PM Confidential: Security, Business Continuity, and Disaster Recovery
Our last Security TPM article is a big one - discussing security, business continuity, and disaster recovery. Pour yourself a cup of coffee and give yourself a minute. There are a lot of big ideas to absorb but I'm going to keep the main points near the top because I value your time. No security org can operate without a strong sense of how to continue business operations or how to recover from a disaster. Indeed, one of your top priorities will always be: 'how to go on when things go wrong.'
But you're smart, you already know this. Business continuity / Disaster Recovery (BD/DR) is often already working in a large organization. However, you may come into the discussion because A) Opportunities have been identified or B) The plan didn't wasn't sufficient for real-world expectations and attacks. Let's focus on the 'how' of disaster recovery and business continuity in an infosec context assuming that you're being dropped into an organization that already has many/most of these resources in place. Where to begin?
Perform Gap Analysis on Existing BC/DR plans
Reviewing an enterprise Business Continuity (BC) and Disaster Recovery (DR) plan for gap analysis involves assessing the existing plan against established standards, best practices, and organizational requirements. As a Security Technical Program Manager (TPM), here is a step-by-step guide for conducting a thorough gap analysis. I'm going to give you some bullet-points and then if you need more information, please feel free to reach out and we can drill in for greater depth:
1. Understand the Organizational Context:
2. Review Relevant Standards and Frameworks:
3. Perform a Document Review:
4. Assess Alignment with Standards:
5. Conduct a Business Impact Analysis (BIA) Review:
6. Evaluate Risk Management Practices:
7. Check Incident Response Integration:
8. Examine Communication Protocols:
9. Evaluate Testing and Exercise Plans:
10. Check Documentation and Version Control:
11. Assess Training Programs:
12. Evaluate Continuous Improvement Processes:
13. Consider Legal and Regulatory Compliance:
14. Engage Stakeholders:
15. Document Findings:
16. Develop an Action Plan:
17. Communicate Recommendations:
18. Follow-Up and Iterative Improvement:
One of the reasons I recommend a beginning gap analysis is to identify areas for improvement in the enterprise BC/DR plan. PLUS, you'll come out of that gap analysis with a better understanding of what the BC/DR plan is. This holistic exercise will ensure that any recommendations you make will aligns with best practices, standards, and the organization's specific requirements.
"Help - they don't have ANY BC/DR plan!"
So, what if the company doesn't have any plans? Well, that's a big deal. You need to start by getting the important people together. Make a plan for the plan! Talk about how to handle problems, what to do if something bad happens. Get everyone to agree and then start making the plan step by step. Remember, this isn't just a plan. It's like a big project. You need to break it into small pieces and make sure everyone knows what they're doing. It might take some time, but with your help, the company can be ready for anything that comes its way!
First things first, creating a BC/DR plan should involve key stakeholders like the CEO and other SLT staff. In fact, the CISSP recommends having the CEO sign off on the plan to help everyone else understand how important this is for the business. Your 'plan to create the plan' should address the following four areas:
Building a BC/DR Plan From Scratch (TL;DR version)
Depending on the size/scope of the organization, a comprehensive BC/DR plan can take weeks/months/years to develop and implement. No panicking! If they're asking you - the new resource - to build the plan then let's approach the situation with compassion, comprehension, and a systematic approach. You're a TPM, so you'll understand it when I say: "Treat it like a project."
That's right - BC/DR plans are projects unto themselves. They should have charters, stakeholder buy-in, milestones, deliverables, resources and a program workbook to highlight any challenges you need your stakeholders to be aware of. Use Waterfall to break it down into a WBS, or use Agile to create program epics, break those program epics to epics, epics to user stories, and so forth. Break the work down into simple easy-to-accomplish chunks.
As you create the "BC/DR Plan" project, you'll need to be aware of ALL THE AREAS your plan will be addressing. For a single Security Technical Program Manager (TPM) assigned to building a Business Continuity (BC) and Disaster Recovery (DR) plan from scratch, here are the major areas you'll be focusing on in the first 180 days of your assignment:
领英推荐
1. Understand Organizational Context:
2. Define Objectives and Scope:
3. Select Appropriate Standards and Frameworks:
4. Perform a Gap Analysis:
5. Establish a BC/DR Team:
6. Conduct a Business Impact Analysis (BIA):
7. Risk Assessment:
8. Security Controls Implementation:
9. Mapping to ISO/IEC 22301:2019:
10. Develop Policies and Procedures:
11. Incident Response Planning:
12. Communication Plan:
13. Training and Awareness Programs:
14. Testing and Exercises:
15. Documentation and Version Control:
16. Continuous Improvement Process:
17. Compliance Check:
18. Communicate and Gain Buy-In:
19. Follow-Up and Iterative Improvement:
These 19 areas seem like a lot, but when you break them down into a project plan, those chunks become very do-able. In fact, feel free to use this material when you create your program charter for buy-in with your boss and executive stakeholders. Don't be shy about asking for resources, buy-in, and support - business continuity and disaster recovery are big jobs, and your exec stakeholders will know that.
In wrapping things up, let's chat about why making a strong plan for when things go haywire is super important for any security team. This article has walked you through the nitty-gritty of checking and improving your existing plans or even starting a brand-new one. If you're a Security Technical Program Manager (TPM), this guide is here to help you step by step. Whether you're polishing up what's already there or starting fresh, the key is to match up with global standards like ISO/IEC 22301:2019, NIST Cybersecurity Framework, and NIST SP 800-53. Understanding how your company works, dealing with risks, and responding to incidents are big parts of this. Starting with a check-up helps find what's working well and what needs a little boost, setting you up for improvements that follow the best ways of doing things. And if you're on the exciting journey of creating a plan from scratch, a chill and organized approach, plus teamwork with others in the company, is the way to go. Remember, this isn't just about making a plan; it's like putting together a cool project. So, take it step by step, get the nod from the big bosses, and make it happen. With care and a full-on approach, you, as a Security TPM, can make sure your team is all set to handle whatever curveballs come their way, standing strong through the ups and downs. You've got this!
Helpful Resources
Don't freak out when you read this list - these aren't documents you should expect to memorize. Just as lawyers 'don't always know the answer but they know where to look,' Security TPMs know where to look for relevant information on infosec topics:
1 International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC), ISO/IEC 22301:2019 https://www.iso.org/standard/75106.html
2 National Institute of Standards and Technology (NIST), Cybersecurity Framework, USA, https://www.nist.gov/cyberframework
3 National Institute of Standards and Technology, Cybersecurity Framework Version 1.1, USA, April 2018, https://www.nist.gov/cyberframework/framework
4 National Institute of Standards and Technology, Special Publication (SP) 800-53 https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf
5 International Organization for Standardization/International Electrotechnical https://www.iso.org/standard/54534.html
6 International Organization for Standardization/International Electrotechnical , https://www.iso.org/standard/54533.html
7 National Institute of Standards and Technology, NIST SP 800-53 Revision 5 https://csrc.nist.gov/CSRC/media/Publications/sp/800-53/rev-5/final/documents/sp800-53r5-to-iso-27001-mapping.docx
8 ISO/IEC 27002:2013
9 National Institute of Standards and Technology, SP 800-37 Revision 2 https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf