scenario and contact team members Team members respond to scenario by executing recovery procedures Take notes of comments, action items Why We Do It: Use as Training and Awareness for Team Members Identify plan weaknesses or deficiencies Improve recovery capabilities Validate Alternate site readiness
NEDRIX Conference June 2004
87
Exercise Planning
Determine what part of the Plan you want to exercise Determine type of exercise to be conducted Identify exercise participants Agree upon scope of the exercise Agree upon objectives of the exercise Set exercise date Obtain management approval for exercise Build exercise plan Build exercise timeline Walkthrough exercise plan and timeline with team Finalize plan and timeline
88
89
(contd)
(contd)
To recover the critical functions from the primary site within a timeframe which will allow this company to meet the business requirements of Fidelity Investments with minimal disruption to Fidelitys Customers and the business units which are dependent on these functions to execute their critical business functions.
Telecom Objectives 1. 2. 3.
Responsible
1. Simulate Disaster Declaration and notify Teams 2. Team Arrives at alternate site 3. Retrieve offsite storage and unpack 4. Build out alternate site to support site outage
Issues or comments
8:15AM - 2PM
5. Assigned staff to Business Function workstations as they Team Leaders become available and validate desktop connectivity
8:30AM 0 2PM
(contd)
The primary objectives and results of this exercise were as follows: Validate that recovery procedures exists for all critical functions at this site COMPLETE Validate the current recovery procedures will be available at the alternate site at the time of need COMPLETE Validate that the facilities at the alternate site are sufficient and properly equipped to allow for recovery of the critical functions within the timeframe required PARTIAL Validate the desktop connectivity at the alternate site is complete to support the critical functions PARTIAL Validate the recovery procedures are complete and accurately reflect the steps required to execute recovery of the critical functions COMPLETE
8/15/xx
7/25/xx
4. Provide connections FTC Team to SASVTAM for 3 desktops identified 5. Install 2 additional phone lines and larger white board in the Command Center BCP
8/3/xx
8/15/xx
101
102
Execution
Planned Events
XIX Salt Lake City Winter Olympics, February 2002 Democratic National Convention, July 2004 in Boston Republican National Convention, August 2004 in NY
Unplanned Events
World Trade Center Disaster, September 2001
NEDRIX Conference June 2004
103
104
Measurements..
105
106
107
108
109
Another View
110
111
112
113
114
(contd)
Do not assume your disaster recovery team and the rest of the corporation survive the attack We were unaffected by this, but other New York based corporations lost entire recovery teams and the documentation required to recover Other corporations were struggling to do required day-to-day business functions because those responsible died in the event and the training materials for the position were stored in the building
Do not assume you will be able to get the required equipment from your vendors very quickly This did not impact us, but the drop in the economy left many vendors with little or no inventory. The ability to obtain required equipment quickly was hampered.
Do not assume you will be able to fly/transport your team members or associates anywhere
Airport closures, subways closures, road closures Develop alternate transportation plans
NEDRIX Conference June 2004
115
Follow these 11 steps to develop a solid recovery program for your business
116
Identify your team and make certain they know how to reach you in an emergency
117
Identify vital records procedural manuals forms vendor lists contact lists customer lists contracts source documents
118
119
Minimum desktop configuration Application connectivity Voice Requirements Phones (desktop, Aspect, turret) Fax (dedicated, networked) Modems Print requirements (dedicated, networked) Proprietary software running on desktop
120
TSR AAA AA A B C D
Downtime Allowable None, immediate recovery 4 hours Same day Within 24 hours 48-72 hours 72 hours or more
121
Survey existing sites Identify equipment/phone services Identify desktops to be used for contingency Identify staff to be displaced or moved to off shift
122
123
Identify all platforms and applications supported by internal systems group Identify recovery priority for each application Identify recovery strategy which meets the business requirements Develop recovery procedures for critical applications
124
125
If you couldnt get back in your building today, what would you do next?
126
127
128
Websites
Industry Group Websites DRI International www.drii.org Continuity Insights www.continuityinsights.com/conf.cfm Contingency Planning and Management www.contingencyplanning.com Disaster Recovery Journal www.drj.com/ Global Association of Risk Professionals (GARP) www.garp.com Professional Risk Managers International Association (PRMIA) www.prmia.org Institute of Internal Auditors www.theiia.org
129
130
Dis as ter
Re co ve ry
131