Modern organisations rely heavily on information and communication technology (ICT) to deliver products and services.
Under ISO 22301:2019, organisations are required to identify and assess resources that support prioritised activities, including information, communication systems, applications, and infrastructure (Clause 8.2.2 – Business Impact Analysis).
Part 4: Supporting IT Systems and Applications is a critical component of the Business Impact Analysis (BIA) that documents the technology dependencies required for each business function.
This chapter ensures that IT recovery requirements are directly aligned with business recovery priorities, enabling effective planning for disaster recovery, technology resilience, and operational continuity.
By completingPart 4, organisations establish a structured link between business function recovery objectives and ICT recovery capabilities, as required by ISO 22301, and provide essential inputs for IT disaster recovery planning, third-party management, and resilience testing.
The objectives of Part 4: Supporting IT Systems and Applications are to:
Identify and document ICT resources supporting each business function
In accordance with ISO 22301 Clause 8.2.2, this includes applications, systems, data repositories, and enabling technologies required to perform prioritised activities.
Determine ICT recovery requirements aligned with business needs
This section captures Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) for systems, ensuring alignment with the supporting business function's maximum tolerable disruption (MTD).
Support continuity and disaster recovery strategy development
The information collected provides essential input for Clause 8.3 – Business Continuity Strategies and Solutions, enabling informed decisions on backup solutions, redundancy, system replication, and recovery architecture.
Highlight critical technology dependencies and constraints
This includes shared systems, specialised equipment, third-party platforms, and cloud or outsourced services that may affect recovery capability and response coordination.
Facilitate assurance, testing, and continual improvement
Accurate system dependency data supports ICT recovery testing, exercises, and post-incident reviews required under Clauses 8.5 and 10 of ISO 22301.
When completing Part 4: Supporting IT Systems and Applications, the business function owner, in collaboration with IT and continuity stakeholders, should capture the following information:
Each entry must reference a business function previously identified and prioritised in Part 1 of the BIA, ensuring traceability between business activities and their supporting ICT resources, as required by ISO 22301 Clause 8.2.2.
List all applications, systems, platforms, or shared services required for the business function to operate, including:
Core business applications (e.g. ERP, CRM, core banking systems)
Collaboration and communication systems
Databases and document management systems
Cloud-based or outsourced platforms
Where applicable, indicate:
Whether the system is internal or externally hosted
Approximate number of users required during recovery
Any system criticality or prioritisation notes
This ensures a complete understanding of ICT dependencies supporting prioritized activities.
The RPO defines the maximum acceptable data loss, measured in time.
In line with ISO 22301, the RPO must:
Reflect business tolerance for data loss
Be consistent with backup frequency and data protection controls
Support regulatory, contractual, and operational requirements
The system RTO specifies the maximum time allowed to restore the system to an operational state following disruption.
The stated RTO must:
Support the RTO of the associated business function
Be realistic based on current ICT capabilities
Inform disaster recovery prioritisation and recovery sequencing
Identify any specialised equipment or technology resources required to operate or access the system, such as:
Secure workstations or terminals
Printers, scanners, or network devices
Authentication tools or encryption devices
This supports ISO 22301 requirements for identifying resource dependencies and constraints.
Use this section to capture:
Dependencies on third-party service providers
Known recovery limitations or manual workarounds
Licensing, access, or security constraints
Any assumptions made during the assessment
Clear documentation of assumptions supports auditability and continual improvement under ISO 22301 Clause 10.
To learn more about the course and schedule, click the buttons below for the BCM-300 Business Continuity Management Implementer [BCM-3] and the BCM-5000 Business Continuity Management Expert Implementer [BCM-5].
|
Please feel free to send us a note if you have any questions. |
||