Contingency Plan Policy
Contingency Plan Policy
Contingency Plan Policy
Policy #:
Version #: 1.0
Approved By:
Effective Date:
Purpose:
The purpose is to establish and implement, as needed, policies and procedures for responding to an
emergency or other occurrence (for example, fire, vandalism, system failure, and natural disaster) that
damages systems that contain sensitive information.
A contingency plan is a routinely updated plan for responding to a system emergency that includes
performing backups, preparing critical facilities, and appropriately detailed migration plans that can be
used to facilitate continuity of operations in the event of an emergency and recovering from a disaster.
Scope:
This policy applies to <<Organization Name>> in its entirety, including all workforce members. Further,
the policy applies to all systems, network, and applications that process, store or transmit sensitive
information.
Policy:
<<Organization Name>> will develop contingency plan documents to identify core activities in the areas
of Data Backup Plan, Disaster Recovery Plan, Emergency Mode Operation Plan, Testing and Revision,
and Applications and Data Criticality Analysis.
<<Organization Name>> will develop and implement a contingency plan to ensure the confidentiality,
integrity, and availability of sensitive information during and after an emergency.
The contingency plan will be developed for the entire enterprise. The contingency plan must address IT
system components such as:
Local, wide area and wireless networks including Internet access (if critical to the operation of the
business)
Server systems such as file, application, print and database
Web sites
Security systems such as firewalls, authentication servers, and intrusion detection
Desktop, laptop, PDA systems
<<Organization Name>> will follow the recommendations of The National Institute of Standards and
Technology (NIST) in the area of contingency planning. The NIST recommends following seven key steps
to address the requirements of contingency planning. These seven key steps for contingency planning
are:
1. Develop the contingency policy objective statement
2. Conduct a Business Impact Analysis (BIA)
3. Identify preventive controls
4. Develop recovery strategies
5. Create the contingency plan
6. Conduct testing and training
7. Review and maintenance
Let us review of the steps to better understand how we may be able to meet contingency planning
requirements.
System requirements
Processes
Interdependencies
As part of the BIA process, information is collected, analyzed and interpreted. The information provides
the basis for defining contingency requirements and priorities.
The objective is to understand the impact of a threat on the business. The impact of the threat may be
economical, operational or both. Questionnaires or survey tools may be used to collect the information.
BIA is performed at the beginning of disaster recovery and continuity planning to specifically identify the
areas that would suffer the greatest financial or operational loss in the event of a disaster or disruption. A
key objective is to identify all critical systems that are required for the continuity of the business. Further, a
determination of the time it would take to recover such systems in the event of a loss.
The choice for the recovery approach would depend on the incident, type of system and its operational
requirements. Technologies such as Redundant Arrays of Independent Disks (RAID), automatic fail-over,
Uninterruptible Power Supply (UPS), and mirrored systems should be considered when developing a
system recovery strategy.
Plans need to balance detail with flexibility; usually the more detailed the plan is, the less scalable and
versatile the approach. The NIST identifies five main components of the contingency plan. They are:
1. Supporting Information
2. Notification/Activation Phase
3. Recovery Phase
4. Reconstitution Phase
5. Plan Appendices
Responsibilities:
The Security Officer is responsible for leading compliance activities that bring <<Organization Name>>
into compliance with regulatory requirements in areas such as:
Compliance:
Failure to comply with this or any other security policy will result in disciplinary actions as per the HR
XXXXX Policy. Legal actions also may be taken for violations of applicable regulations and standards
such as state and federal rules to include the Family Educational Rights and Privacy Act (FERPA).
Procedure(s):
Procedures related to the Contingency Plan standard include:
Data backup
Disaster recovery
Emergency mode operations
Testing and revision
Applications and data criticality analysis
Form(s):
Business Impact Analysis (BIA) Report
References:
The Family Educational Rights and Privacy Act (FERPA) (20 U.S.C. § 1232g; 34 CFR Part 99)
International Standards Organization (ISO 27002).
Contact:
John Doe, Security Officer
1234 Anystreet
Anywhere, WY XXXXX
E: [email protected]
P: 307.XXX.XXXX
F: 307.XXX.XXXX