Beruflich Dokumente
Kultur Dokumente
com/#
Conducting a business impact analysis is hard work and takes time. But once this data is
collected, security practitioners can confidently request resources, and more importantly,
prioritize security efforts across the enterprise.
Simply stated, BIA is an analytic process that aims to reveal business and operational
impacts stemming from any number of incidents or events.
A BIA traditionally leads to a report detailing likely incidents and their related business
impact in terms of time and dollars. For example, a BIA report for an online retailer may
include a Web site outage of one day with the loss calculated as the yearly gross sales
divided by number of days per year the site is open for business.
In order to conduct a BIA you need to understand the business operations of your
company in detail. You need to roll up your sleeves and reach out to operational folks to
get the real picture. I remember one such exercise on a consulting engagement at a large
bank where it was assumed that if the tellers lost their computer terminals that the dollar
impact per hour was in the millions. The bank tellers later told me that when the
terminals aren't available they can continue accepting deposits and other transactions,
then manually batch the transactions at the end of the day. There was actually a five- to
seven-hour window of no real loss of revenue.
Here is a simple step-by-step approach that will put you on your way to conducting a
successful BIA.
1. Document the gross revenue and net profit your organization generates per year.
These data sets the upper bound for business losses related to business operations.
It will not, however, set the limits for reputation, regulatory or legal losses that
can rise above yearly revenue.
2. Define the critical business systems your organization operates. This data can be
entered and tracked in a spreadsheet. In many cases the revenue data can be
linked to critical systems. This is especially true in e-commerce-driven
companies.
3. Classify each system as business critical, important or non-critical. Ask system
operators what would happen if a particular system was not available for an hour,
a day or a week. In most cases you can quickly classify systems based on operator
responses.
4. Document which systems have cross dependencies. There may be non-critical
systems that act as upstream or downstream components to critical systems. For
example, DNS service may not appear to be critical to an online store until it is
discovered that the credit card gateway relies on DNS to send credit card requests
and process transactions. This type of cross dependency may require a
reclassification of systems when linked to critical applications.
5. Estimate the financial, revenue and non-revenue impacts associated with each
system. For example, a payment gateway server for fax orders that does only 1%
of the total revenue of the company can easily be estimated as .01 x gross
revenue. If data does not exist or is not easy to estimate, the replacement cost
(including labor) can be used for important and non-critical systems. For non-
revenue related systems, note impact. For example, if the payroll system is not
working, employees may not get paid on time -- which may cause other issues.
6. Estimate the cost to identify, remediate, recover and resume operations for each
system in the spreadsheet. Include labor, hardware and software costs. For
incidents that result in negative reputation, legal and regulatory outcomes, include
estimate of fines, legal costs or a marketing campaign to win back customer
confidence. Add these costs to impacts defined in step five.
7. Identify the Maximum Acceptable Outage (MAO) for each system. This is the
time from the detection of the outage to obviation of importance to business. For
example, if an online bookseller's Web site is down for over a week, it may lose
all customers to the competition. However, an overnight outage may only result in
a few lost orders. Some real-time financial industry systems may have very low
MAO values, where more elongated global supply-chain processes with built-in
delays may have MAO values that exceed a month.
8. Identify and document potential system threats, severity and the probability at
which they may occur. For example, a datacenter fire severity would be 1.00 (on a
.0–1.0 scale) but the probability may only be .01 (1%) in a given year. Threat
statistics are available from a variety of sources and are used by insurance
companies to calculate insurance premiums. Create a threat score for each
incident type in a different section of the same spreadsheet. In the above example
you would multiply (.01 x 1.0 =.01) and yield a combined risk score of .01 or 1%.
Do this for all conceivable threats. You will also want to list one generic loss at
100% just to have a line item that reflects a complete loss for each system
regardless of the incident or probability. This sets the upper bound for the system
valuation.
9. Now you have most of the data needed to start the process. It is best to use the
simple formula functions that a spreadsheet provides. For every system you have
defined with a loss value, multiply the series of values from the threats listed in
step eight with the combined loss values from step six to see the relative loss or
impact per system. Do this on a line item basis. For each system calculate all
possible listed threats. Do not include items that are not physically possible. For
example, if you have business systems in Malaysia and New York, don't include
the volcano or similar incidents that can't really happen in New York.
10. In this last step you will sort the data you have to show the top priority systems
both from a business criticality and impact perspective. In the spreadsheet, select
all columns in the sheet and use the "auto-filter" function on the data-sorting
menu of your spreadsheet to link all the columns relationally. You can now sort
on any of the variables in the sheet. Optionally, you can create a scorecard-like
report by dressing up the spreadsheet, or add a narrative document and use the
spreadsheet as the supporting data source.
Your BIA report can be used to request and prioritize resources, and incident-response
activity. If done properly, it will be in a format your CFO and finance department can
understand and include impact data gathered from these very same people, thus
overcoming any objections or pushback on the validity of your report and subsequent
resource requests!
Objective
The purpose of this document is to help businesses conduct a Business Impact Analysis
(BIA), which identifies the business’s critical processes, required resources for each
process and the order in which processes need to be recovered. This document
provides guidance on how to conduct the BIA, analyze the information that is collected,
and report the findings of the assessment. The following documents are available to
help the business complete the assessment:
The Business Impact Analysis is only a part of the overall Business Assessment. A
Business Assessment is separated into two constituents, Risk Assessment and
Business Impact Analysis (BIA). The Risk Assessment is intended to measure present
vulnerabilities to the business’s environment, while the Business Impact Analysis
evaluates probable loss that could result during a disaster. To maximize the Business
Impact Analysis, a Risk Assessment should also be completed.
INTRODUCTION
Compliance
Scope
Scope
Objectives and Deliverables
Method of Collection
Identify People
Interview Order
General Information
Process Information
Dependencies
Required Resources
Potential Impact
Application Information
Database Information
Hardware Information
Network Information
NEXT STEPS
APPENDIX
Objectives
Due to HIPAA Security Rule regulations, organization must implement Contingency
Planning Practices to ensure the protection of ePHI (electronic Protected Health
Information). In order to accomplish this undertaking, there are several steps that
organization will be completing to identify critical business functions, processes and
applications that process ePHI and to understand the potential impact to the business if
a disruptive event occurred.
The first step of implementing the Contingency Program for organization is to conduct a
Business Impact Analysis (BIA). This questionnaire will help each business unit identify
their critical business functions and recovery requirements as well as estimating the
impact of a disaster (or prolonged outage) to the business unit. Once the survey is
completed, the BIA Project team will review the data, analyze and create a prioritized
recovery strategy to present to senior management.
For the purpose of this BIA, answer each question based on the “worst-case scenario”.
This means your workplace and all records; files and equipment in it are inaccessible.
The priority of this questionnaire is to identify any business process or application that
currently contains ePHI. However, please answer all questions regardless of ePHI
status. By completing all questions to the best of your knowledge, a recovery strategy
that best meets the need of the business can be established.
Some questions will be directly related to a specific process where as other questions
are about the business unit in general. Some sections contain an additional “Notes” area
to amplify or explain your responses. While this is not a requirement, it can be useful in
helping the Project Team understand the nature of your business unit operations.
T a b l e o f C o n t e n t s : B u s i n e s s I m p a c t A n a l y s i s S u r v e y T e m pl a t e
OBJECTIVE
GENERAL INFORMATION
Respondent Information
Business Unit / Department Information
ePHI (electronic Protected Health Information)
Service Providers
Business Unit Vulnerability
Recovery Complexity
PROCESS INFORMATION
Process Identification
Process Criticality & Frequency
Processing Periods
Process Unavailability Impact
Process Deferrable
Manual Work – Around Procedures for Processes
Alternate Facilities / Work-load shifting
Backlog Work
DEPENEDENCIES
REQUIRED RESOURCES
Software Resources
Specialized Supplies and Clerical Type Resources
Equipment Resources
Manpower Resources
Reports
POTENTIAL IMPACT
Financial Impact
Customer & Operational Impact
Legal & Regulatory Impact
F i n a l B I A E x e c u t i v e M a n a g e m e n t R e p o r t T e m p l at e s w / C h a r t s
Executive Overview
Objectives
The intent of the Business Impact Analysis (BIA) was to help our organization identify
which business units, operations and processes are crucial to the survival of the
business. The BIA has identified the time frames in which essential business operations
must be restored to full functionality following a disruptive event. It has defined the
business impact of not performing critical business operations based on a worst-case
scenario. The BIA has also identified the resources required to resume business
operations to a functioning level.
EXECUTIVE OVERVIEW
Objectives
Scope
Approach
Department Responses and Findings
SUMMARY OF FINDINGS
CONCLUSION