Business Continuity & IT Disaster Recovery Planning Use Case Design
This topic explains the Business Continuity & IT Disaster Recovery Planning use case design.
On this page
Architecture Diagram
The following diagram shows the relationships between the applications in the Business Continuity & IT Disaster Recovery Planning use case.
Applications
Application |
Description |
---|---|
BC/DR Plans |
The BC/DR Plans application allows you to develop detailed business process recovery plans, IT disaster recovery plans, or crisis team response plans using an automated workflow for approval and testing. The BC/DR Plans application allows you to do the following:
|
Recovery Strategies |
The Recovery Strategies application functions as a repository where you can document recovery strategies that can be pulled into BC/DR plans and associated with supporting recovery tasks. There can be multiple recovery strategies per BC/DR plan depending on the type, location, and magnitude of the process, system, or facility being recovered, as well as the risks outlined in each plan. Through the Recovery Strategies application, you can:
|
Recovery Tasks |
The Recovery Tasks application functions as a repository where you can document recovery tasks that can then be associated with any recovery strategy and pulled onto BC/DR plans. Through the Recovery Tasks application, you can:
|
Requirements |
The Requirements application provides a location to document detailed requirements related to each BC/DR plan. For example, the application can include equipment, applications, facilities, and vital records related to each business process that might be required for the function to operate until it is recovered. Through the Requirements application, you can:
|
Roles and Responsibilities |
The Roles and Responsibilities application enables you to document key roles within the BCM program. These roles are then cross-referenced to recovery tasks. Users or groups are associated with the pertinent roles. This application uses roles instead of individuals because individuals may change positions frequently in an organization, whereas roles do not change as often. Through the Roles and Responsibilities application, you can:
|
Notifications and Call Trees |
The Notifications and Call Trees application enables you to manage notifications by using a call tree (a network of people organized in such a way that they can quickly and easily spread information amongst each other). Through the Notifications and Call Trees application, you can:
|
Testing/Exercise |
The Testing/Exercise application enables you to test Business Continuity, IT Disaster Recovery or Crisis Response plans. Through the results of these tests, you can evaluate the effectiveness of the associated plans and gain insight into areas of the process that need additional attention. Through the Testing/Exercise application, you can:
|
Activated Plans |
The Activated Plans application enables you to document BC/DR plans and the associated recovery strategies and tasks that have been activated as the result of a crisis event or a test scenario. By creating unique copies of the activated plans, you can track the completion of the recovery strategies and tasks. The Activated Plans application allows you to do the following:
|
BCM Risk Register |
The BCM Risk Register application enables you to identify and evaluate risks by documenting them and assessing the likelihood and impact of the risks to business operations. Based on these evaluations, you can associate the risks to any mitigation and add the necessary steps to BC/DR plans to react to the risks. The BCM Risk Register application allows you to do the following:
|
Applications |
The Applications application stores all software applications used by the organization to perform business operations. You can view how an application is used, the people that use it, and the devices on which the application is installed. You can also track the business impact, customer impact, and licensing details, and associate it with other aspects of the enterprise infrastructure. Note: The Applications application is included in the Enterprise Catalog package. |
Contacts |
The Contacts application serves as a central repository for contact information, is utilized across multiple areas of Archer, and contains information that is often leveraged by other use cases. Updates to a profile record within this application automatically propagate in any records with displayed contact information. Note: The Contacts application is included in the Enterprise Catalog package. |
Devices |
The Devices application serves as a central repository for knowledge, such as criticality, about IT devices and which applications they support. You can manage devices to ensure that they are protected according to management expectations. The application is also associated with other aspects of the enterprise infrastructure. Note: The Devices application is included in the Enterprise Catalog package. |
Facilities |
The Facilities application maintains a listing of all organizational facilities, such as data centers and branches. You can document and review all information associated with a specific facility, such as contact personnel, location information, and technologies associated with the location. Note: The Facilities application is included in the Enterprise Catalog package. |
Information Assets |
The Information Assets application allows you to manage a repository of information assets, such as credit card data, financial forecasts, employee Social Security numbers, and trademarks. Use this application to perform online assessments to determine information classification ratings and required retention periods. Link information assets to the business processes they support, the applications where they are managed, and the facilities where they are housed. Note: The Information Assets application is included in the Enterprise Catalog package. |
Products and Services |
The Products and Services application maintains all products and services provided within an organization. For example, a financial services firm provides a variety of products and services, such as banking, brokerage, and lending services. Note: The Products and Services application is included in the Enterprise Catalog package. |
Storage Devices |
The Storage Devices application serves as a central repository for storage devices used within the infrastructure. Note: The Storage Devices application is included in the Enterprise Catalog package. |
Technologies |
The Technologies application provides a searchable and extensible repository of technology version information that can be leveraged to relate devices of like technology. Devices can be identified and grouped using 1 of the 3 tiered hierarchical values lists detailed:
Users can filter technologies that have been company approved and view reports detailing known vulnerabilities threatening their technologies. Note: The Technologies application is included in the Enterprise Catalog package. |
Access Roles and Record Permissions
Access Role |
Description |
---|---|
BCM: Program Leader |
Provides the appropriate access levels within the use case to Program Leaders. |
BCM: Business Process Owner |
Provides the appropriate access levels within the use case to Business Process Owners. |
BCM: Program Team Member |
Provides the appropriate access levels within the use case to Program Team Member. |
BCM: Executive Management |
Provides the appropriate access levels within the use case to the executive team. |
BCM: Admin |
Serves as the administrator of the use case. This role has create, read, update, and delete access rights. |
Note: For detailed, page-level access rights, see the Data Dictionary.
Role |
Description |
---|---|
Executive Sponsor |
A Chief Executive Officer, a Chief Operations Officer, a Chief Financial Officer, an Executive Vice President , or Senior Vice President level, who might report into IT, Finance, or Operations. |
CIO / CSO |
Puts the DR team in place to ensure IT recovery is implemented across the enterprise. |
Steering Committee |
Made up of senior management from such groups as Finance, Human Resources, Operations, Security, and Legal. |
Business Resiliency Director / Manager |
Establishes the program under the direction of the steering committee. |
Disaster Recovery Manager |
Establishes the IT Disaster Recovery program with proper approaches, resources, and priorities. Helps IT managers implement and test DR plans for their areas of responsibility. |
Business Process Owner |
Holds the ultimate responsibility for the performance of a business process in realizing its objectives. Can implement measures and controls to make the process more resilient, ensure BC plans are in place and tested, and that they are able recover their process if it is disrupted. |
IT Manager |
Holds the ultimate responsibility for areas of the IT infrastructure. Also responsible to implement and test IT DR plans for those areas and ensure they coordinate with other dependencies, both IT and the business. |
BCM Team |
Establishes the BCM program with proper approaches, resources, and priorities. Helps business managers implement and test BC plans for their areas of responsibility. |
Dashboards
Dashboard |
Description |
---|---|
BR Task Driver |
The BR Task Driver dashboard contains quick links for frequent tasks and features metrics specific to the current user, such as BIAs pending my action, past due BCDR Plans, and active Incidents. |
BR Process Manager |
The BR Process Manager dashboard displays items relevant to Business Process Owners and Program leads. Charts are designed to help them determine how processes are functioning and identify gaps. The dashboard features metrics, such as expired BIAs and BCDR plans, BIA RTOs and RPOs, and the dependency mapping status by business unit. |
BR Management |
The BR Management dashboard provides critical information to help the management understand the resilience of business units. The dashboard uses interactive charts to display data, such as incidents by business unit, products and services by category, and BIAs by criticality rating. |