Categories: Security

Becoming Resilient: The Definitive Guide to ISO 22301 Implementation

In this post I’ll review a book called Becoming Resilient: The Definitive Guide to ISO 22301 Implementation from my friend Dejan Kosutic that describes how to implement business continuity according to this international standard.

At first sight, business continuity may not have a direct relationship with information security, but this is not so – business continuity is essential for information security because it ensures that IT systems become available quickly, even in the case of natural disasters or any other kind of disruptions (e.g., hacker attacks, inside attack, malfunction, etc.).

First impressions

In any case, business continuity is not my specialty, so I didn’t know what to expect from this book. But what really surprised me was that it was written in such a way that it is very easy to read for people who are not experts in business continuity – Dejan avoided using jargon or abbreviations, so even those people without much knowledge about IT or business continuity will be able to read it.

Also, the book seems very practical – it includes plenty of diagrams and figures – let me give just a few examples:

  • Example of risk assessment table
  • Example of risk treatment table
  • Example of BIA Questionnaire – determining the Maximum Acceptable Outage
  • Example of BIA Questionnaire – determining the Maximum Data Loss/RPO
  • Example of determining the RTO based on activity dependencies
  • High-level structure of Business continuity plan
  • Elements that are to be included in the Business continuity plan, Incident response plan, recovery plans, and restoration plans
  • Example of a communication responsibilities matrix
  • Example of an Incident response procedure for a bomb threat
  • Structure of recovery plans – main recovery steps to be included

So, you’ll find plenty of examples that seem very usable in real-life business continuity implementation.

Risk assessment

What I like the most is that the book gives very detailed guidelines on particular topics like business impact analysis or risk assessment. Since risk assessment is something I’m quite familiar with, let me go into more details about this section of the book – with Dejan’s permission I’ve quoted a section of the book that explains which options exist for performing the risk assessment:

“1) Activity-based or asset-based risk identification. In activity-based risk assessment you assess the risks of disruptive incidents for your whole activity, whereas in asset-based you have to assess risk of disruptive incident for each and every asset in the activity (assets range from employees, hardware, software, data, to equipment, infrastructure, etc.). Of course, activity-based risk assessment is much quicker, because in each activity you may have a few dozen to a few hundred assets. However, if you choose the asset-based risk assessment, you will identify all the assets that are important to you, which you would need to do anyway during the business impact analysis, so sooner or later it makes no difference.

2) Assessing only the threats, or vulnerabilities also. Threat is what could potentially happen to your activity/asset and do harm – e.g., a fire; vulnerability is the characteristic of your activity/asset that could be exploited by a threat – e.g., lack of a fire-suppression system. You can choose to identify only the threats for each of your activities or assets (which would be sufficient according to ISO 22301); however, if you want to be more precise you could also identify vulnerabilities, because this is how you will find out the cause of the problem – this cause is what you will have to address in the treatment phase, so identifying vulnerabilities will help you be more effective with the treatment later on.

3) Determining the level of risk directly, or through consequences and likelihood. Once you identify the risks, you need to know how high they are – for example, you can use the scale of 1 to 5, where 1 would be very low, 2 low, 3 medium, etc.; alternatively, you can choose to assess consequences and likelihood – e.g., using the same scale of 1 to 5, the likelihood of fire is low (2); however, the consequences would be very high (5) – in such approach the level of risk would be a calculated result of consequences and likelihood (see below “Method of risk calculation”). Again, assessing risk directly is quicker, but assessing consequences and likelihood will give a more precise result and it will be compliant with the information security risk assessment if you choose to do it afterwards.

4) Which assessment scales to use. You are completely free to use whichever scales you like – e.g., Low-Medium-High, or 1 to 5, or 1 to 10, whatever suits you best. Of course, if you want to make it simple, go for Low-Medium-High. In case you assess the level of risk directly, you can even use a simpler scale: risk is acceptable Yes/No.

5) Method of risk calculation. If you use assessment through consequences and likelihood, you have to calculate the level of risk – this is usually done through addition (e.g., 2 + 5 = 7) or through multiplication (e.g., 2 x 5 = 10). If you use scales Low-Medium-High, then this is the same as using scale 1-2-3, so you have numbers again for calculation.

6) Decision on which risks need treatment. If your method of risk calculation produces values from 2 to 10, then you can decide that an acceptable level of risk is, e.g., 7 – this would mean that only the risks of value 8, 9 and 10 need treatment. Alternatively, you can examine each individual risk and decide which should be treated or not based on your insight and experience, using no pre-defined values; assessing the risks directly with a scale of Yes/No is basically the simplest way of using this alternative.

7) Use of risk assessment tools.  If you are a larger organization you will find performing the risk assessment much easier with the tool; however, if you are really small it will take you much longer to figure out how the tool works then to do it using Excel sheets. One word of caution here – you should aim at adapting the tool to your methodology, not the other way around.

8) Measurement. You must measure whether your risk management process is effective by  evaluating whether the safeguards and other treatment options have produced desirable results; however, if no incidents have occurred it will be difficult to make this measurement, so you can also decide to measure the residual risk, i.e., the risk that is left after the treatment has been performed.”

And, in a similar way, the book explains options for every other business continuity element – business continuity policy, business impact analysis, business continuity strategy, exercising and testing, etc.

Conclusion

On the negative side, for my taste the book touches too little on the technologies that can be used for disaster recovery, alternative locations for data centers and backup systems – the author probably could have spent a chapter on these subjects, but I understand his effort for keeping this book readable even for non-technical people.

But if you don’t expect this book to teach you the technology side of business continuity, and you want an easy and comprehensive guideline to start (and finish) your business continuity implementation, this is certainly a very good book to start with.

You can find the book here: Becoming Resilient: The Definitive Guide to ISO 22301 Implementation.

Pierluigi Paganini

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Over 1,400 CrushFTP internet-facing servers vulnerable to CVE-2024-4040 bug

Over 1,400 CrushFTP internet-facing servers are vulnerable to attacks exploiting recently disclosed CVE-2024-4040 vulnerability. Over…

16 mins ago

Sweden’s liquor supply severely impacted by ransomware attack on logistics company

A ransomware attack on a Swedish logistics company Skanlog severely impacted the country's liquor supply. …

3 hours ago

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

13 hours ago

CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.…

20 hours ago

DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transactions

The U.S. Department of Justice (DoJ) announced the arrest of two co-founders of a cryptocurrency mixer…

20 hours ago

Google fixed critical Chrome vulnerability CVE-2024-4058

Google addressed a critical Chrome vulnerability, tracked as CVE-2024-4058, that resides in the ANGLE graphics…

1 day ago

This website uses cookies.