Topic 9 - Contingency Plannning
Topic 9 - Contingency Plannning
Introduction
Slide 2
What Is Contingency Planning?
Slide 3
Business impact
analysis (BIA)
Incident response
Components plan (IR plan)
of
Contingency
Disaster recovery
Planning plan (DR plan)
Business continuity
plan (BC plan)
Slide 4
Components of Contingency Planning
Slide 5
Contingency Planning Life Cycle
Slide 6
Business Impact
Analysis (BIA)
Slide 7
Business Impact Analysis (BIA) (1)
Slide 8
BIA provides information about
systems and threats and provides
detailed scenarios for each potential
attack
Business
Impact Analysis BIA is not risk management, which
focuses on identifying threats,
(BIA) (1) vulnerabilities, and attacks to
determine controls
Slide 9
Business Impact Analysis (BIA) (1)
Slide 10
Determine Mission/Business Processes and Recovery
Criticality (a)
Slide 11
Identify Recovery Resource Requirements (b)
Slide 12
Slide 13
Identify System Resource Recovery
Priorities (c)
¨ Prioritizing the resources associated with the
mission/ business processes, which provides a
better understanding of what must be recovered
first, even within the most critical processes
Slide 14
Contingency Planning Life Cycle
Slide 15
Incident Response
Plan (IRP)
Slide 16
Incident Response Planning (2)
According to NIST
SP 800- 61, Rev. 2,
Mission Strategies and goals
the IR plan should
include :
Slide 18
Incident Response Planning (a)
Slide 19
During the Incident (i)
Slide 20
After the Incident (ii)
Slide 21
Planners draft a third set of
procedures, those tasks that must
be performed in advance of the
incident
Incident
Response Reaction- Responding to the incident in a
predetermined fashion to contain and
Actions (b) mitigate its potential damage
Slide 24
Incident Detection (i)
Slide 25
Incident Indicators: Possible Indicators
Slide 26
Incident Indicators: Probable Indicators
Reported attacks
Slide 27
Incident Indicators: Definite Indicators
Use of
Changes to Presence of
dormant
logs hacker tools
accounts
Notifications
Notification by
by partner or
hacker
peer
Slide 28
Potential Incident Results
Violation Loss of
of law availability
Violation Loss of
of policy integrity
Loss of
confidentiality
Slide 29
Incident Reaction (ii)
Slide 30
Notification of Key Personnel
Other key personnel must also be notified of the incident only after
the incident has been confirmed, but before media or other
external sources learn of it
Slide 31
Documenting an Incident
Slide 32
Incident Containment Strategies
Recovering control of
Stopping the incident
the systems
Slide 33
Disconnect Disconnect the affected network
Slide 34
Incident Escalation
Slide 35
Once the incident has been contained, and system
control regained, incident recovery can begin
Incident
Recovery (iii) The immediate determination of the scope of the
breach of confidentiality, integrity, and availability of
information and information assets is called incident
damage assessment
Identify and Identify and resolve the vulnerabilities that allowed the
resolve incident to occur and spread
Slide 37
Incident Recovery
Slide 38
Disaster Recovery
Plan (DRP)
Slide 39
Disaster Recovery Plan (2)
Slide 41
Rapid Onset Disasters (i)
Slide 42
Planning for Recovery (b)
When disaster
If organization’s
threatens the
facilities are
organization at the
unusable, take
primary site, DRP
alternative actions
becomes BCP
Slide 44
Business Continuity
Planning (BCP)
Slide 45
Business Continuity Planning (3)
Slide 47
Exclusive Use Options (i)
Fully configured
Hot sites computer facility with
all services
Slide 48
Shared Use Options (ii)
Service Mutual
Timeshares
bureaus agreements
• Like an • Agency that • Contract
exclusive use provides between two
site but physical organizations
leased facilities to assist
Slide 49
Slide 50
Slide 51
Business Resumption Planning
Slide 52