[P2] [S2] Chapter 8
Step 5 – Map Interconnections and Interdependencies
Introduction
Having identified Critical Business Services (CBS), mapped processes and resources, and established the necessary data inputs, the next critical step is to map interconnections and interdependencies.![[OR] [P2] [S2] [MII] [C8] Step 5 – Map Interconnections and Interdependencies](https://no-cache.hubspot.com/cta/default/3893111/10f06848-f21f-457d-aa80-ca4e3b20ce9e.png)
This step transforms static lists of components into a dynamic, end-to-end view of how services are actually delivered.
Mapping interconnections and interdependencies provides organisations with the ability to:
- Understand how components interact
- Identify where dependencies exist
- Assess how disruptions propagate across the service chain
Without this step, operational resilience efforts remain incomplete, as organisations may understand “what exists” but not “how everything works together”.
Purpose of the Chapter
The purpose of this chapter is to:
- Explain how to identify internal and external dependencies
- Provide a structured approach to mapping connectivity between components
- Introduce methods for assessing dependency strength and criticality
- Define key types of interdependencies
- Highlight the importance of identifying concentration risks
Identifying Dependencies
The first step in mapping interconnections is to identify all relevant dependencies supporting each CBS. These dependencies can be broadly classified into internal and external.
Internal Dependencies (Within the Organisation)
Internal dependencies refer to relationships between components within the organisation.
Examples
- A payment processing system dependent on an authentication service
- A customer onboarding process reliant on internal KYC systems
- Operations teams dependent on IT support for system availability
Key Components
- People (roles and expertise)
- Processes (workflow dependencies)
- Technology (systems and applications)
- Data (information flows)
- Facilities (locations and infrastructure)
Mapping Considerations
- Identify upstream and downstream relationships
- Capture cross-functional dependencies
- Highlight shared resources across multiple CBS
External Dependencies (Vendors, Regulators, and Ecosystem)
External dependencies refer to relationships with entities outside the organisation.
Examples
- Cloud service providers hosting critical applications
- Payment networks supporting transaction processing
- Regulatory bodies requiring reporting and compliance activities
Key External Entities
- Third-party vendors
- Fourth-party providers
- Market infrastructure (e.g., clearing and settlement systems)
- Regulators and supervisory systems
Mapping Considerations
- Identify critical vendors supporting CBS
- Understand reliance on external infrastructure
- Assess visibility into fourth-party dependencies
Mapping Connectivity
Once dependencies are identified, the next step is to map connectivity, which describes how components interact with each other.
Definition of Connectivity
Connectivity refers to:
- The flow of information, transactions, or control between components
- The interaction mechanisms linking processes, systems, and entities
Types of Connectivity
Process Connectivity
- Sequence of activities within a workflow
- Example: Customer request → validation → processing → confirmation
System Connectivity
- Integration between applications and platforms
- Example: API calls between front-end and backend systems
Data Connectivity
- Movement and transformation of data
- Example: Data transfer between databases and reporting systems
Organisational Connectivity
- Interaction between teams and functions
- Example: Coordination between operations and IT during incident response
Mapping Approach
Organisations should:
- Use visual diagrams (e.g., flowcharts, dependency maps)
- Capture direction of flows (upstream vs downstream)
- Identify points of interaction and handoffs
Outcome
Connectivity mapping provides:
- A clear view of how CBS are delivered
- Insight into potential failure propagation paths
- A foundation for scenario testing and recovery planning
Assessing Dependency Strength and Criticality
Not all dependencies are equal. Organisations must assess:
- How critical a dependency is
- How strongly a component relies on another
Dependency Strength
Dependency strength reflects the degree of reliance between components.
Categories
- High Dependency: Service cannot function without the component
- Medium Dependency: Service is degraded but still operational
- Low Dependency: Minimal impact if component fails
Dependency Criticality
Criticality reflects the importance of the dependency to the CBS outcome.
Factors to Consider
- Impact on customers
- Regulatory implications
- Financial consequences
- Time sensitivity
Assessment Approach
Organisations can:
- Use scoring models (e.g., High/Medium/Low)
- Define thresholds aligned with impact tolerance
- Integrate with risk assessment frameworks
Outcome
Assessing dependency strength and criticality enables:
- Prioritisation of resilience efforts
- Identification of high-risk dependencies
- Focused mitigation strategies
Types of Interdependencies
Understanding the types of interdependencies helps organisations analyse how disruptions may propagate.
Sequential Dependencies
Sequential dependencies occur when:
- One component must function before another can operate
Example
- Authentication must occur before transaction processing
- Data validation must occur before reporting
Risk Implication
- Failure in an upstream component halts downstream processes
Shared Dependencies
Shared dependencies occur when:
- Multiple services rely on the same component
Example
- Multiple CBS relying on a single core banking system
- Several processes dependent on the same cloud provider
Risk Implication
- A single failure can impact multiple CBS simultaneously
Concentration Risks
Concentration risk arises when:
- Dependencies are heavily concentrated in a single component, vendor, or location
Examples
- Single vendor supporting multiple critical services
- Centralised data centre hosting all applications
- Limited redundancy in key personnel
Risk Implication
- High impact disruption with limited recovery options
Integrating Interdependency Mapping into Operational Resilience
Mapping interconnections and interdependencies is not an isolated activity. It directly supports:
Impact Tolerance Setting
- Identifying critical thresholds based on dependencies
Scenario Testing
- Designing realistic disruption scenarios
Recovery Planning
- Determining recovery priorities and sequencing
Third-Party Risk Management
- Understanding vendor dependencies and concentration risks
Practical Mapping Output Structure
A typical interdependency mapping table may include:
|
Sub-CBS Code |
Sub-CBS |
Dependency Type |
Dependency Detail |
Connectivity |
Dependency Strength |
Criticality |
This structured output ensures consistency and usability across resilience activities.
Mapping interconnections and interdependencies is a critical step in operational resilience implementation, transforming static resource mapping into a dynamic, actionable understanding of service delivery.
By identifying both internal and external dependencies, mapping connectivity, and assessing dependency strength and criticality, organisations gain:
- Visibility into complex service ecosystems
- Insight into how disruptions propagate
- The ability to prioritise resilience efforts effectively
Understanding key interdependency types—sequential, shared, and concentration risks—further enhances an organisation’s ability to anticipate and mitigate disruptions.
Ultimately, this step enables organisations to move from understanding components to understanding how the entire system behaves under stress, which is essential for achieving true operational resilience.
In the next chapter, we will explore Step 6: Validate Mapping, ensuring that all identified interconnections and interdependencies are accurate, complete, and aligned with real-world operations.








![[OR] [P2] [S2] [MII] [C1] Introduction to Interconnections and Interdependencies](https://no-cache.hubspot.com/cta/default/3893111/8cbaf41b-9671-404d-83b3-9a20c9fd69f7.png)
![[OR] [P2] [S2] [MII] [C2] Why Mapping is Critical for Operational Resilience](https://no-cache.hubspot.com/cta/default/3893111/a7625fb5-1205-4fc5-97d4-4b7492c2b25f.png)
![[OR] [P2] [S2] [MII] [C3] Core Components of Interconnections and Dependencies](https://no-cache.hubspot.com/cta/default/3893111/38a3cbd4-322a-41bd-974f-5090a2ce52aa.png)
![[OR] [P2] [S2] [MII] [C4] Step 1 – Define Scope of Mapping](https://no-cache.hubspot.com/cta/default/3893111/69cc922b-c86c-4242-b85b-315a3f941e12.png)
![[OR] [P2] [S2] [MII] [C5] Step 2- Identify Data Sources](https://no-cache.hubspot.com/cta/default/3893111/622d0fcc-71bf-4c3b-a569-213cb48bd1db.png)
![[OR] [P2] [S2] [MII] [C6] Step 3 – Develop Mapping Framework](https://no-cache.hubspot.com/cta/default/3893111/95581d69-3824-4acd-accf-03c2cab43765.png)
![[OR] [P2] [S2] [MII] [C7] Step 4 – Map Processes and Resources](https://no-cache.hubspot.com/cta/default/3893111/a4ffedf2-c795-41e9-9a8b-c5e24eea7159.png)
![[OR] [P2] [S2] [MII] [C9] Step 6 – Validate Mapping](https://no-cache.hubspot.com/cta/default/3893111/57d7a65a-a462-4919-9324-53e0bb207f3e.png)
![[OR] [P2] [S2] [MII] [C10] Step 7 – Analyse Mapping Outputs](https://no-cache.hubspot.com/cta/default/3893111/44bbb252-fdf5-4026-90ba-cbbdbe9c099a.png)
![[OR] [P2] [S2] [MII] [C11] Mapping Tools and Techniques](https://no-cache.hubspot.com/cta/default/3893111/d2fab757-0d78-42dd-8553-044eead7390e.png)
![[OR] [P2] [S2] [MII] [C12] Standard Templates and Data Structures](https://no-cache.hubspot.com/cta/default/3893111/4f04214c-3a0f-4bed-b2f8-6352c6d3cda0.png)
![[OR] [P2] [S2] [MII] [C13] Integration with Operational Resilience Framework](https://no-cache.hubspot.com/cta/default/3893111/c9628dd2-bbcb-4b54-b5b5-490066640d6d.png)
![[OR] [P2] [S2] [MII] [C14] Mapping Third-Party and Supply Chain Dependencies](https://no-cache.hubspot.com/cta/default/3893111/0c13b720-3d3e-4452-91e4-b9533260b3a4.png)
![[OR] [P2] [S2] [MII] [C15] Mapping for Digital and Cloud Environments](https://no-cache.hubspot.com/cta/default/3893111/1c90de74-af6b-44d3-ae4f-26d01eac3cf7.png)
![[OR] [P2] [S2] [MII] [C16] Common Challenges and Pitfalls](https://no-cache.hubspot.com/cta/default/3893111/32bbd8d7-f947-42ac-9db9-b88b0b156813.png)
![[OR] [P2] [S2] [MII] [C17] Case Study – Banking Sector CBS Mapping](https://no-cache.hubspot.com/cta/default/3893111/5a846fed-f810-4f6b-a1d8-0c2100f0eeac.png)
![[OR] [P2] [S2] [MII] [C18] Governance and Ownership of Mapping](https://no-cache.hubspot.com/cta/default/3893111/44ed11f0-5263-4485-98db-725a423c5fd6.png)
![[OR] [P2] [S2] [MII] [C19] Using Mapping for Scenario Testing](https://no-cache.hubspot.com/cta/default/3893111/b7bf0bc8-b382-4892-821d-c7c867303f14.png)
![[OR] [P2] [S2] [MII] [C20] Maintaining and Updating Mapping](https://no-cache.hubspot.com/cta/default/3893111/41d34d1f-78bd-4346-845e-b0b86232cfa6.png)
![[OR] [P2] [S2] [MII] [C21] Key Takeaways and Future Direction](https://no-cache.hubspot.com/cta/default/3893111/d8414f6b-4b4e-4a50-adb3-963546f13951.png)
![[OR] [P2] [S2] [MII] [C22] Back Cover](https://no-cache.hubspot.com/cta/default/3893111/0f96fecf-9a98-4404-8377-d37c1233df10.png)





![[BL-OR] [3-4-5] View Schedule](https://no-cache.hubspot.com/cta/default/3893111/d0d733a1-16c0-4b68-a26d-adbfd4fc6069.png)
![[BL-OR] [3] FAQ OR-300](https://no-cache.hubspot.com/cta/default/3893111/f20c71b4-f5e8-4aa5-8056-c374ca33a091.png)
![Email to Sales Team [BCM Institute]](https://no-cache.hubspot.com/cta/default/3893111/3c53daeb-2836-4843-b0e0-645baee2ab9e.png)









