CONTINGENCY AND BUSINESS CONTINUITY PLAN

advertisement
ARTIFACT 3
STRAGEGIC SITUATIONAL AWARENESS (SSAW)
CONTINGENCY AND BUSINESS CONTINUITY PLAN
VERSION 1.0
APRIL 2013
UNCLASSIFIED
SSAW/Program Office Contingency and Business Continuity Plan
Artifact 3
April 2012
NOTE: DoD defines an Information System (IS) as: a set of information resources
organized for the collection, storage, processing, maintenance, use, sharing, dissemination,
disposition, display, or transmission of information. Includes AIS applications, enclaves,
outsourced IT-based processes, and platform IT interconnections. This term IS is used
interchangeably as defined above by DoD.
The Site/Program Office (PO) completing this Contingency and Business Continuity Plan
(CBCP) must state within Section 2, Concept of Operations, if the IS is deemed a Mission
Assurance Category (MAC) I, II, or III, and its confidentiality level Classified, Sensitive, or
Public Information System (IS). It must be stated in those sections how that determination
was made and by whom it was made. This determination should be consistent with the
information provided in Artifact 1, IS Core.
The Site/PO must indicate how they will fulfill their business requirement (i.e. use a manual
process, etc) if the IS is down due to an extraordinary event. Additionally, the Site/PO is to
indicate the amount of time that they can function with the IS being unavailable. If the
Site/PO references a corporate/hosting IS, the Site/PO must ensure that the corporate/hosting
IS’ CBCP incorporates the Site/PO IS’ production requirements. The Site/PO completing
this CBCP should reference/provide, where applicable, the hosting IS’ CBCP; Artifact 1b,
Service Level Agreement (SLA); and/or Artifact 1a, Interconnection Memorandum of
Agreement (MOA), which shows responsibility for and compliance with the contingency
planning requirement. Ensure that you are referencing the latest “approved”
corporate/hosting IS CBCP, SLA, and/or Interconnection MOA.
Additionally, this CBCP must be customized to your IS’s CBCP practices, ensuring that the
requirements shown here are addressed accordingly.
UNCLASSIFIED
SSAW/Program Office Contingency and Business Continuity Plan
Artifact 3
April 2012
TABLE OF CONTENTS
1
INTRODUCTION................................................................................................................. 1
1.1
Purpose............................................................................................................................ 1
1.2
Applicability ................................................................................................................... 1
1.3
Scope ............................................................................................................................... 1
1.3.1
Planning Principles ........................................................................................ 1
1.3.2
Assumptions/Constraints ............................................................................... 2
1.4
2
Applicable Provisions and Directives ............................................................................. 2
CONCEPT OF OPERATIONS ........................................................................................... 4
2.1
System Descriptions and Architecture ............................................................................ 4
2.1.1
Mission Assurance Category and Confidentiality Level ............................... 6
2.2
Line of Succession .......................................................................................................... 6
2.3
Responsibilities ............................................................................................................... 7
2.4
Threats............................................................................................................................. 7
2.4.1
Probable Threats ............................................................................................ 8
3
NOTIFICATION AND ACTIVATION PHASE ............................................................... 9
4
RECOVERY OPERATIONS ............................................................................................ 11
5
RETURN TO NORMAL OPERATIONS ........................................................................ 12
5.1
Concurrent Processing .................................................................................................. 12
5.2
Plan Deactivation .......................................................................................................... 12
APPENDIX A
SSAW LIST ................................................................................................. 13
APPENDIX B
PERSONNEL CONTACT LIST ............................................................... 16
APPENDIX C
VENDOR/CUSTOMER CONTACT LIST .............................................. 17
APPENDIX D
EQUIPMENT AND SPECIFICATIONS ................................................. 18
APPENDIX E
CONTRACTS AND/OR AGREEMENTS ............................................... 21
APPENDIX F
BUSINESS IMPACT ANALYSIS ............................................................. 22
APPENDIX G
CONTINGENCY LOG .............................................................................. 27
List of Tables
Table 2-1: Site/PO Name Abbreviation Risk Analysis Matrix ...................................................... 8
i
Unclassified
SPAWAR/SSAW Program Office Contingency and Business Continuity Plan
Artifact 3
April 2013
Table B-1: Personnel Contact List ............................................................................................... 16
Table C-1: Vendor/Customer Contact List .................................................................................. 17
Table D-1: Equipment and Specifications ................................................................................... 18
Table D-2: Critical Resources Workstation/Laptop/Thin Client ................................................. 19
Table D-3: Critical Network Devices .......................................................................................... 20
Table F-1: Outage Impacts and Allowable Outage Times........................................................... 24
Table F-2: Resource Recovery Priorities ..................................................................................... 24
List of Figures
.Figure 2-1:
Hierarchical Diagram ................................................................................................. 7
ii
Add appropriate classification marking
SPAWAR/SSAW Program Office Contingency and Business Continuity Plan
Artifact 3
April 2013
1 INTRODUCTION
1.1
Purpose
The purpose of the Contingency and Business Continuity Plan (CBCP) is to prepare for and
address the elements necessary to ensure continuity of service to the critical business functions
during various emergencies. This Strategic Situational Awareness (SSAW) system information
System (IS) CBCP establishes procedures to recover the IS following a disruption. The
following objectives have been established for this plan:

Maximize the effectiveness of contingency operations through an established plan that
consists of the following phases:
o Notification/Activation phase to detect and assess damage and to activate the plan
o Recovery phase to restore temporary IS operations and recover damage done to the
original system
o Reconstitution phase to restore IS processing capabilities to normal operations.



1.2
Identify the activities, resources, and procedures needed to carry out SSAW IS processing
requirements during prolonged interruptions to normal operations.
Assign responsibilities to designated SSAW personnel and provide guidance for
recovering SSAW during prolonged periods of interruptions to normal operations.
Ensure coordination with other staff who will participate in the contingency planning
strategies. Ensure coordination with external points of contact and vendors who will
participate in the contingency planning strategies.
Applicability
This CBCP applies to the functions, operations, and resources necessary to restore and resume
operations as it is currently installed and/or used. This CBCP applies to all persons associated
with SSAW as identified under Section 2.3, Responsibilities.
1.3
Scope
1.3.1 Planning Principles
Various scenarios were considered to form a basis for the plan, and multiple assumptions were
made. The SSAW IS must indicate how the business requirement will be fulfilled if the IS is
down due to an extraordinary event. The applicability of the plan is predicated on these key
principles.


The IS is inaccessible and fails to meet minimum production requirements.
An alternate site and/or alternate process must be developed and available for
implementation if required.
1
UNCLASSIFIED
SPAWAR/SSAW Program Office Contingency and Business Continuity Plan
Artifact 3
April 2013
o The SSAW Program Office (PO) will use the alternate site building and IS
resources to recover functionality during an emergency situation that prevents
access to the original facility.
o The designated computer system at the alternate site has been configured to begin
processing information.
o The alternate site will be used to continue recovery and processing throughout the
period of disruption, until the return to normal operations.
1.3.2 Assumptions/Constraints
Based on these principles, the following assumptions/constraints were used when developing the
IS CBCP:









The IS is inoperable and cannot be recovered within maximum tolerable down time.
Key personnel have been identified and trained in their emergency response and recovery
roles; they are available to activate this CBCP.
Preventive controls (e.g., generators, environmental controls, waterproof tarps, sprinkler
systems, fire extinguishers, and fire department assistance) are fully operational.
IS equipment, including supporting components, are connected to an uninterruptible
power supply (UPS) that provides provide specified time of electricity during a power
failure.
IS hardware and software at the original site are unavailable for at least maximum
allowable down time.
Current backups of the application software and data are intact and available at the
provide address of the offsite storage facility.
The equipment, connections, and capabilities required to operate the IS are available at
the alternate site.
Service agreements are maintained with IS hardware, software, and communications
providers to support the emergency recovery operation.
Disaster recovery, continuity of operations, and emergency evacuation procedures are an
integral part of this plan.
Any additional assumptions/constraints should be added to this list.
1.4
Applicable Provisions and Directives
This CBCP complies with the SSAW IS contingency planning policy as follows:
The organization shall develop a contingency planning capability to meet the needs of
supporting operations in the event of a disruption extending beyond maximum allowable down
time. The procedures for execution of such a capability shall be documented in a formal CBCP
and shall be reviewed at least annually and updated as necessary. Personnel responsible for
target systems shall be trained to execute contingency procedures. The plan, recovery
2
UNCLASSIFIED
SPAWAR/SSAW Program Office Contingency and Business Continuity Plan
Artifact 3
April 2013
capabilities, and personnel shall be tested to identify weaknesses of the capability at least
annually.
STANDARD REFERENCES:
This CBCP also complies with the following federal and departmental policies:









The Computer Security Act of 1987
Office of Management and Budget Circular A–130, “Management of Federal Information
Resources.” 24 December 1985. Revised, Transmittal Memorandum No. 4, Appendix
III, “Security of Federal Automated Information Resources.” 28 November 2000.
Presidential Decision Directive (PDD) 63, “Critical Infrastructure Protection.” 22 May
1998.
PDD 67, “Enduring Constitutional Government and Continuity of Government
Operations.” 21 October 1998.
Department of Defense (DoD) Directive 8500.01E, “Information Assurance (IA).” 24
October 2002. Certified current as of 23 April 2007.
DoD Instruction 8500.2, "Information Assurance (IA) Implementation." 6 February
2003.
DoD Instruction 8510.01, “DoD Information Assurance Certification and Accreditation
Process (DIACAP).” 28 November 2007.
National Institute of Standards and Technology (NIST) Special Publication 800-34,
“Contingency Planning Guide for Federal Information Systems.” Revision 1. May 2010.
NIST Special Publication 800-53, “Recommended Security Controls for Federal
Information Systems and Organizations.” Revision 3. August 2009.
Any other applicable departmental policies should be added.
3
UNCLASSIFIED
SPAWAR/SSAW Program Office Contingency and Business Continuity Plan
Artifact 3
April 2013
2 CONCEPT OF OPERATIONS
2.1
System Descriptions and Architecture
Provide a general description of the system architecture and functionality. Indicate the operating environment,
physical location(s) of primary and alternate sites (to include full address), general location(s) of users, and
partnerships with external organizations/systems. Include information regarding any other technical considerations
that are important for recovery purposes, such as backup procedures. Reference the diagram of the information
system (IS) architecture, including security controls and telecommunications connections from Artifact 1h, C&A
Boundary Diagram. Ensure that the section and paragraph is identified.
The purpose and mission of the SSAW system is to provide AFMS leadership with leading-edge
tools that improve health outcomes, make care more efficient, and reduce risks via situationalbased information from medical and environmental sensors. By employing analytics based off
of expert research and proven algorithms, situational awareness (SA) tools are able to take
advantage of pre-defined triggers and user-defined tools that automatically do the analysis and
delivery for them, with limited errors. SSAW will be utilized, but not limited to, the following
scenarios:


Monitoring Health of First Responders and Casualties – First responders work in extreme
conditions and face many potential hazards.
Pandemic Influenza – Influenza pandemics occur when there is notable genetic change in
the circulating strain of influenza. Bioenvironmental engineers equipped with bio-sensor
backpacks and the proper assays can test for various biological events.
The systems offers a common architecture compatibility to support disparate technologies to
provide real-time, on-scene, actionable sensor data, combined with an integrated analytics
engine, to better serve our war-fighters by providing SA. Data is currently stored in multiple
disconnected repositories, or contained within hundreds of stand-alone systems or
medical/sensor devices. Even when data is brought together physically and logically it still
remains virtually useless to the end user. In this state users must individually combine the right
data elements and analyze them based on a limited knowledge set and interpret them hoping for
the right results. This is both time consuming and laden with errors due to a multitude of factors.
The concepts of the medical and environmental SA tools are to: acquire all of the sensor data
along with other global information sources (AHLTA, ASIMS, CHCS, etc.); format the data to
make it interoperable with millions of other external data layers; process it with advanced
analytics; and disseminate it in the form of knowledge and decision support information at the
point of care, research, and command. With that concept in mind the SSAW architecture is
composed of three distinct components; the Sensor Integration Platform (SIP), the Situational
Awareness Data Analytics (SADA) tool, and the Situational Awareness Data Portal (SADP).
SA is a key part of any decision making process and entails understanding the current
environment and being able to accurately anticipate future problems to enable effective action.
The SSAW system capabilities include the ability to:

Provide configurable health and environmental threat surveillance system prototypes
4
UNCLASSIFIED
SPAWAR/SSAW Program Office Contingency and Business Continuity Plan
Artifact 3
April 2013






Provide environmental health monitoring and field diagnostic situational awareness
Provide analytics and decision support capabilities for in-garrison, en-route and
expeditionary medical mission requirements
Facilitate the transition of sensor data integration and decision analytics delivery platform
into an ongoing force health protection sensor development
Demonstrate environmental health impact, health hazard predictive modeling capability
Demonstrate node-to-node, bio-analytics, predictive algorithm, data aggregation, fusion,
visualization, and communications capability
Demonstrate an assessment, field test and evaluation validation
In addition the SSAW system must also meet:
 DIACAP standards, Health Information Portability and Accountability Act (HIPAA), and
Privacy Act requirements, and other sensitive data protections as required by AFMS,
USAF, and DoD entities/agencies.
 Current Defense Information Systems Agency security requirements.
SSAW Accreditation Boundary Diagram
Client Workstations
4
Compute Server
SADP
5
443
6
Data Server
SADA
RepDB-1
RepDB-2
3
Master DB
???
Backup DB
2
3306
1
Cell Transmission Device
SIP
Mote Transmission Device
HSDW
Sensors (LifeGuard, RiskWatch, BioSS)
Sensors (LifeGuard, RiskWatch, BioSS)
Figure 2-10: SSAW Accreditation Boundary Diagram
All devices within the IS are represented within the Boundary Diagram Description; list
connections as in example table.
5
UNCLASSIFIED
SPAWAR/SSAW Program Office Contingency and Business Continuity Plan
Artifact 3
April 2013
Label
SOURCE
SERVICE
DESTINATION
PORT
PURPOSE
1
Transmission
Device
ZigBee
Master DB
3306
Data collected by sensor transmitted via
Mote to SSAW database.
2
Master DB
TCP/IP
Backup DB
33306
Master database is backed up to the
Backup DB server.
3
SSAW
Oracle
Data
HSDW
1521
Access initiated by SSAW to obtain
required data fields from HSDW.
443
Client request access to “System” web
server / application access via SA data
portal.
4
Clients
SSL
Compute Server
5
6
Table 1 Internal / External System Port Connections
2.1.1 Mission Assurance Category and Confidentiality Level
For contingency planning purposes, this section identifies the Mission Assurance Category (MAC) and
confidentiality level for the IS. MAC and confidentiality level are described in DoD Instruction 8500.2,
“Information Assurance (IA) Implementation.” MAC include MAC I, II, and III.
This section also includes a discussion of the confidentiality level of data processed by this IS. Confidentiality levels
include classified, sensitive, and public. A brief description of how the MAC/confidentiality level was determined
should be included. Also discuss what type of data the IS receives, processes, transmits, stores, and/or displays?
(e.g., Privacy, Protected Health Information PHI, Personally Identifiable Information PII, etc.)
SSAW is assigned the Mission Assurance Category (MAC) Level III with a Confidentiality
Level (CL) of “Sensitive”; the server cluster component of the system will be staged in an
enclave environment.MAC III classified information systems are administrative in nature and
deemed necessary to conduct day-to-day business, but does not materially affect support to
deployed or contingency forces in the short term. Although the system may be utilized in
peacetime and deployed environments it is not deemed as critical in nature. In the absence of
SSAW functionality; operational capability, without the system, would continue.
2.2
Line of Succession
The SSAW PO and SPAWAR management identifies an order of succession, in coordination
with management to ensure that decision-making authority for this CBCP is uninterrupted. The
provide the title is responsible for ensuring the safety of personnel and the execution of
procedures documented within this CBCP. If the provide the title is unable to function as the
overall authority or chooses to delegate this responsibility to a successor, the provide the title of
the alternate shall function as that authority.
6
UNCLASSIFIED
SPAWAR/SSAW Program Office Contingency and Business Continuity Plan
Artifact 3
April 2013
Continue description of succession as applicable.
2.3
Responsibilities
EXAMPLE TEXT: The following teams have been developed and trained to respond to a
contingency event affecting the IS.
The CBCP establishes several teams assigned to participate in recovering operations. The Team
Name is responsible for recovery of the computer environment and all applications. Members of
this team include personnel who are also responsible for the daily operations and maintenance.
The Team Leader Title directs the Team Name.
Continue to describe each team, their responsibilities, leadership, and coordination with other
applicable teams during a recovery operation.
EXAMPLE TEXT: The relationships of the team leaders involved in IS recovery and their
member teams are illustrated in Figure X-Y below.
Insert hierarchical diagram of teams. Show team names and leaders; do not include actual
names of personnel.
Figure 2-1: Hierarchical Diagram
Describe each team separately, highlighting overall recovery goals and specific responsibilities.
Do not detail the procedures that will be used to execute these responsibilities. These
procedures will be itemized in the appropriate phase sections.
2.4
Threats
When developing strategies for a CBCP, it is helpful to consider the entire range of probable
and possible threats that present a risk to an organization. From that range of threats, likely
scenarios can be developed and appropriate strategies applied. A disaster recovery plan should
be designed to be flexible enough to respond to extended business interruptions, as well as major
disasters.
EXAMPLE TEXT: The best way to achieve this goal is to design a CBCP that could be used to
address a major disaster, but is divided into sections that can be used to address extended
business interruptions. While each of the identified threats could result in a disaster by itself, in
the case of a major disaster, several of the threats might be present concurrently or occur
sequentially, depending on the circumstances.
As a result, it is advisable to develop several levels of strategies that can be applied as needed.
For example, a localized fire in the computing center may render some of that space unusable.
An appropriate strategy for that event may be temporary relocation of personnel to another office
within Site/PO Name Abbreviation headquarters or in suitable local office space in another office
building or hotel. An event that required temporary evacuation of the computer center, such as a
truck accident in the tunnel and a chemical spill that may require several days to resolve, may
7
UNCLASSIFIED
SPAWAR/SSAW Program Office Contingency and Business Continuity Plan
Artifact 3
April 2013
necessitate switchover capabilities and possible regional mirrored redundancy capabilities that
would be transparent to the users. An event of greater magnitude, such as an explosion, may
render the Site/PO Name Abbreviation unusable for an extended duration of time and might
necessitate a strategy based on mirrored redundancy as well as a secondary strategy involving a
commercial “hot site.” Time sensitivity and mission criticality in conjunction with budgetary
limitations, level of threat and degree of risk will be major factors in the development of
recommended strategies.
2.4.1 Probable Threats
EXAMPLE TEXT: The table depicts the threats most likely to impact the Site/PO Name
Abbreviation and components of Site/PO Name Abbreviation and their management. The
specific threats that are represented by (X) are considered the most likely to occur within the
Site/PO Name Abbreviation environment. Sites should adjust accordingly.
Site/PO Name Abbreviation Risk Analysis Matrix
Probability of Occurrence:
High
Medium
Air Conditioning Failure
Low
X
Aircraft Accident
X
Blackmail
X
Bomb Threats
X
Chemical Spills/HazMat
X
Cold/Frost/Snow
X
Communications Loss
X
Data Destruction
X
Earthquakes
X
Fire
X
Flooding/Water Damage
X
Nuclear Mishaps
Power Loss/Outage
X
X
Sabotage/Terrorism
X
Storms/Hurricanes
X
Vandalism/Rioting
X
Table 2-1: Site/PO Name Abbreviation Risk Analysis Matrix
8
UNCLASSIFIED
SPAWAR/SSAW Program Office Contingency and Business Continuity Plan
Artifact 3
April 2013
3 NOTIFICATION AND ACTIVATION PHASE
EXAMPLE TEXT: This phase addresses the initial actions taken to detect and assess damage
inflicted by a disruption to the IS. Based on the assessment of the event, the plan may be
activated by the Contingency Planning Coordinator.
NOTE: In an emergency, the top priority is to preserve the health and safety of its staff
before proceeding to the Notification and Activation procedures.
Contact information for key personnel is located in Appendix B, Personnel Contact List. The
notification sequence is listed below:



The first responder is to notify the Contingency Planning Coordinator. All known
information must be relayed to the Contingency Planning Coordinator.
The Contingency Planning Coordinator will notify the systems manager and the Damage
Assessment Team Leader and inform them of the event. The Damage Assessment Team
Leader is to begin assessment procedures.
The Damage Assessment Team Leader is to notify team members and direct them to
complete the assessment procedures outlined below to determine the extent of damage
and estimated recovery time. If damage assessment cannot be performed locally because
of unsafe conditions, the Damage Assessment Team is to follow the Alternate
Assessment Procedures outline below.
Damage Assessment Procedures:
Detailed procedures should be outlined to include activities to determine the cause of the
disruption; potential for additional disruption or damage; affected physical area and status of
physical infrastructure; status of information technology (IT) equipment functionality and
inventory, including items that will need to be replaced; and estimated time to repair services to
normal operations.


Upon notification from the Contingency Planning Coordinator, the Damage Assessment
Team Leader is to describe details here (Call Team, etc.)
The Damage Assessment Team is to provide checklist items here
Alternate Assessment Procedures:


Upon notification, the Contingency Planning Coordinator will notify the systems
manager and the Damage Assessment Team Leader who will provide procedures here
The Damage Assessment Team is to provide procedures here
o When damage assessment has been completed, the Damage Assessment Team
Leader is to notify the system manager who will notify the Contingency Planning
Coordinator of the results.
9
UNCLASSIFIED
SPAWAR/SSAW Program Office Contingency and Business Continuity Plan
Artifact 3
April 2013
o The Contingency Planning Coordinator is to evaluate the results and determine
whether the CBCP is to be activated and if relocation is required.
o Based on assessment results, the Contingency Planning Coordinator is to notify
civil emergency personnel (e.g., police, fire) as appropriate.
The CBCP is to be activated if one or more of the following criteria are met:
1. IS will be unavailable for more than maximum tolerable downtime
2. Facility is damaged and will be unavailable for more than maximum tolerable
downtime
3. Request/receive approval from senior management to implement the CBCP.
4. Other criteria, as appropriate.





If the plan is to be activated, the Contingency Planning Coordinator is to notify the
system manager and all Team Leaders and inform them of the details of the event and if
relocation is required.
Upon notification from the Contingency Planning Coordinator, Team Leaders will notify
their respective teams. Team members are to be informed of all applicable information
and prepared to respond and relocate if necessary.
The Contingency Planning Coordinator is to notify remaining personnel (via notification
procedures) on the general status of the incident.
The Contingency Planning Coordinator is to notify the off-site storage facility that a
contingency event has been declared and to ship the necessary materials to the alternate
site.
The Contingency Planning Coordinator is to notify the Alternate site that a contingency
event has been declared and to prepare the facility for the organization’s arrival.
10
UNCLASSIFIED
SPAWAR/SSAW Program Office Contingency and Business Continuity Plan
Artifact 3
April 2013
4 RECOVERY OPERATIONS
EXAMPLE TEXT: This section provides procedures for recovering the IS at the alternate site,
whereas other efforts are directed to repair damage to the original system and capabilities.
The following procedures are for recovering the IS at the alternate site. Procedures are outlined
per team required. Each procedure should be executed in the sequence it is presented to maintain
efficient operations.
Recovery Goal. State the first recovery objective as determined by the Business Impact Analysis
(BIA), Appendix F. For each team responsible for executing a function to meet this objective,
state the team names and list their respective procedures.
Team Name

Team Recovery Procedures
Team Name

Team Recovery Procedures
Team Name

Team Recovery Procedures
Recovery Goal. State the second recovery objective as determined by the BIA. For each team
responsible for executing a function to meet this objective, state the team names and list their
respective procedures.
Team Name

Team Recovery Procedures
Team Name

Team Recovery Procedures
Team Name

Team Recovery Procedures
Recovery Goal. State the remaining recovery objectives (as determined by the BIA). For each
team responsible for executing a function to meet this objective, state the team names and list
their respective procedures.
Team Name

Team Recovery Procedures
Team Name

Team Recovery Procedures
Team Name

Team Recovery Procedures
11
UNCLASSIFIED
SPAWAR/SSAW Program Office Contingency and Business Continuity Plan
Artifact 3
April 2013
5 RETURN TO NORMAL OPERATIONS
EXAMPLE TEXT: This section discusses activities necessary for restoring IS operations at the
Site/PO Name Site PO Name SSAW original or new site. When the computer center at the
original or new site has been restored, IS operations at the alternate site must be transitioned
back. The goal is to provide a seamless transition of operations from the alternate site to the
operating facility.
Original or New Site Restoration
Procedures should be outlined, per necessary team, to restore or replace the original site so that
normal operations may be transferred. IT equipment and telecommunications connections
should be tested.
Team Name

Team Resumption Procedures
Team Name

5.1
Team Resumption Procedures
Concurrent Processing
Procedures should be outlined to operate the system in coordination with the system at the
original or new site. These procedures should include testing the original or new system until it
is functioning properly and the contingency system is shut down gracefully.
Team Name

Team Resumption Procedures
Team Name

5.2
Team Resumption Procedures
Plan Deactivation
Procedures should be outlined to clean the alternate site of any equipment or other materials
belonging to the organization, with a focus on handling sensitive information. Materials,
equipment, and backup media should be properly packaged, labeled, and shipped to the
appropriate location(s). Team members should be instructed to return to the original or new
site.
Team Name

Team Testing Procedures
Team Name

Team Testing Procedures
12
UNCLASSIFIED
SPAWAR/SSAW Program Office Contingency and Business Continuity Plan
Artifact 3
April 2013
APPENDIX A
SSAW LIST
SSAWs used specifically in this Artifact are to be listed in this appendix.
SSAW
TERM
AFMS
Air Force Medical Service
BCP
Business Continuity Plan
BIA
Business Impact Assessment
BRP
Business Recovery/Resumption Plan
C&A
Certification and Accreditation
CBCP
Contingency and Business Continuity Plan
COOP
Continuity of Operations Plan
CPU
Central Processing Unit
DIACAP
Department of Defense (DoD) Information Assurance
Certification and Accreditation Process
DoD
Department of Defense
DRP
Disaster Recovery Plan
HVAC
Heating, Ventilation, And Air Conditioning
IA
Information Assurance
IAM
Information Assurance Manager
IS
Information System
IT
Information Technology
MAC
Mission Assurance Category
MOA
Memorandum of Agreement
NIST
National Institute of Standards and Technology
OMB
Office of Management and Budget
OS
Operating System
PDD
Presidential Decision Directive
PHI
Protected Health Information
PII
Personally Identifiable Information
PO
Program Office
13
UNCLASSIFIED
SPAWAR/SSAW Program Office Contingency and Business Continuity Plan
Artifact 3
April 2013
SSAW
TERM
POC
Point of Contact
SI
Sensitive Information
SLA
Service Level Agreement
UPS
Uninterruptible Power Supply
14
UNCLASSIFIED
SPAWAR/SSAW Program Office Contingency and Business Continuity Plan
Artifact 3
April 2013
CONTINGENCY AND BUSINESS CONTINUITY PLAN
APPENDIX B - I
The following appendices should be included based on system and plan requirements.
Appendix B - Personnel Contact List
Appendix C - Vendor/Customer Contact List
Appendix D - Equipment and Specifications
Appendix E - Contracts and/or Agreements
Appendix F - Business Impact Analysis
Appendix G - Contingency Log
15
UNCLASSIFIED
Site/Program Office Information System (IS) Name Contingency and Business Continuity Plan
Artifact 3
Month YYYY
APPENDIX B
PERSONNEL CONTACT LIST
IS Name SSAW Personnel Contact List
Title
Point of Contact
(POC)
Phone No. (s)
Work (W):
Mobile (M):
E-mail (s)
Work (W):
Alternate (A):
Contingency Plan
Coordinator
Name
W:
M:
W:
A:
Contingency Plan
Coordinator Alternate
Name
W:
M:
W:
A:
System Manager
Name
W:
M:
W:
A:
System Manager
Alternate
Name
W:
M:
W:
A:
Damage Assessment
Team Lead
Name
W:
M:
W:
A:
Damage Assessment
Team Lead Alternate
Name
W:
M:
W:
A:
Data Owner
Name
W:
M:
W:
A:
Team Members Team
Name
Name
W:
M:
W:
A:
Team Members Team
Name
Name
W:
M:
W:
A:
Team Members Team
Name
Name
W:
M:
W:
A:
Table B-1: Personnel Contact List
16
UNCLASSIFIED
Site/Program Office Information System (IS) Name Contingency and Business Continuity Plan
Artifact 3
Month YYYY
APPENDIX C
VENDOR/CUSTOMER CONTACT LIST
IS Name SSAW Vendor/Customer Contact List
Title
Point of Contact (POC)
Phone No. (s)
Work (W):
Mobile (M):
E-mail (s)
Work (W):
Alternate (A):
Vendor Name and
Address
Name
W:
M:
W:
A:
Vendor Name and
Address
Name
W:
M:
W:
A:
Vendor Name and
Address
Name
W:
M:
W:
A:
Vendor Name and
Address
Name
W:
M:
W:
A:
Customer Name
and Address
Name
W:
M:
W:
A:
Customer Name
and Address
Name
W:
M:
W:
A:
Customer Name
and Address
Name
W:
M:
W:
A:
Customer Name
and Address
Name
W:
M:
W:
A:
Customer Name
and Address
Name
W:
M:
W:
A:
Table C-1: Vendor/Customer Contact List
17
UNCLASSIFIED
Site/Program Office Information System (IS) Name Contingency and Business Continuity Plan
Artifact 3
Month YYYY
APPENDIX D
EQUIPMENT AND SPECIFICATIONS
Critical Resource(s) Server Configuration
Model
Compaq ProLiant ML370
Compaq ProLiant 1600r 500
Central Processing Unit
P3\1133
Memory
1GB SDRAM
384 MB RAM
Disk Storage
4 x 36 GB SCSI drives
3 x 18.2 GB SCSI drives
Tape Storage
Compaq Internal 40/80 GB DLT drive
Network Interface Card
Compaq NC3134 Fast Ethernet 64-bit PCI Dual Base 10\100
System Console
PC Anywhere
Other Hardware
PS/2 mouse and 104-key3.5” FDD
APC Smart-UPS 1500 and 1400
Model
Dell PowerEdge 4400
Central Processing Unit
Memory
512 MB RAM
Disk Storage
4 x 18 GB drives
Tape Storage
Compaq Internal 40/80 GB DLT drive
Network Interface Card
10\100 Ethernet
System Console
PC Anywhere
Other Hardware
PS/2 mouse and 104-key
3.5″ FDD
APC Smart-UPS 1500 and 1400
Table D-1: Equipment and Specifications
18
UNCLASSIFIED
Site/Program Office Information System (IS) Name Contingency and Business Continuity Plan
Artifact 3
Month YYYY
Critical Resource(s) Workstation/Laptop/Thin Client Configuration
Model
Dell Optiplex
Dell Optiplex GX50
Central Processing Unit
Pentium III 733 MHZ
Celeron 900 MHZ
Memory
128 MB
Disk Support
10 GB
Monitor
17″
Other Devices
Keyboard, mouse, CD-ROM
Network Interface Card
10/100 Ethernet
Model
300XL
CPU
266 MHZ
Memory
32-64 MB
Disk Support
4 GB
Monitor
17″
Other Devices
Keyboard, mouse, CD-ROM
Network Interface Card
10/100 Ethernet
Table D-2: Critical Resources Workstation/Laptop/Thin Client
19
UNCLASSIFIED
Site/Program Office Information System (IS) Name Contingency and Business Continuity Plan
Artifact 3
Month YYYY
Critical Network Device(s) Configurations
Model
Cisco 1900 Ethernet Switch
Central Processing Unit
Catalyst 1900 (486sxl) processor with 2048K/1024K bytes of memory
Ports
27 Fixed Ethernet/IEEE 802.3
IOS
Cisco Catalyst 1900/2820 Enterprise Edition Software Version V9.00.05
Model
Cisco 2912-XL Ethernet Switch
Central Processing Unit
WS-C2912-XL (PowerPC403GA) processor (revision 0x11) with
8192K/1024 K bytes of memory
Ports
27 Fixed Ethernet/IEEE 802.3
IOS
Version 12.0(5.2) XU,
MAINTENANCE INTERIM SOFTWARE
Other
Cluster Command and Member Compatibility
Model
Cisco 2950-XL Ethernet Switch
Central Processing Unit
WS-C2912-XL (PowerPC403GA) processor (revision 0x11) with
8192K/1024 K bytes of memory
Ports
24 FastEthernet/IEEE 802.3
IOS
Version 12.0(5.3) WC (1)
Other
Cluster Command and Member Compatibility
Model
Cisco 424 hub
Central Processing Unit
MPC860EN processor with 4096/1024K
Ports
24 10/100 Ethernet
Table D-3: Critical Network Devices
20
UNCLASSIFIED
Site/Program Office Information System (IS) Name Contingency and Business Continuity Plan
Artifact 3
Month YYYY
APPENDIX E
CONTRACTS AND/OR AGREEMENTS
List any Service Level Agreements (SLAs), Memorandum of Agreement, Maintenance and/or
support agreements that have been executed and all subsequent modifications should be
included, with accurate Points of Contact (POCs) and emergency contact information.
Reference these agreements.
21
UNCLASSIFIED
Site/Program Office Information System (IS) Name Contingency and Business Continuity Plan
Artifact 3
Month YYYY
APPENDIX F
BUSINESS IMPACT ANALYSIS
SAMPLE BUSINESS IMPACT ANALYSIS (BIA)
The following scenario represents a sample BIA. It is meant to present the process used to
determine the roles and resources necessary to restore interrupted business functions. It is not
all inclusive and must be adapted to individual situations.
ABC Site maintains a small field office with an IS that supports about XX users. The office
relies on the IS and its components for standard automated processes, such as developing and
using spreadsheets, word processing, and electronic mail (e-mail). The office also maintains a
customized database application that supports Inventory, a key resource management process.
The network manager is responsible for developing an IS contingency plan and begins with the
BIA. The IS includes the following components (list all components in the C&A Boundary):








Authentication/network operating system server
Database server (supports customized Inventory database application)
File server (stores general, non-Inventory files)
Application server (supports office automation software)
Networked printer
E-mail server and application
XX computers
XX hubs
The Contingency Planning Coordinator begins the BIA process by identifying the stakeholders.
In this case, the coordinator identifies and consults with the following individuals (make
applicable to your environment):







Facility manager
Inventory process manager
Sampling of IS users
Data owner
System Manager
Information Assurance Manager (IAM)
System administrators for each network server
Based on subsequent discussions, the coordinator learns the following information:

The Inventory system is required to support the parent agency’s master resource
management operations; the system provides updated data to the larger system at the end
of each business day. If the system were unavailable for more than maximum tolerable
downtime days/hour, significant business impacts would result at the parent agency.
Inventory requires a minimum of XX personnel with computers and access to the IS.
22
UNCLASSIFIED
Site/Program Office Information System (IS) Name Contingency and Business Continuity Plan
Artifact 3
Month YYYY





Other non-Inventory processes may be considered noncritical and could be allowed to
lapse for up to XX days.
The XX manager(s) indicate(s) that e-mail is an essential service; however, staff can
operate effectively without e-mail access for up to XX days.
Staff could function without access to the spreadsheet application for up to XX working
days without affecting business processes significantly.
Word processing access would need to be restored within XX working days; however,
individuals could use manual processes for up to XX days if the required forms were
available in hard-copy format.
Outputs from the day’s Inventory system records normally are printed daily; the data to
be printed may be stored on any computer used by the Inventory system staff. In an
emergency, the Inventory system output could be transmitted electronically via e-mail for
up to XX days before significantly affecting business operations. Other printing functions
would not be considered essential and could be unavailable for up to XX days with no
impact on business functions.
Based on the information gathered in discussions with stakeholders, the Contingency Planning
Coordinator follows the three-step BIA process to identify required IS resources, identify outage
impacts and allowable outage times, and develop recovery priorities.
Identify Required IT Resources
The manager identifies the following resources as required, meaning that they support business
processes:










Authentication/network operating system server (required for users to have IS access)
Database server
E-mail server and application
XX computers
One hub
Network cabling
Electric power
Heating, ventilation, and air conditioning (HVAC)
Physical security
Facility
Identify Outage Impacts and Allowable Outage Times
Next, the manager determines outage impacts and allowable outage times for the required
resources:
23
UNCLASSIFIED
Site/Program Office Information System (IS) Name Contingency and Business Continuity Plan
Artifact 3
Month YYYY
Resource Component
Outage Impact
Allowable Outage Time
Authentication server
Users could not access Inventory system
XX hours
Database server
Users could not access Inventory system
XX hours
E-mail server
Users could not send e-mail
XX days
XX computers
Users could not access Inventory system
XX hours
Hub
Users could not access Inventory system
XX hours
Network cabling
Users could not access Inventory system
XX hours
Electric power
Users could not access Inventory system
XX hours
Printer
Users could not produce Inventory reports
XX days
Table F-1: Outage Impacts and Allowable Outage Times
Develop Recovery Priorities
Using the table completed in the previous step, the Contingency Planning Coordinator develops
recovery priorities for the system resources. The manager uses a simple CAT I-, CAT II-, CAT
III-scale to prioritize the resources. CAT I priorities are based on the need to restore resources
within their allowable outage times; CAT II and CAT III priorities reflect the requirement to
restore full operational capabilities over a longer recovery period.
Critical Resources
Recovery Priority
Authentication server
CAT I
Database server
CAT I
XX computers
CAT I
XX hub
CAT I
Network cabling
CAT I
Electric power
CAT I
E-mail server
CAT II
Printer
CAT II
Remaining computers XX
CAT III
Remaining hubs XX
CAT III
Table F-2: Resource Recovery Priorities
Having completed the BIA, the Contingency Planning Coordinator may use the recovery priority
information above to develop strategies that enable all system resources to be recovered within
their respective allowable outage times and in a prioritized manner.
A template for completing the BIA is provided on the following page.
24
UNCLASSIFIED
Site/Program Office Information System (IS) Name Contingency and Business Continuity Plan
Artifact 3
Month YYYY
Upon completion of your analysis, you are now ready to begin the actual BIA.
Business Impact Analysis (BIA) Template
This sample template is designed to assist the user in performing a BIA on an IS. The BIA is an
essential step in developing the contingency plan. The template is meant only as a basic guide
and may not apply to all systems. The user may modify this template or the general BIA
approach as required to best accommodate the specific system.
Preliminary System Information
Site/Program Office Name:
Date BIA Completed:
IS Name:
BIA POC:
System/IS Manager Point of Contact (POC):
System Description: Discussion of the system purpose and architecture, append the IS diagram(s).
A. Identify System POCs
Role
Internal: Identify the positions or offices within your organization that depend on or support the system; also specify
their relationship to the system


External: Identify the positions or offices outside your organization that depend on or support the system; also
specify their relationship to the system


B. Identify System Resources Identify the specific hardware, software, and other resources that comprise
the system; include quantity and type
Hardware

Software

Other resources

25
UNCLASSIFIED
Site/Program Office Information System (IS) Name Contingency and Business Continuity Plan
Artifact 3
Month YYYY
C. Identify critical roles, resources, outage impacts, and allowable outage times Identify and align roles,
resources, outage impact, and the maximum allowable downtime in the order of importance.
Critical Roles
List the roles identified in
Section A that are deemed
critical to the resource
Resource
Outage Impact
Identify the IS resources
needed to accomplish the
critical roles
Identify the impact of the
outage (e.g., communications,
customer access)
Maximum Allowable
Downtime
Identify the maximum
acceptable period that the
resource could be
unavailable before
unacceptable impacts
resulted
D. Prioritize resource recovery List the priority associated with recovering a specific resource, based on the outage
impacts and allowable outage times provided in Section C. Use qualitative scale (e.g., CAT I/CAT II/CAT III)
Resource
Recovery Priority
26
UNCLASSIFIED
Site/Program Office Information System (IS) Name Contingency and Business Continuity Plan
Artifact 3
Month YYYY
APPENDIX G
CONTINGENCY LOG
This section should include the assessments and results of any exercise or real contingency
operations. It should be written from available documentation after recovery and restoration.
Include a comprehensive lessons learned page, documenting unanticipated difficulties, staff
participation, restoration of system backups, permanently lost data and equipment, and
shutdown of temporary equipment used for the resumption, recovery, and restoration.
27
UNCLASSIFIED
Download