Iso Iec 27031 2025 1752042520
Iso Iec 27031 2025 1752042520
International
                                                                   Standard
                                                                   ISO/IEC 27031
Cybersecurity — Information                                        Second edition
and communication technology                                       2025-05
readiness for business continuity
Cybersécurité — Préparation des technologies de l'information et
de la communication pour la continuité d'activité
Reference number
ISO/IEC 27031:2025(en)                                             © ISO/IEC 2025
BS ISO/IEC 27031:2025
                                                  ISO/IEC 27031:2025(en)
                                                                   
                                                © ISO/IEC 2025 – All rights reserved
                                                                   ii
                                                                                                                                                                                                         BS ISO/IEC 27031:2025
                                                                                                ISO/IEC 27031:2025(en)
Contents Page
Foreword....................................................................................................................................................................................................................................................... v
Introduction............................................................................................................................................................................................................................................ vi
1                Scope.............................................................................................................................................................................................................................................. 1
2                Normative references.................................................................................................................................................................................................. 1
3                Terms and definitions................................................................................................................................................................................................. 1
4                Abbreviated terms.......................................................................................................................................................................................................... 3
5                Structure of this document.................................................................................................................................................................................... 3
                 5.1   General.........................................................................................................................................................................................................................3
6                Integration of IRBC into BCM............................................................................................................................................................................... 3
                 6.1   General.........................................................................................................................................................................................................................3
                 6.2   Enabling governance....................................................................................................................................................................................... 4
                 6.3   Business continuity management objectives............................................................................................................................ 5
                 6.4   Risk management and applicable controls for IRBC........................................................................................................... 6
                 6.5   Incident management and relationship to IRBC..................................................................................................................... 6
                 6.6   BCM strategies and alignment to IRBC........................................................................................................................................... 6
7                Business expectations for IRBC........................................................................................................................................................................ 7
                 7.1   Risk review.............................................................................................................................................................................................................. 7
                      7.1.1 General......................................................................................................................................................................................................7
                      7.1.2 Monitoring, detection and analysis of threats and events..........................................................................8
                 7.2   Inputs from business impact analysis............................................................................................................................................. 8
                      7.2.1 General......................................................................................................................................................................................................8
                      7.2.2 Understanding critical ICT services................................................................................................................................ 8
                      7.2.3 Assessing ICT readiness against business continuity requirements................................................9
                 7.3   Coverage and interfaces............................................................................................................................................................................... 9
                      7.3.1 General......................................................................................................................................................................................................9
                      7.3.2 ICT dependencies for the scope........................................................................................................................................10
                      7.3.3 Determine any contractual aspects of dependencies...................................................................................10
8                Defining prerequisites for IRBC.................................................................................................................................................................... 10
                 8.1   Incident based – preparation before incident........................................................................................................................10
                       8.1.1 General...................................................................................................................................................................................................10
                       8.1.2 ICT Recovery capabilities......................................................................................................................................................11
                       8.1.3 Establishing an IRBC..................................................................................................................................................................11
                       8.1.4 Setting objectives.........................................................................................................................................................................11
                       8.1.5 Determining possible outcomes and benefits of IRBC................................................................................ 12
                       8.1.6 Equipment redundancy planning.................................................................................................................................. 13
                       8.1.7 Determining the scope of ICT services related to the objectives...................................................... 13
                 8.2   Determining target ICT RTO and RPO.......................................................................................................................................... 14
9                Determining IRBC strategies............................................................................................................................................................................ 15
                 9.1   General..................................................................................................................................................................................................................... 15
                 9.2   IRBC strategy options................................................................................................................................................................................ 15
                      9.2.1 General.................................................................................................................................................................................................. 15
                      9.2.2 Skills and knowledge.................................................................................................................................................................16
                      9.2.3 Facilities................................................................................................................................................................................................16
                      9.2.4 Technology.......................................................................................................................................................................................... 17
                      9.2.5 Data........................................................................................................................................................................................................... 17
                      9.2.6 Processes..............................................................................................................................................................................................18
                      9.2.7 Suppliers...............................................................................................................................................................................................18
10               Determining the ICT continuity plan....................................................................................................................................................... 19
                 10.1 Prerequisites for the development of plans............................................................................................................................. 19
                      10.1.1 Determining and setting the recovery organization....................................................................................19
                      10.1.2 Determining time frames for plan development, reporting and testing.....................................19
                                                                                                                                  
                                                                                             © ISO/IEC 2025 – All rights reserved
                                                                                                                                iii
BS ISO/IEC 27031:2025
                                                                                            ISO/IEC 27031:2025(en)
                     10.1.3 Resources............................................................................................................................................................................................ 20
                     10.1.4 Competency of IRBC staff..................................................................................................................................................... 20
                     10.1.5 Technological solutions...........................................................................................................................................................21
                10.2 Recovery plan activation..........................................................................................................................................................................21
                     10.2.1 ICT BCP Activation.......................................................................................................................................................................21
                     10.2.2 Escalation.............................................................................................................................................................................................21
                10.3 ICT recovery plans........................................................................................................................................................................................ 22
                     10.3.1 RPO and RTO plans for ICT................................................................................................................................................. 22
                     10.3.2 Facilities............................................................................................................................................................................................... 22
                     10.3.3 Technology......................................................................................................................................................................................... 22
                     10.3.4 Data.......................................................................................................................................................................................................... 22
                     10.3.5 Response and recovery procedures............................................................................................................................ 23
                     10.3.6 People..................................................................................................................................................................................................... 23
                10.4 Temporary work around plans.......................................................................................................................................................... 23
                10.5 External contacts and procedures.................................................................................................................................................. 23
11              Testing, exercise, and auditing....................................................................................................................................................................... 23
                11.1 Performance criteria................................................................................................................................................................................... 23
                11.2 Testing dependencies..................................................................................................................................................................................24
                      11.2.1 Test and exercise...........................................................................................................................................................................24
                      11.2.2 Test and exercise program...................................................................................................................................................24
                      11.2.3 Scope of exercises........................................................................................................................................................................ 25
                      11.2.4 Planning an exercise................................................................................................................................................................. 25
                      11.2.5 Alert based and different recovery stages............................................................................................................ 26
                      11.2.6 Managing an exercise................................................................................................................................................................27
                11.3 Learning from tests...................................................................................................................................................................................... 28
                11.4 Auditing the IRBC........................................................................................................................................................................................... 28
                11.5 Control of documented information.............................................................................................................................................. 29
12              Final MBCO........................................................................................................................................................................................................................... 29
13              Top management responsibilities regarding evaluating the IRBC.......................................................................... 29
                13.1 General..................................................................................................................................................................................................................... 29
                13.2 Management responsibilities.............................................................................................................................................................. 29
Annex A (informative) Comparing RTO and RPO to business objectives for ICT recovery................................ 31
Annex B (informative) Risk reporting for FMEA............................................................................................................................................. 32
Bibliography.......................................................................................................................................................................................................................................... 33
                                                                                                                           
                                                                                         © ISO/IEC 2025 – All rights reserved
                                                                                                                          iv
                                                                                      BS ISO/IEC 27031:2025
                                         ISO/IEC 27031:2025(en)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical activity.
ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations,
governmental and non-governmental, in liaison with ISO and IEC, also take part in the work.
The procedures used to develop this document and those intended for its further maintenance are described
in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the different types
of document should be noted. This document was drafted in accordance with the editorial rules of the ISO/
IEC Directives, Part 2 (see www.iso.org/directives or www.iec.ch/members_experts/refdocs).
ISO and IEC draw attention to the possibility that the implementation of this document may involve the
use of (a) patent(s). ISO and IEC take no position concerning the evidence, validity or applicability of any
claimed patent rights in respect thereof. As of the date of publication of this document, ISO and IEC had not
received notice of (a) patent(s) which may be required to implement this document. However, implementers
are cautioned that this may not represent the latest information, which may be obtained from the patent
database available at www.iso.org/patents and https://patents.iec.ch. ISO and IEC shall not be held
responsible for identifying any or all such patent rights.
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and expressions
related to conformity assessment, as well as information about ISO's adherence to the World Trade
Organization (WTO) principles in the Technical Barriers to Trade (TBT) see www.iso.org/iso/foreword.html.
In the IEC, see www.iec.ch/understanding-standards.
This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, Information security, cybersecurity and privacy protection.
This second edition cancels and replaces the first edition (ISO/IEC 27031:2011), which has been technically
revised.
The main changes are as follows:
— the structure of the document has been changed;
— the scope has been changed for clarification;
— technical content has been added in 6.4, 6.5, 6.6, 9.2 and 10.1.5.
Any feedback or questions on this document should be directed to the user’s national standards
body. A complete listing of these bodies can be found at www.iso.org/members.html and
www.iec.ch/national-committees.
                                                         
                                        © ISO/IEC 2025 – All rights reserved
                                                         v
BS ISO/IEC 27031:2025
                                         ISO/IEC 27031:2025(en)
Introduction
Over the years, information and communication technology (ICT) has become an integral part of many of
the activities within the critical infrastructures in all organizational sectors, whether public or private. The
proliferation of the internet and other electronic networking services, as well as the capabilities of systems
and applications, has also resulted in organizations becoming more reliant on reliable, safe and secure ICT
infrastructures.
Meanwhile, the need for business continuity management (BCM), including incident preparedness, disaster
recovery planning, and emergency response and management, has been recognized and supported with
the development and endorsement of specific domains of knowledge, expertise, and standards, including
ISO 22313.
Failures of ICT services, including those caused by security issues such as systems intrusion and malware
infections, impact the continuity of business operations. Thus, managing ICT and related continuity, as well
as other security aspects, form a key part of business continuity requirements. Furthermore, in the majority
of cases, the critical processes and activities that require business continuity are usually dependent upon
ICT. This dependence means that disruptions to ICT can constitute strategic risks to the reputation of the
organization and its ability to operate.
The advent and increasing dominance of Internet-based ICT services (cloud ICT services) has caused the
nature of preparedness to change from relying on internal processes to a reliance on the quality and
robustness of services from other organizations and the associated business relationships with such
organizations.
ICT readiness is an essential component for many organizations in the implementation of business continuity
management and information security management.
As a result, effective BCM is frequently dependent upon effective ICT readiness to ensure that the
organization's objectives can continue to be met during disruptions. This is particularly important as the
consequences of disruptions to ICT often have the added complication of being invisible or difficult to detect.
For an organization to achieve ICT readiness for business continuity (IRBC), it should put in place a systematic
process to prevent, predict and manage ICT disruptions and incidents which have the potential to disrupt
ICT services. This can be achieved by coordinating IRBC with the information security and BCM processes.
In this way, IRBC supports BCM by ensuring that the ICT services can be recovered to pre-determined levels
within timescales required and agreed by the organization.
If an organization is using relevant information security and business continuity standards, the
establishment of IRBC should preferably take into consideration existing or intended processes linked to
these standards. This linkage can support the establishment of IRBC and also avoid any dual processes for
the organization.
This document describes the concepts and principles of ICT readiness for business continuity (IRBC)
and provides a framework of methods and processes to identify and specify aspects for improving an
organization's ICT readiness to ensure business continuity.
This document complements the information security controls relating to business continuity in
ISO/IEC 27002. It also supports the information security risk management process specified in
ISO/IEC 27005.
Based upon ICT readiness objectives, this document also extends the practices of information security
incident management into ICT readiness planning, training and operation.
                                                         
                                        © ISO/IEC 2025 – All rights reserved
                                                        vi
                                                                                     BS ISO/IEC 27031:2025
International Standard                                                            ISO/IEC 27031:2025(en)
1 Scope
This document describes the concepts and principles of information and communication technology (ICT)
readiness for business continuity (IRBC). It provides a framework of methods and processes to identify and
specify aspects for improving an organization's ICT readiness to ensure business continuity.
This document serves the following business continuity objectives for ICT:
— minimum business continuity objective (MBCO),
— recovery point objective (RPO),
— recovery time objective (RTO) as part of the ICT business continuity planning.
This document is applicable to all types and sizes of organizations.
This document describes how ICT departments plan and prepare to contribute to the resilience objectives of
the organization.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content constitutes
requirements of this document. For dated references, only the edition cited applies. For undated references,
the latest edition of the referenced document (including any amendments) applies.
ISO/IEC 27000, Information technology — Security techniques — Information security management systems —
Overview and vocabulary
ISO/IEC 27002, Information security, cybersecurity and privacy protection — Information security controls
ISO/IEC 27005, Information security, cybersecurity and privacy protection — Guidance on managing
information security risks
ISO/IEC 27035-1:2023, Information technology — Information security incident management — Part 1:
Principles and process
ISO 22300, Security and resilience — Vocabulary
ISO 22301, Security and resilience — Business continuity management systems — Requirements
                                                        
                                       © ISO/IEC 2025 – All rights reserved
                                                        1
BS ISO/IEC 27031:2025
                                            ISO/IEC 27031:2025(en)
3.1
failure mode
manner by which a failure is observed
Note 1 to entry: This generally describes the way failure occurs and its impact on the operation of the system.
3.2
information and communication technology disaster recovery
ability of the information and communication technology elements of an organization to support its critical
processes and activities to an acceptable level within a predetermined period of time following a disruption
3.3
information and communication technology readiness
state of an information and communication technology (ICT) function in which it has the knowledge, skills,
processes, architecture, infrastructure and the related technologies in preparation for a potential event that
would lead to either an intolerable disruption of ICT or an intolerable data loss
Note 1 to entry: This does not mean that the ICT function is all knowing and able to do everything, but rather it is fit
for purpose and in readiness for the preparation, the response and the recovery at hand, if such a contingency occurs.
3.4
minimum business continuity objective
MBCO
minimum level of services and/or products that is acceptable to the organization to achieve its business
objectives during a disruption
3.5
recovery point objective
RPO
point to which information used by an activity is restored to enable the activity to operate on resumption
Note 1 to entry: Can also be referred to as “maximum data loss”.
3.6
recovery time objective
RTO
period of time following an incident within which a product and service or an activity is resumed, or
resources are recovered
3.7
restoration
level of recovery of data, ICT systems and business operations to the normal state after a disruption with a
minimal loss, if any
3.8
trigger
event that causes the system to initiate a response
Note 1 to entry: Also known as triggering event.
                                                           
                                          © ISO/IEC 2025 – All rights reserved
                                                           2
                                                                                    BS ISO/IEC 27031:2025
                                         ISO/IEC 27031:2025(en)
4 Abbreviated terms
5.1 General
The intention of each clause of this document is as follows:
— Clause 6 explains how IRBC is linked to BCM and other organizational processes that are related to IRBC;
— Clause 7 explains how the business continuity for the organization sets objectives that IRBC should try
  to meet;
— Clause 8 provides guidance on what is needed to define the ICT current characteristics that affect the IRBC;
— Clause 9 provides guidance on different strategies that can be used and should be determined for IRBC
  pending the objectives and current characteristics of ICT that ICT continuity plans should follow;
— Clause 10 provides guidance on how to design ICT continuity plans based on determined strategies and
  how to address different types of adverse situations to meet the continuity objectives for ICT;
— Clause 11 provides guidance on how to test and finalize the ICT continuity plans;
— Clause 12 provides guidance on how to establish final RPOs and RTOs based on the ICT continuity plans
  and determine the ability to meet the business requirements;
— Clause 13 provides guidance on the feedback of IRBC to top management to approve the plans or risk
  treatment decisions, if the business objectives have not been met.
Specific planning and verifications of ICT are instrumental to build and ensure that ICT can face events.
Without such readiness, the organization would suffer intolerable disruptions of prioritised activities or
data losses.
Such events, potentially coming from technical failures or cybersecurity incidents, should motivate the ICT
function to interface its governance, planning and operation with requirements coming from the decision-
making activity of business continuity management and information security management.
6.1 General
Disruption related risk within information security and ICT primarily relates to availability when an adverse
situation occurs that disrupts the availability of ICT services to business activities.
                                                        
                                       © ISO/IEC 2025 – All rights reserved
                                                        3
BS ISO/IEC 27031:2025
                                        ISO/IEC 27031:2025(en)
The related risks have the characteristics of very low likelihood, meaning that they can happen very rarely or
even never, but have a huge consequence and business impact if they occur. It should be noted that business
continuity is the activity that should minimize the consequences if such risks do occur, as in most cases the
likelihood for such risks can never be fully eliminated.
Determination of risk to business process can evolve from the risk management process and the controls to
mitigate them to support business continuity.
Prioritized activities are identified through business impact analysis (BIA) on the business processes and
functions where the ICT dependencies can be determined, and critical time frames are set.
The actual events or risk scenarios on how the ICT services are interrupted can be hard for businesses to
determine and are generally on a high level based on different threats. Such threats and sources can include:
— environmental sources – fire, flooding, etc.;
— technical hardware, software failures or power and air conditioning (e.g. HVAC) shortages or breakdowns;
— unintentional human risk source – mistakes in change management, wrongly configured back up, etc;
— intentional human risk source – hacking, malware, sabotage;
— societal – pandemic, strikes, social unrest, etc;
— cyberattacks – DOS, DDOS;
— specific to the ICT-supply chain:
    — perturbation on the communication channel with a data/service provider;
    — disruption of a cloud service provider;
    — unclear information security requirements within contract terms covering ICT services provided by
      external parties.
These threats or events can significantly disrupt the ICT services and trigger business continuity strategies,
resulting in the following:
— loss of critical ICT hardware and software;
— loss of critical ICT service;
— loss of facilities;
— loss of critical ICT service from supplier;
— loss of key personnel.
The above scenarios should be considered in the business continuity planning for ICT if they are relevant to
the ICT provided to the business. Overall strategies should be determined and BCP developed and tested to
determine residual risks to be handled in the risk management process. Vulnerabilities or other weaknesses
that cause severe disruption to the ICT can be determined through risk management. It is through risk
assessment and risk treatment that risks can be mitigated. However, this mitigation does not eliminate the
need for IRBC to be in place, as there is always a risk that something unforeseen will happen.
                                                        
                                       © ISO/IEC 2025 – All rights reserved
                                                        4
                                                                                       BS ISO/IEC 27031:2025
                                          ISO/IEC 27031:2025(en)
                                                         
                                        © ISO/IEC 2025 – All rights reserved
                                                         5
BS ISO/IEC 27031:2025
                                         ISO/IEC 27031:2025(en)
                                                         
                                        © ISO/IEC 2025 – All rights reserved
                                                         6
                                                                                    BS ISO/IEC 27031:2025
                                          ISO/IEC 27031:2025(en)
7.1.1 General
The information security risk management process is explained in greater detail in ISO/IEC 27005, which is
also aligned with the guidelines for risk management given in ISO 31000.
ICT business continuity supports incident handling when a major incident affecting ICT has occurred. The
IRBC modifies information security risks related to availability with a low likelihood, but with significant
consequences.
The IRBC strategies should be resilient and adaptable, any change to the ICT services which can affect the
IRBC capability should be implemented only after the business continuity implications of the change have
been assessed, addressed and approved.
To ensure that the IRBC strategies and plans remain appropriate for the organization:
a)   top management should ensure that the IRBC strategies continue to support the organization's BCM
     requirements (see 13.2);
b) the change management process should include all parties responsible for the IRBC strategies, both in
   their planning and implementation;
c)   the development process for new ICT services should include a sign-off that IRBC resilience has not been
     compromised by even the simplest of upgrades or improvements;
d) due diligence on merger and acquisition activity; and
e)   IRBC should consider any ICT component decommissioning.
The organization should establish a process to monitor and detect the emergence of ICT security threats
including, but not limited to, the following areas:
f)   retention of staff, skills and knowledge;
                                                         
                                        © ISO/IEC 2025 – All rights reserved
                                                         7
BS ISO/IEC 27031:2025
                                          ISO/IEC 27031:2025(en)
g) management of facilities that house ICT equipment (e.g. by monitoring the number and nature of security
   incidents/vulnerabilities related to computer rooms);
h) changes in supporting technology, plant, equipment, networks, applications and databases;
i)   finance or budget allocation; and
j)   effectiveness of external services and suppliers (supplies).
Monitoring of the ICT systems and their critical components is the first line of defence to allow detection of
abnormal situations, such as vulnerabilities that can be exploited to become an event, and further develop
into an incident and an ICT disruption that can cause the activation of the IRBC capability and processes.
Detection of unwanted events and situations, such as misconfigured controls, deviations to policies, or
mechanical failures, is also essential as the incident response can only start as soon as the event is reported
to the Point of Contact (PoC) and assessed by the incident coordinator (see ISO/IEC 27035-1).
Threat analysis is another way of seeing in advance what can harm the ICT systems as the threats are
generally still outside direct concern and control. This will happen by being continuously informed by
specialized bodies and verifying if an organization’s ICT can be potentially hit, harmed and impacted by the
threat. If so, the vulnerability management capability should be activated to prepare the improvement of the
current protection.
7.2.1 General
The organization should categorize its activities according to their priority for continuity as determined
by a business impact analysis (see ISO/TS 22317). It should also define the minimum level at which each
critical activity should be performed upon resumption. Top management should agree to the organization's
business continuity requirements (see 13.2). These requirements should result in a RTO and a RPO for the
MBCO for each product, service or activity. These RTOs start from the point at which the disruption occurs
and run until the product, service or activity are recovered.
A number of ICT services can be considered critical and required to enable recovery to take place. Each of
these critical ICT services should have their own documented RTO and RPO and MBCO of the ICT service
(these can include aspects of ICT service delivery, such as a help desk). The RTO of critical ICT services will
invariably be lower than the RTO of the business activity, due to the interdependencies between ICT services.
The organization should identify and document its critical ICT services and include brief descriptions and
names that are meaningful to the organization at service user level. This ensures common understanding
between business and ICT staff, as there can be different names used for the same service. Each critical ICT
service listed should identify the organization's product or service that it supports. Via the BIA process,
top management should agree to the ICT services and their associated IRBC requirements, listing the ICT
components/services that support the critical business processes.
For each critical ICT service identified and agreed within the BCM process, all the ICT components of the
end-to-end service should be described and documented, showing how they are configured or linked
to deliver each service. Both the normal ICT service delivery environment and the ICT continuity service
delivery environment configurations should be documented.
For each critical ICT service, the current continuity capability should be examined from the point of view
of the risk analysis review mechanism, in order to assess the risks of service interruption or degradation,
and determine the appropriate level of readiness. Any dependencies between services, including reliance on
external services and resources, should be included to determine continuity capability to be covered by the
                                                          
                                         © ISO/IEC 2025 – All rights reserved
                                                          8
                                                                                      BS ISO/IEC 27031:2025
                                          ISO/IEC 27031:2025(en)
IRBC. This is often the case for certain services that should be available in order for a critical service to be
available to the business.
An ICT critical service is identified as one that, if interrupted, will produce an impact considered as
unacceptable by the organization or stakeholders, for example, to safety, information security and business
operations. A typical example is the dependence of external mail communication on the availability of the
internet.
For each critical ICT service, the current ICT readiness arrangements should be monitored, such as
prevention, detection, response and recovery. These ICT readiness arrangements should also be compared
with business continuity requirements (see ISO/TS 22317) and any gaps should be documented.
Top management should be informed of any gaps between IRBC capability and business continuity
requirements. Such gaps can indicate business risks and the need for additional recovery resources, such as:
a)   staff, including number, skills and knowledge;
b) facilities that house ICT systems, e.g. computer room;
c)   supporting technology, plant, equipment and networks (technology);
d) information applications and databases;
e)   finance or budget allocation; and
f)   external services and suppliers (supplies).
Top management (see 13.2) should sign off the ICT business continuity strategy, the documented list of
critical ICT services and the risks associated with gaps identified between IRBC capability and business
continuity requirements. The options for addressing the gaps and risks identified should then be explored
by determining IRBC strategies.
7.3.1 General
                                                          
                                         © ISO/IEC 2025 – All rights reserved
                                                          9
BS ISO/IEC 27031:2025
                                         ISO/IEC 27031:2025(en)
The organization should define and keep as a documented information, an architecture of the ICT within the
context of the IRBC. This is done in order to identify the product, service or activity supported by ICT, any
limitations, their dependencies, and their potential related risks.
For each ICT product, service or activity, including the connection and use of internet services, a list of the
suppliers and service providers should be established and documented, in order to determine the nature of
support delivered and their associated responsibilities. This documentation should be maintained and kept
up to date to ensure it is continuously relevant.
An analysis should be performed to identify gaps between the business continuity capability of the service
provider and the approved RTO of the service contracted with the service provider.
8.1.1 General
                                                        
                                       © ISO/IEC 2025 – All rights reserved
                                                       10
                                                                                     BS ISO/IEC 27031:2025
                                         ISO/IEC 27031:2025(en)
A coordinated programme should be implemented to ensure that processes are in place to regularly promote
IRBC awareness in general, as well as assess and enhance competency of all relevant personnel key to the
successful implementation of IRBC.
ISO/IEC 27035-1 proposes the generic process and ISO/IEC 27035-3 explains the response on ICT systems.
There should be a linkage between crisis management and incident management. Sometimes incident
response requires IRBC procedures to be activated without activation of the BCM. Sometimes the authority
and responsibility to manage the incident should be given to the IRBC team when the conditions are present
(when RTO or RPO, even potentially, cannot be achieved, or when several or even one critical business
processes are impacted); when the crisis situation is solved, responsibility to finalize and close the incident
can then be passed again to the incident coordinator.
The difference between the incident management and IRBC lies in the condition of activation, the extent
of the business impact and possible consequences, and the level of authority to coordinate the actions; the
processes are identical.
In addition to these response activities, the installation and operation of “workarounds” (see 10.4), which
allow the business process to continue with the least possible disruption, can be permitted.
The main objective of the planning phase is to establish the organization's ICT readiness requirements,
including:
a)   the IRBC strategy and IRBC plan that are required to support the business requirements defined
     through BIA process;
     NOTE     Legal requirements can apply.
b) the performance criteria needed by the organization to monitor the degree of ICT readiness it requires
   to achieve those aims and objectives;
c)   list the resources (technical and other) to allow the IRBC team(s) to perform within the agreed time
     schedule.
IRBC is likely to be more efficient and cost effective when designed and built into ICT services from their
inception as part of an IRBC strategy which supports the organization's business continuity objectives. This
ensures that ICT services are better built, better understood and more resilient. Retrofitting IRBC can be
complex, disruptive and expensive.
The organization should develop, implement, maintain and continually improve a set of documented
processes which supports IRBC.
These processes should ensure that the IRBC objectives are clearly stated, understood and communicated,
and that top management's commitment to IRBC is demonstrated.
A basic approach should use the known incident scenarios and related events to establish the response
baselines for each category of incidents and related events, as follows.
a)   All known incidents and event indicators should be established as input and monitored or tracked to
     trigger to the next steps.
b) A set of known incidents should be specified (e.g. password intrusion attack, server failure due to
   insufficient hard disk space).
                                                        
                                       © ISO/IEC 2025 – All rights reserved
                                                       11
BS ISO/IEC 27031:2025
                                         ISO/IEC 27031:2025(en)
c)   A list of events leading to those incidents should be identified (e.g. failed login attempts, hard disk
     utilization).
d) A time frame should be set to establish an adequate detection time (e.g. threshold for events to be
   reported/alerted to the system/administrator).
e)   A time frame should be determined to establish suitable response time (e.g. timeline for an administrator
     to take action to prevent an incident to materialize);
f)   Events should be classified into groups of desired response time blocks and response action types; events
     can be classified by threat group, application group, response action group and/or response time group.
g) Matrices and measures should be refined by testing scenarios and drills or exercises.
h) Tests should be carried out to determine whether the response actions are workable and whether the
   objectives are achievable.
i)   Categories, expected event response time, and expected event response actions (e.g. seek alternative
     method to monitor, detect, and act) should be refined, and the new baselines should be updated as
     appropriate.
j)   The situation should be improved by recording new incidents and failure scenarios, then repeating the
     process.
The benefits of effective IRBC for the organization are that IRBC:
a)   captures the organization’s understanding of the risks to continuity of ICT services and their
     vulnerabilities;
b) identifies the potential consequences of disruption to ICT services, and the sequence of the activities in
   the response;
c)   encourages improved collaboration between its business managers and its ICT service providers
     (internal and external);
d) develops and enhances competence in its ICT staff by demonstrating credible responses through
   exercising ICT continuity plans and testing IRBC arrangements;
e)   provides assurance to top management that it can depend on predetermined levels of ICT services and
     receive adequate support and communications in the event of a disruption;
f)   provides assurance to top management that information security (confidentiality, integrity and
     availability) is properly preserved, ensuring adherence to information security policies;
g) provides additional confidence in the business continuity strategy through linking investment in ICT
   solutions to business needs and ensuring that ICT services are protected at an appropriate level given
   their importance to the organization;
h) has ICT services that are cost-effective and not under- or over-invested through an understanding of the
   level of the organization’s dependence on those ICT services; and the nature, location, interdependence
   and usage of components that make up the ICT services;
i)   can enhance its reputation for prudence and efficiency;
j)   potentially gains competitive advantage through the demonstrated ability to deliver business continuity
     and maintain product and service delivery in times of disruption; and
k) understands and documents stakeholders' expectations and their relationships with, and use of, ICT
   services.
                                                        
                                       © ISO/IEC 2025 – All rights reserved
                                                       12
                                                                                    BS ISO/IEC 27031:2025
                                        ISO/IEC 27031:2025(en)
Thus, IRBC provides a meaningful way to determine the status of an organization's ICT services in supporting
its business continuity objectives by addressing the question of whether an organization's ICT is capable of
responding, and whether it is secure.
Concerning ICT, the IRBC can run on several strategies for its planning, depending on the time needed to
replace the defective equipment:
— cold backups: equipment are present, possibly in storage (or can be ordered and provided within a very
  short time frame) but should be configured and installed to replace the defective one;
— warm backup: equipment is in operation for another function and can be easily and rapidly reconfigured;
— hot backup: equipment is ready to use and can directly be swapped with the defective one;
— high-redundancy: two identical equipment items are running simultaneously but each has the capacity
  to provide the whole service. The removal of the defective one will have no impact on operations.
Another IRBC possibility in the plan is to define and prepare “workarounds” that allow the business activity
to continue with the least disruption while the response team works on recovering the “normal” system. It
can be a fully manual, a semi-manual or a fully automated solution that performs the service with a reduced
performance.
The concept of cold and warm backup can be extended to processing facilities, where a decision is made, with
the necessary contracts and planning, to organize the resumption of all or part of the activities (including
ICT) in another facility (see 9.2.3).
                                                        
                                       © ISO/IEC 2025 – All rights reserved
                                                       13
BS ISO/IEC 27031:2025
                                         ISO/IEC 27031:2025(en)
                                                         
                                        © ISO/IEC 2025 – All rights reserved
                                                        14
                                                                                   BS ISO/IEC 27031:2025
                                            ISO/IEC 27031:2025(en)
9.1 General
The organization should consider a range of options for the incident readiness of its critical ICT services.
The options should consider increasing protection, as well as provision for recovery and restoration from
an unplanned disruption, and can include internal arrangements, services delivered to the organization, and
services provided externally by one or more third parties.
The options should take account of the various components required to ensure the continuity and recovery
of critical ICT services.
IRBC strategies should define the approaches to implement the required recovery capability so that the
principles of incident prevention, detection, response, recovery and restoration are put in place.
A range of IRBC strategy options should be evaluated. The strategies chosen should be capable of supporting
the business continuity requirements of the organization.
The organization should take into account the implementation and ongoing resource requirements when
developing the strategy. External suppliers can be contracted to provide specialist services and skills that
play an important role in supporting the strategy.
IRBC strategy should be flexible enough to cater for different business strategies in support of its own
business requirements. In addition, the strategy should take into account internal constraints and factors,
such as:
a)   business objectives and priorities;
b) business continuity strategies;
c)   budget;
d) resource availability;
e)   potential costs and benefits;
f)   technological constraints;
g) the organization's risk appetite;
h) the organization's existing IRBC strategy.
9.2.1 General
The IRBC strategic options depend on the ICT structure. This structure can be very complex. Strategies
should also take into account different scenarios, including when:
— ICT facilities are not available;
— ICT physical hardware is lost;
— ICT software is compromised;
— ICT data are compromised;
— ICT supply chain is compromised;
— competent ICT staff are not available.
                                                            
                                           © ISO/IEC 2025 – All rights reserved
                                                           15
BS ISO/IEC 27031:2025
                                          ISO/IEC 27031:2025(en)
In general, strategies can apply on a high level for IRBC, and they can be combined for different services.
Such strategies include:
a)   Dual site, which means there are multiple data centres;
b) Cooperation, meaning a similar organization can take over;
c)   Fallback to secure state, which means implementing documented procedures for restoring systems;
d) Recovery of data, meaning the implementation of data backup strategies;
e)   Suppliers take over, meaning the delegation of activities to suppliers;
f)   Alternative sourcing, identification of alternative suppliers to ensure redundancy of functions provided
     internally;
g) Minimization, meaning the isolation of ICTs and the identification of parameters that allow minimum
   service to be provided until it is fully restored.
The organization should identify appropriate strategies for maintaining core ICT skills and knowledge. This
may extend beyond employees to contractors and others who possess extensive ICT specialist skills and
knowledge. Strategies to protect or provide those skills can include:
a)   documentation of the way in which critical ICT services are performed;
b) multi-skill training, also known as cross-training, of ICT staff and contractors to enhance skill
   redundancy;
c)   separation of core skills to reduce the concentration of risk (this can entail physical separation of staff
     with core skills or ensuring that more than one person has the requisite core skills); and
d) knowledge retention and management.
9.2.3 Facilities
According to identified risks, the organization should devise strategies for reducing the impact of the
unavailability of the normal ICT facilities. This can include one or more of the following:
a)   alternative facilities (locations) within the organization, including displacement of other activities;
b) alternative facilities provided by other organizations;
c)   alternative facilities provided by third-party specialists;
d) working from home or at other remote sites;
e)   other agreed suitable working facilities;
f)   use of an alternative workforce in an established site; and
g) alternative facilities that can be transported to the site of the disruption and used to provide direct
   replacement of some of the physical assets involved.
Strategies for ICT facilities can vary significantly, and a range of options can be available. Different types of
incidents or threats can require the implementation of multiple strategies (a pick and mix approach) which
will be driven in part by factors such as the organization's size, breadth of activities, locations, technologies
and budget.
                                                         
                                        © ISO/IEC 2025 – All rights reserved
                                                        16
                                                                                    BS ISO/IEC 27031:2025
                                          ISO/IEC 27031:2025(en)
In considering the use of alternative premises, the following risk mitigation aspects should be taken into
consideration:
h) site security;
i)   staff access;
j)   proximity to existing facilities;
k) availability;
l)   cloud risk profiles.
9.2.4 Technology
The ICT services upon which prioritized processes and activities depend should be available in advance,
upon the resumption of their dependent business activities.
Thus, solutions are required which ensure the availability of applications within specific time frames, e.g.
the RTOs being determined as part of the BIA. Technology platforms and application software should be put
in place within timescales demanded by the organization as a whole.
The technologies that support critical ICT services frequently require complex arrangements to ensure
continuity, so the following should be considered when selecting IRBC strategies:
a)   RTOs and RPOs for critical ICT services which support the prioritized activities identified by the BCM
     programme;
b) location and distance between technology sites;
c)   number of technology sites;
d) remote access to systems;
e)   cooling requirements;
f)   power requirements;
g) information security requirements;
h) the use of un-staffed (dark) sites as opposed to staffed sites;
i)   telecoms connectivity and redundant routing;
j)   the nature of “failback” (whether manual intervention is required to activate alternative ICT provision
     or whether this needs to occur automatically);
k) level of automation required;
l)   technology obsolescence; and
m) outsourced service provider's connectivity and other external links.
9.2.5 Data
Additionally, prioritized processes and activities can depend on the provision of up-to-date or near-up-to-
date data. Data continuity solutions should be designed to meet the RPO of each prioritized business activity
of the organization as they relate to the business activities.
The selected IRBC options should ensure the ongoing confidentiality, integrity and availability of data that
support critical activities (see ISO/IEC 27001 and ISO/IEC 27002).
                                                          
                                         © ISO/IEC 2025 – All rights reserved
                                                         17
BS ISO/IEC 27031:2025
                                          ISO/IEC 27031:2025(en)
Data storage and IRBC strategies should meet the organization's business continuity requirements, and
should take account of:
a)   ICT RPO requirements;
b) how data are stored, e.g. disk, tape or optical media; appropriate backup and restoration mechanisms
   should be in place to ensure the data are secure and in a safe environment;
c)   where information is stored, transported or transmitted, distance, location, network links, etc. (onsite,
     offsite or third party) and expected timescales for the retrieval of backup media; and
d) restore timescales, driven by the volume of data, how they are stored and the complexity of the technical
   restore process, along with the requirements of the service user and the needs of organizational
   continuity.
An understanding of the “end-to-end” use of data throughout the organization is critical. This can include
information feeds to and from third parties.
It should be considered that the nature, update status and value of data varies enormously within an
organization.
9.2.6 Processes
In selecting its IRBC strategy, the organization should consider the processes necessary to ensure the
viability of that strategy, including those necessary in the incident prevention, incident detection, incident
response and disaster recovery. The organization should also identify any factors necessary for the effective
implementation of those individual processes, e.g. key skill sets, critical data, key enabling technologies, or
critical equipment or facilities.
For more details on information security incident management, refer to ISO/IEC 27035-1.
9.2.7 Suppliers
The organization should identify and document external dependencies which support ICT service provision
and take adequate steps to ensure that critical equipment and services can be provided by their suppliers
within predetermined and agreed time frames. Such dependencies can exist for hardware, software,
telecoms, applications, third-party hosting services, utilities, and environmental issues, such as air
conditioning, environmental monitoring, and fire suppression.
Strategies for these services can include:
a)   storage of additional equipment and software copies at another location;
b) arrangements with suppliers for the delivery of replacement equipment at short notice;
c)   rapid repair and/or replacement of faulty parts in the event of an equipment malfunction;
d) dual supply of utilities such as power and telecoms;
e)   emergency generating equipment; and
f)   identification of alternative/substitute suppliers.
The organization should include ICT and business continuity management requirements in contracts with
its partners and service providers. Contract schedules should include reference to each party's obligations,
agreed service levels, response to major incidents, cost assignment, exercising frequency and corrective
actions.
For more details on information security for supplier relationships, refer to ISO/IEC 27036-1.
                                                           
                                        © ISO/IEC 2025 – All rights reserved
                                                        18
                                                                                       BS ISO/IEC 27031:2025
                                         ISO/IEC 27031:2025(en)
The organization should, based on the IRBC strategy and plan, define the capability based on a structure,
roles and responsibilities. On top of this capability, top management determines who takes the overall
responsibility for IRBC.
IRBC strategies should only be implemented after top management's approval. At this point, the
implementation stage begins. This clause provides recommendations for implementing an organization's
chosen IRBC strategies along with the necessary organization structure, plans and procedures required to
support the implementation.
The organization should manage resources (see 10.1.3), procedures and operation of IRBC, as well as
implement training and awareness programmes. Implementation should be managed as a project through
the organization's formal change control process and BCM project management controls in order to ensure
full management visibility and reporting.
Reference should be made to relevant international standards during the implementation of incident
detection and response, including ISO/IEC 27035-1 for the incident response process.
10.1.2 Determining time frames for plan development, reporting and testing
The RPO can also relate to the maximum amount of data that can be lost and unrecoverable due to the
disruption. This is represented on the timeline as the amount of time between the last good backup and
when the disruption event occurs. The RPO and MBCO that can be achieved depends on the ICT service
recovery strategy employed, particularly on the backup arrangement.
As data can also be lost if there is a disruption in the incoming and outgoing data flows, organizations should
include this consideration in their plans.
For example, at time zero, the critical ICT system is intruded by a hacker and services are brought down.
The first milestone after the ICT service disruption event occurs is a direct detection of the security incident
(i.e. the intrusion event) or an indirect detection of service loss (or degradation), for which there will be an
elapsed time before the notification. For example, in some instances, the IT helpdesk is notified via a call
from a user.
It can take several hours from the onset of ICT service disruption until a decision is taken to invoke IRBC, once
communication and decision-making time is taken into account. The invocation decision can require careful
consideration in some situations, since invoking IRBC often impacts upon normal business operations. An
example of this is where the service has not been entirely lost or there seems to be a strong prospect of
imminent service recovery.
Once invoked, ICT service recovery can commence. This can be divided into infrastructure (network,
hardware, operating system, backup software, etc.) and application recovery (database, application, batch
processes, interfaces, etc.).
Once the ICT service has been recovered and system testing has been conducted by ICT staff, the service
can be made available for user acceptance test before it is released to staff for use in business continuity
operations.
Although ICT staff have the opportunity to carefully plan the restoration and schedule it to take place during
a natural low activity period, this is nevertheless a substantial task.
                                                         
                                        © ISO/IEC 2025 – All rights reserved
                                                        19
BS ISO/IEC 27031:2025
                                        ISO/IEC 27031:2025(en)
The arrows across the top of Figure 2 indicate how the principles of IRBC detailed in this document align
with the disruption timeline.
Figure 2 illustrates how elements of IRBC support key milestones during a major disruption. Events and
milestones happen along a timeline starting at time zero when an ICT service disruption/disaster event
occurs. An example of the disaster scenario is one that has arisen from a targeted system intrusion attack
(commonly called “hacking”) to the organization's critical ICT system.
10.1.3 Resources
As part of the policy mandate, the organization should define the need for an IRBC programme as part of its
overall BCM objectives, and determine and provide the resources needed to establish, implement, operate
and maintain this programme.
IRBC roles, responsibilities, competencies, and authorities should be defined and documented.
Top management should:
a)   appoint or nominate a person with appropriate seniority and authority to be accountable for IRBC policy
     and implementation;
b) appoint one or more competent persons, who, irrespective of other responsibilities, should implement
   and maintain the IRBC as described in this document; and
c)   appoint a team of competent people that will operate the IRBC tasks and procedures.
IRBC staffing should be made up by qualified and trained personnel to perform their assigned duties and
responsibilities to ensure IRBC success. IRBC staff should receive up-to-date training to stay current with
threats and vulnerabilities to the ICT organization.
                                                        
                                       © ISO/IEC 2025 – All rights reserved
                                                       20
                                                                                      BS ISO/IEC 27031:2025
                                           ISO/IEC 27031:2025(en)
The potential points of failure should be categorized in terms of business impact, in order to escalate the
response. In ICT, “high availability” refers to systems or components that are continuously operational
for a desirably long period of time. Availability can be measured relative to “100 % operational” or “never
failing.” There is a widely held but difficult-to-achieve standard of availability for a system or product which
is known as “five 9s” (99,999 %) availability.
A computer system or a network is made up of many components, all of which usually should be present
and functional in order for the whole to be operational. While planning for high availability often focuses on
backup and failover processing and data storage and access, other infrastructure components such as power
and cooling are equally important.
For example, power availability can be assured by such measures as:
a)   uninterruptible power supply (UPS);
b) emergency power generating capacity;
c)   dual sources of power from a grid.
Data backup and availability can be attained using a variety of storage technologies such as redundant array
of disks (RAID) and storage area network (SAN).
Application availability should also be considered and is often achieved through clustering.
Such technologies can only be really effective in delivering high availability through concurrent
implementation at more than one geographically dispersed location. For example, simply having a “failover”
server at the same location as a primary or “production” server is not going to provide the necessary levels
of resilience if that site is affected by a serious environmental disruption. Both servers will be affected by
the same environmental disruption. The “failover” server and other supporting technologies would have to
be located at another site for required levels of availability to be achieved.
For many organizations, the cost and effort involved in achieving such levels of high availability can be
daunting. For that reason, there has been an increased use of third-party service providers who are able
to offer the skills, resources and resilient technologies at an affordable price either through the provision
of managed or cloud services. It is important to keep in mind however, that while high availability is an
effective route to enhanced resilience, the possibility of failure remains. Thus, it is vital that well planned
and tested DR processes and procedures are in place.
ICT BCP activation is part of the BCM structure for the whole organization. ICT BCP activation is applicable
when a severe incident affects ICT operations. The decision to activate should be made according to the
mandate set by the BCM. ICT management activates relevant BCP pending the character of the incident
according to the IRBC. The activation decision flow can be as follows:
— Incident management determines the incident as severe and ICT related.
— Incident management notifies ICT management and/or crisis management as applicable.
— Authorized management decides to activate ICT BCP.
— BCP for other parts of the organization can also be activated and crisis management is already active.
10.2.2 Escalation
                                                           
                                          © ISO/IEC 2025 – All rights reserved
                                                          21
BS ISO/IEC 27031:2025
                                          ISO/IEC 27031:2025(en)
— depends on criteria and conditions that should be set out and applied both by incident management and
  BC/IRBC management.
These criteria/conditions should consider the time to resolve the incident with regard to the RTO, and
the size of the impact of the incident on business continuity. A process should be developed to ensure the
swift transfer of the responsibility in both directions (escalation and de-escalation). When the crisis (IRBC
condition) is finished, it is possible that the incident is not yet resolved, especially if the business impact
and parties in the resolution involved external resources and teams. The incident coordinator (or the
incident management capability) should recover control to complete the incident report and prepare the
recommendations for improvements.
ICT RPO and ICT RTO should be established for each product, services and activities and reproduced on
several locations and in different kind of support, allowing each person with the appropriate responsibility
to have the most appropriate support to use if/ when necessary.
10.3.2 Facilities
ICT recovery systems and critical data backup should, where possible, be physically separated from the
operational site to prevent them being affected by the same incident.
Consideration should be given to the location of all ICT environments when implementing the strategy.
The overall scalability, manageability, supportability, performance and cost characteristics of the different
implementation techniques should be examined to identify the most appropriate techniques for the chosen
strategies which support the overall business continuity aims and objectives.
10.3.3 Technology
ICT technology plans should be implemented based on the chosen IRBC strategy. The implementation
depends on one or more of the following implementations and arrangements:
a)   hot standby, where ICT infrastructure plan and implementation enable replication across two
     geographically dispersed sites;
b) warm standby, where the plan and implementation enable that recovery takes place at a secondary site
   where ICT infrastructure is partially prepared;
c)   cold standby, where the plan and implementation enable that infrastructure is built or configured from
     scratch at an alternative location;
d) ship-in arrangements, where the plan and implementation cover which external service providers
   provide hardware; and
e)   composite arrangement of the preceding strategies, where the plan and implementation enable a “pick-
     and-mix” approach of d).
For more information about virtual environments, see ISO/IEC 21878.
10.3.4 Data
The implementation and plan arrangements for the availability of identified data should be aligned with the
IRBC strategies that can include:
a)   additional storage for data in a format that ensures its availability aligned with the strategies identified
     within the IRBC; and
                                                         
                                        © ISO/IEC 2025 – All rights reserved
                                                        22
                                                                                      BS ISO/IEC 27031:2025
                                          ISO/IEC 27031:2025(en)
b) definition of alternative locations for data storage, which can be physical or virtual, provided the
   security and confidentiality of the data are maintained. Thus, appropriate access procedures should be
   in place and, if arrangements are made through third parties for the storage of that information, the
   information owners should satisfy themselves that appropriate controls are in place.
For more information about virtual environments, see ISO/IEC 21878.
IRBC procedures should be documented clearly and in sufficient detail to enable competent staff to execute them.
NOTE      Some of these procedures can differ from the daily operation.
IRBC procedures can be dependent on the situation that unfolds. In practice, it is possible that such
procedures should be adapted in light of the disruption (e.g. the degree of loss or damage), the organization's
operational priorities or the stakeholders demands.
10.3.6 People
It is essential that the organization makes available the necessary human resources to perform the critical
activities and to help in the operation of the IRBC.
Staff should be trained to allow personnel performing other duties in time of IRBC activation.
                                                         
                                        © ISO/IEC 2025 – All rights reserved
                                                        23
BS ISO/IEC 27031:2025
                                         ISO/IEC 27031:2025(en)
Qualitative criteria are subjective when used to determine the performance of IRBC but usually require less
resources in the measurement process (which can be appropriate for a small or medium size organization
subject to resource constraints). It can include determining the efficiency of the processes used in planning,
preparing, and executing the activities of IRBC and can be measured through:
a)   a survey using a structured or unstructured questionnaire;
b) feedback from participants and stakeholders;
c)   conducting feedback workshops and other focused group meetings.
More details on metrics and measurements in the field of information security can be found in ISO/IEC 27004.
The organization should exercise not only the recovery of the ICT service, but also its protection and
resilience elements in order to determine whether:
a)   the service can be protected, maintained and/or recovered regardless of the incident severity;
b) the IRBC management arrangements can minimize the impact on the business;
c)   the procedures for return to business as usual are valid.
In most instances, the whole set of IRBC elements and processes, including ICT recovery, cannot be proven in
one test and exercise.
A progressive training programme can therefore be appropriate towards building a full simulation of a real
incident.
The programme should include different levels of exercise from familiarization to computer room resilience
and should consider all aspects of the end-to-end ICT service delivery.
There are risks associated with tests and exercises and such activities should not expose the organization
to an unacceptable level of risk.
The exercise programme should define how risks identified during individual exercises are addressed or
will be addressed in future.
Top management selected on the programme should be obtained and a clear explanation of the associated
risks documented.
The test and exercise programme objectives should be fully aligned to the wider business continuity
management scope and objectives, and complementary to the organization's broader exercise programme.
Each test and exercise should have both business objectives (even where there is no direct business
involvement) and defined technical objectives to test or validate a specific element of the IRBC strategy.
Exercising individual elements in isolation at the component level is complementary to full systems
exercising and should be maintained as part of an ongoing test and exercise programme.
The test and exercise programme should define the frequency, scope and format of each exercise. The
following are high-level examples of exercise scopes:
a)   data recovery: recovery of a single file or database following corruption;
b) recovery of a single server (including a full rebuild);
c)   recovery of an application (this can consist of several servers, sub applications and infrastructure);
                                                         
                                        © ISO/IEC 2025 – All rights reserved
                                                        24
                                                                                        BS ISO/IEC 27031:2025
                                          ISO/IEC 27031:2025(en)
An exercise should be carefully planned to minimize the risk of an incident undermining the service
capability.
This risk management should be appropriate to the level of exercise being undertaken (i.e. the elements of
service recovery). This can include:
a)   ensuring that all data are backed up immediately prior to the exercise;
b) conducting exercises in isolated environments;
c)   scheduling exercises “out of hours” or during quiet times in the business cycle, with the knowledge of
     the end users.
Exercises should be realistic, carefully planned and agreed with stakeholders, to ensure minimum risk of
disruption to business processes. They should not, however, be carried out during incidents.
The scale and complexity of exercises should be appropriate to the organization's recovery objectives.
Each exercise should have a “term of reference”, agreed and signed off in advance by the exercise sponsor,
which can include the following:
d) description;
e)   objectives;
                                                          
                                         © ISO/IEC 2025 – All rights reserved
                                                         25
BS ISO/IEC 27031:2025
                                         ISO/IEC 27031:2025(en)
f)   scope;
g) assumptions;
h) constraints;
i)   risks;
j)   success criteria;
k) resources;
l)   roles and responsibilities;
m) high-level timeline/schedule;
n) exercise data capture;
o) issues log;
p) exercise/incident logging;
q) debriefing;
r)   post-exercise actions (follow up and reporting).
Planning an exercise should enable the organization to achieve the success criteria identified.
The organization should exercise all elements of the ICT service recovery as appropriate to its size and,
complexity and business continuity management scope.
The exercising should not focus solely on service recovery and resumption, but should include the reliability
of the resilience capability, system monitoring and alert management.
The organization should perform exercises at component level through to the full location-based system
testing stage in order to achieve high levels of confidence and resilience.
Figure 3 shows the different steps to be considered for a participant in the organization, who is involved in
the BCM exercise.
                                                        
                                       © ISO/IEC 2025 – All rights reserved
                                                        26
                                                                                       BS ISO/IEC 27031:2025
                                          ISO/IEC 27031:2025(en)
A clear exercise control structure should be developed with roles and responsibilities allocated to
appropriate individuals. The exercise control structure can include:
a)   exercise controller [participant(s) with overall control of the test and exercise]:
b) exercise communications;
c)   confirmation that there are enough staff available to undertake the exercise safely;
d) sufficient observers and or facilitators to capture the exercise proceedings and maintain an issues log;
                                                          
                                         © ISO/IEC 2025 – All rights reserved
                                                         27
BS ISO/IEC 27031:2025
                                           ISO/IEC 27031:2025(en)
                                                         
                                        © ISO/IEC 2025 – All rights reserved
                                                        28
                                                                                       BS ISO/IEC 27031:2025
                                           ISO/IEC 27031:2025(en)
12 Final MBCO
Depending on the situation, it is possible that IRBC is unable to initially meet the MBCO set by the business
using ICT. In such a case, the IRBC is not fulfilling the continuity requirements set by the business. If there is
a gap between the requirement and the capability, then there are only two options:
— close the gap by enhancing the capability;
— accept the gap and include it in the risk register.
When closing the gap then depending on the cost of improving IRBC, an organization should review its
business requirements as well as the possibilities to improve the IRBC so that in future, the MBCO for ICT
can be improved and come closer to achieving the business continuity requirements. This IRBC review and
improvement should be done through the BCM by the appropriate management (see Clause 13).
NOTE       For further information, see Annex A.
13.1 General
To be effective, an IRBC programme should be a fully integrated process within the organization's
management activities, driven from the top of the organization and endorsed by top management.
A number of professional IRBC practitioners and staff from other management disciplines and departments
can be required to support and manage the IRBC program.
The quantity of resources required to support such a programme is dependent upon the size and complexity
of the organization.
                                                          
                                         © ISO/IEC 2025 – All rights reserved
                                                         29
BS ISO/IEC 27031:2025
                                           ISO/IEC 27031:2025(en)
Top management should select the IRBC strategies from the options presented to them and approve and
sign off the documented options to confirm that the actions have been properly undertaken and that they
support the overall business continuity requirements.
The selected IRBC strategy options should:
a)   cater for likely risks and effects of disruption;
b) integrate with the organization's chosen business continuity strategies;
c)   be appropriate to meet the organization's overall objectives within its risk appetite;
d) be reviewed by the appropriate management.
                                                          
                                         © ISO/IEC 2025 – All rights reserved
                                                         30
                                                                                      BS ISO/IEC 27031:2025
                                            ISO/IEC 27031:2025(en)
                                                  Annex A
                                               (informative)
A range of potential risk management techniques exist which can assist in the assessment of IRBC and in
developing an appropriate framework for the continued development and enhancement of ICT resilience.
IEC 31010:2019 is intended to reflect current good practices in the selection and utilization of risk assessment
techniques. Reference should be made to this document to determine which is the most appropriate
technique to be used within an organization. The assessment of failure scenarios is one technique which can
be beneficial in enhancing the efficacy of IRBC. This annex and Annex B provide additional information on
how it can be implemented.
Unknown risk issues can emerge between assessments as a result of changes in and external to the
organization environment, which can hamper business continuity and resilience.
The purpose of failure scenario assessment is to identify suitable event indicators, ensure that IRBC plans are
capable of detecting such emerging risk issues and able to prepare the organization to ensure appropriate
actions can be taken before failure occurs.
A number of specific methodologies are available for such a purpose, including failure mode effect analysis
(FMEA) and component failure impact analysis (CFIA).
If this methodology is selected, it can be deployed as follow:
FMEA is a process for identifying and analysing the potential failure modes of a system for the classification
by severity or determination of the failures affect upon the system. In the context of this document, FMEA
can be applied to determine the critical event indicators that should be monitored in order to detect
potentially severe failure modes in an organization ICT system. The process, based on the FMEA approach,
can be applied to each critical component of the ICT service.
For each critical component, the following can be done:
a)   identify the potential failure mode;
b) determine the potential impact to the ICT service i.e. the severity of each failure mode, and what
   consequences would result;
c)   identify the frequency of occurrence of a failure mode that the organization has already experienced, as
     well as the ease of monitoring and detection of the failure mode;
d) identify the indicators that provide a signal or information that the component is failing;
e)   identify the direct and indirect events that are related, and change the state of each indicator;
f)   identify the existing controls that prevent the critical components from failing, or can detect such
     failures occurring;
g) identify related data sources, and possible methods of monitoring to detect changes to the value of the
   indicator;
h) categorize the event indicators by the availability of monitoring methods and ease of monitoring;
i)   identify if suitable risk reduction or elimination controls can be applied to prevent its occurrence.
                                                         
                                        © ISO/IEC 2025 – All rights reserved
                                                        31
BS ISO/IEC 27031:2025
                                       ISO/IEC 27031:2025(en)
                                               Annex B
                                            (informative)
The failure mode effect analysis (FMEA) output that includes a list of potential failure modes and effects,
and related events, can be used to determine event indicators that should be monitored.
The failures modes identified through the FMEA process can be prioritized according to the assessed
severity, their frequency of occurrence, and the ease of monitoring and detection.
An FMEA also documents current knowledge and actions about the risks of failures, for use in continuous
improvement.
If FMEA is used during the design stage with an aim to avoid future failures, it can be used for process
control, before and during ongoing operation of the process. Ideally, FMEA begins during the earliest
conceptual stages of design and continues throughout the lifecycle.
                                                       
                                      © ISO/IEC 2025 – All rights reserved
                                                      32
                                                                                   BS ISO/IEC 27031:2025
                                       ISO/IEC 27031:2025(en)
Bibliography
[1]    ISO/IEC 20000-1:2018, Information technology — Service management — Part 1: Service management
       system requirements
[2]    ISO/IEC 21878:2018, Information technology — Security techniques — Security guidelines for design
       and implementation of virtualized servers
[3]    ISO 22313:2020, Security and resilience — Business continuity management systems — Guidance on the
       use of ISO 22301
[4]    ISO/TS 22317:2021, Security and resilience — Business continuity management systems — Guidelines
       for business impact analysis
[5]    ISO/TS 22318:2021, Security and resilience — Business continuity management systems — Guidelines
       for supply chain continuity management
[6]    ISO 22320:2018, Security and resilience — Emergency management — Guidelines for incident
       management
[7]    ISO/TS 22331:2018, Security and resilience — Business continuity management systems — Guidelines
       for business continuity strategy
[8]    ISO/TS 22332:2021, Security and resilience — Business continuity management systems — Guidelines
       for developing business continuity plans and procedures
[9]    ISO/IEC 27001:2022, Information security, cybersecurity and privacy protection — Information security
       management systems — Requirements
[10]   ISO/IEC 27002:2022, Information security, cybersecurity and privacy protection — Information security
       controls
[11]   ISO/IEC 27004:2016, Information technology — Security techniques — Information security
       management — Monitoring, measurement, analysis and evaluation
[12]   ISO/IEC 27005:2022, Information security, cybersecurity and privacy protection — Guidance on
       managing information security risks
[13]   ISO/IEC 27035-1:2023, Information technology — Information security incident management — Part 1:
       Principles and process
[14]   ISO/IEC 27035-2:2023, Information technology — Information security incident management — Part 2:
       Guidelines to plan and prepare for incident response
[15]   ISO/IEC 27035-3:2020, Information technology — Information security incident management — Part 3:
       Guidelines for ICT incident response operations
[16]   ISO/IEC 27036-1:2021, Cybersecurity — Supplier relationships — Part 1: Overview and concepts
[17]   ISO 31000:2018, Risk management — Guidelines
[18]   IEC 31010:2019, Risk management — Risk assessment techniques
[19]   CEN/TS 17091:2018, Crisis Management – Guidance for developing a strategic capability
                                                       
                                      © ISO/IEC 2025 – All rights reserved
                                                      33