149 BUSINESS CONTINUITY MANAGEMENT
a. Alternate and Business Recovery Sites shall refer to standby facilities for use during disruption of critical operations to ensure business continuity. These provide work space and/or the necessary technology environment needed to process business-critical information. Organizations may have more than one (1) alternate site. In some cases, alternate sites may involve facilities that are used for normal day-to-day operations but which are able to accommodate additional business processes when a primary location becomes inoperable. Examples of alternate sites include relocation and disaster recovery sites, whether managed directly or maintained by a third party for a BSFI or for use by multiple organizations.
b. Business Continuity shall refer to a state of continued, uninterrupted operation of a business.
c. Business Continuity Management (BCM) shall refer to an enterprise-wide framework encompassing policies, standards, facilities, personnel and practices that provides for continuous functioning of the institution during disruptions. It is proportionate to the BSFI’s internal and external risk exposures and tailored to the nature, scale, and complexity of its business.
d. Business Continuity Plan (BCP)/Plan shall refer to a documented plan detailing the orderly and expeditious process of recovery, resumption, and restoration of business functions in the event of disruptions. It should be able to cover and establish linkages among its multiple components, such as communication plan, crisis management plan, contingency funding plan, and technology recovery plan.
e. Business Impact Analysis (BIA) shall refer to the process of identifying and measuring (quantitatively and qualitatively) the business impact or loss of business processes in the event of a disruption. It is used to identify recovery priorities, recovery resource requirements, essential staff, and dependencies (internal and external) to be incorporated in the plan.
f. Crisis shall refer to a situation that requires urgent action due to its disruptive impact on the BSFI’s core activities or business and operating environment.
g. Crisis Management Plan (CMP) shall refer to a documented plan detailing the actions to be taken when a crisis strikes a BSFI and designed to maintain order amidst the confusion surrounding such situations. During and immediately after a crisis, the members of the crisis management team will convene and activate the plan to attain control over the crisis and minimize its impact to operations.
h. Critical Process shall refer to any activity, function or service, which when lost would materially affect the continued operation of the BSFI.
i. Cyber Resilience shall refer to an organization’s ability to anticipate, handle, adapt to, and/or recover from evolving cyber threats.
j. Events shall refer to disruption scenarios such as loss of people, technology, alternate site, and service providers.
k. Pandemic shall refer to epidemics or outbreaks in humans of infectious diseases that have the ability to spread rapidly over large areas, possibly worldwide.
l. Recovery Point Objective (RPO) shall refer to acceptable amount of data loss should a disruption occur without severe impact on the recovery of operations.
m. Recovery Time Objective (RTO) shall refer to the period of time following an incident within which a product, system or business process must be resumed or resources must be recovered.
n. Resilience shall refer to the ability of an organization to anticipate, handle, adapt to and/or recover from a disruption and resume operations.
o. Risk Assessment shall refer to the process involving the identification and assessment of potential threats and vulnerabilities that could severely interrupt a BSFI’s business activities and the corresponding likelihood and magnitude of impact on business processes.
p. Technology Recovery Plan (TRP)/Disaster Recovery Plan (DRP) shall refer to a documented plan detailing the technology strategy and requirements during recovery for business and support functions. The relevant regulations are in Item “3.3.2.13” of Appendix 77.
a. Board of directors and senior management. The BSFI’s board and senior management are responsible for overseeing the implementation of a sound BCM process, which involves the creation and promotion of an organizational culture that places high priority on business continuity. This should be reinforced by providing sufficient financial and human resources associated with the BSFI’s business continuity initiatives. Senior management should establish BCM policies, standards, and processes, which must be duly endorsed to and approved by the board.
(1) implementation status of the BCP;
(2) incident reports;
(3) plan test results;
(4) changes to the plan; and
(5) related action items to strengthen the BSFI’s ability to recover during disruptions.
b. BCM Coordinator/Unit. Coordination and supervision of all business continuity activities should be assigned to a competent individual and/or unit with technical knowledge and experience consistent with the nature and complexity of the BSFI’s business activities. A complex 2 BSFI may need a BCM unit with a team of departmental liaisons throughout the organization. For a simple BSFI, an individual BCM coordinator may suffice. While the BCM coordinator/unit may recommend initiatives or activities to be prioritized, the board and senior management are ultimately responsible for understanding the critical business processes and subsequently establishing plans to meet business process requirements in a safe and sound manner.
c. BSFI Personnel. BSFI personnel should understand their roles and responsibilities on the prevention of crisis and recovery of business operations during disruptions. Business and support functions should allocate responsibilities for managing disruptions and provide clear guidance regarding the succession of authority to account for unavailability of key personnel in the event of a disruption.
d. Audit. An independent review of the BSFI’s BCM framework and corresponding plans should be periodically performed with frequency based on a sound risk assessment process. This is to ensure that significant policy revisions resulting from changes in the operating environment, lessons learned from plan tests, and internal and regulatory audit recommendations have been considered. Moreover, plan testing exercises should be independently observed, verified, and evaluated to ensure reasonableness and validity of the testing process and the accuracy of test results.
Figure 1. Business Continuity Management Process
a. Business impact analysis and risk assessment. A comprehensive BIA and risk assessment should be undertaken to serve as the foundation in the development of the plan. The BIA entails determining and assessing the potential impact of disruptions to critical business functions, processes, and their interdependencies through work-flow analyses, enterprise-wide interviews, and/or inventory questions. Accordingly, the BSFI should determine the recovery priority, RTO, RPO, and the minimum level of resources required to ensure continuity of its operations consistent with the criticality of business function and technology that supports it. The BSFI should then conduct risk assessment incorporating the results of the BIA and evaluating the probability and severity of a wide-range of plausible threat scenarios in order to come up with recovery strategies that are commensurate with the nature, scale, and complexity of its business functions.
b. Strategy formulation. Recovery and resumption strategies to achieve the agreed time-frame and deliver the minimum required services as identified in the BIA should be defined, approved, and tested. The minimum requirements for the provision of essential business and technology service levels during disruptions should be established by concerned business and support functions.
(1) Recovery strategy. As business resumption relies primarily on the recovery of technology resources, adequate provisions should be in place to ensure systems availability and recoverability during disruptions as prescribed under Appendix 77. Recovery strategies should be able to meet the agreed requirements between business units and support functions for the provision of essential business and technology service levels.
(2) Continuity of operations/business resumption strategy. The business continuity models adopted by the BSFI to handle prolonged disruptions should be based on the risk assessment of its business environment and the characteristics of its operations. The resumption strategies and resource requirements should be approved by the board as recommended by senior management or the relevant board committees to ensure alignment with corporate goals and business objectives.
c. Plan development. Plans are an important, tangible evidence of the BSFI’s business continuity initiatives. The objective of the plan is to provide detailed guidelines and procedures on response and management of a crisis, recovery of critical business services and functions and to ultimately resume to normal operations. The plan should be formulated on an enterprise-wide basis, reviewed and approved by the board of directors and senior management at least annually and disseminated to all concerned employees. The plan should include provisions for both short-term and prolonged disruptions.
(1) Escalation, declaration and notification procedures;
(2) Responsibilities and procedures to be followed by each continuity or recovery teams and their members. The procedures should enable the BSFI to respond swiftly to a crisis (i.e., a crisis management plan) and to recover and resume the critical processes outlined in the plan within the stipulated time frame during disruptions;
(3) A list of resources required to recover critical processes in the event of a major disruption. This would include, but not limited to: (a) key recovery personnel; (b) computer hardware and software; (c) communication systems; (d) office equipment; and (e) vital records and data;
(4) Relevant information about the alternate and recovery sites; and
(5) Procedures for restoring normal business operations. This should include the orderly entry of all business transactions and records during disruption into the relevant systems up to completion of all verification and reconciliation procedures.
d. Plan Testing
(1) Types of testing methods. Plan testing is a vital element of the BCM. It ensures that the plan remains accurate, relevant, and operable. Tests should be conducted periodically, with the nature, scope, and frequency determined by the criticality of the applications, business processes, and support functions. In some cases, plan tests may be warranted due to changes in BSFI’s business, responsibilities, systems, software, hardware, personnel, facilities, or the external environment.
(a) Tabletop exercise/structured walk-through test – the primary objective is to ensure that critical personnel from all areas are familiar with the plan and that it accurately reflects the BSFI’s ability to recover from a disruption.
(b) Walk-through drill/simulation test – similar to a tabletop exercise but with a more focused application. During this test, participants choose a specific scenario to which relevant plan provisions shall be applied.
(c) Communication/call tree test – an exercise that validates the capability of crisis management teams to respond to specific events and the effectiveness of the call tree notification process in disseminating information to employees, vendors, and key clients.
(d) Alternate site test/exercise – tests the capability of staff, systems, and facilities, located at alternate sites to effectively support production processing and workloads.
(e) Component test/exercise – A testing activity designed to validate the continuity of individual systems, processes, or functions, in isolation.
(f) Functional drill/parallel test – test to determine capability of alternate site and BSFI employees to support strategy as defined in the plan, which involves actual mobilization of personnel, establishing communications, and recovery processing.
(g) Enterprise-wide full-interruption/full-scale test – the most comprehensive type of test encompassing the entire organization and requires activation of all the components of the plan at the same time to simulate a real-life emergency and processing data and transactions using back-up media at the recovery site.
(2) Test policy/plan. Testing should be viewed as a continuously evolving cycle. The BSFI should incorporate the results of BIA and risk assessment and work towards a testing strategy that increases in scope and complexity to address a variety of threat scenarios. Test scenarios should vary from isolated system failures to wide-scale disruptions and promote testing its primary and alternate facilities, as well as with key counterparties and third-party service providers.
(3) Annual enterprise-wide business continuity testing. The BSFI must conduct an enterprise-wide business continuity test at least annually, or more frequently depending on changes in the operating environment, to ensure its plan’s relevance, effectiveness, and operational viability. The scope of testing should be comprehensive to cover the major components of the plan as well as coordination and interfaces among important parties.
(4) Analysis and report of test result. Plan tests, including successes, failures, and lessons learned, should be thoroughly analyzed to promote continuous BCM improvement. Exceptions noted should be documented and corrective actions should be closely monitored to ensure that they are implemented in a timely manner by concerned parties, including the board of directors and senior management, business line management, risk management, IT management, and other internal stakeholders.
e. Personnel training and plan maintenance
(1) Training program. A business continuity training program should be provided to all concerned employees to promote awareness, familiarity, and understanding of their roles and responsibilities in the event of a disruption. The training program should be offered on a continuing basis for existing and new employees and should be updated to address changes to the plan.
(2) Plan maintenance. Plans and results of BIA and risk assessment should be reviewed and updated on an ongoing basis (at least annually or when necessary) so that they remain consistent with the BSFI’s current operations and business strategies.
a. Pandemic planning. Similar to natural disasters or technical disruptions, pandemics may also interrupt a BSFI’s business activities. However, the difficulty in determining a pandemic’s scope and duration present additional challenges in ensuring resilience and continuity of a BSFI’s operations.
(1) Business impact analysis and risk assessment. The BCM process should consider pandemics as early as the BIA and risk assessment phase. The BIA and risk assessment should be updated to incorporate complexities that may arise from pandemics, such as (a) increasing level of absenteeism based on a pandemic’s severity; and (b) the need for another layer of contingency plans as regular disaster or emergency response methods are no longer feasible.
(2) Strategy formulation. To complement strategies for natural and technical disruptions, the following should be given due consideration when planning for pandemics:
(a) Trigger events – Trigger events and strategies should be defined depending on the nature of a pandemic. Pandemic planning should have the flexibility to accommodate varying degrees of epidemic or outbreak as pandemics normally occur in waves or phases and of varying severity.
(b) Remote access capability – In the event of a pandemic, enabling remote access may be one of the primary strategies available to a BSFI. To support a telecommuting strategy, the BSFI should ensure adequate capacity, bandwidth and authentication mechanisms in its technological infrastructure against expected network traffic or volume of transactions.
(c) External parties – With pandemics not limited to the BSFI, establishing working relationships with external parties is an essential component. In addition to the communication plan for all relevant internal and external stakeholders, the BSFI should establish open relationships and communication channels with local public health and emergency response teams or other government authorities. The BSFI should inform concerned parties of any potential outbreaks and, at the same time, be aware of any developments in the expected scope and duration of a pandemic.
(d) Employee awareness – As information becomes available from reputable sources or local agencies, the BSFI should ensure that steps to limit or reduce the risk of being affected by the pandemic are cascaded to its employees.
(3) Plan development. Pandemic plans should be commensurate with the nature, size and complexity of a BSFI’s business activities and have sufficient flexibility to address the various scenarios that may arise. At a minimum, the pandemic plan should include:
(a) Strategy that is scalable dependent on the extent and depth of the outbreak;
(b) Preventive measures, including monitoring of current environment and hygiene tools available to employees;
(c) Communication plan with internal and external stakeholders, including concerned local public health teams and government agencies; and
(d) Tools, systems and procedures available to ensure continuity of its critical operations even with the unavailability of BSFI’s staff for prolonged periods.
(4) Plan testing. Test policy/plan should include strategies to assess capability to continue critical operations, systems and applications even in the event of a severe pandemic. When regular tests are unable to cover pandemic scenarios, separate pandemic plan tests should be carried out.
(5) Personnel training and plan maintenance. The plan should be updated as developments and information become available. As needed, employee training programs should cover pandemic risks, including the roles and responsibilities of each employee during pandemic situations.
b. Cyber resilience. Cyber-threats and attacks against the financial services industry have become increasingly widespread, sophisticated and coordinated. Recent cyber-attacks worldwide highlight, not only the degree of disruption to a BSFI’s operations, but also the extent of reputational damage which could undermine public trust and confidence. As such, the BSFI should consider the potential impact of these cyber events into its BCM process and institute adequate cyber resilience capabilities.
c. Information security. Mitigation strategies should consider security controls to manage risks that may arise once an event triggers plan activation. Security during disasters and disruptions is an important consideration to manage risks arising from the change in working environment. The relevant guidelines/standards on information security that may be considered in strategy formulation and/or in choosing alternate sites are in Appendix 75.
d. Interdependencies. An effective plan coordinates across its many internal and external components, identifies potential process or system dependencies, and mitigates risks from interdependencies. The BSFI may have very complex operating and recovery environment wherein interdependencies need to be duly considered, such as telecommunications, third party service providers, and recovery site. Given the critical resources and services that are being shared with the BSFI or other entities, additional mitigating controls and recovery strategies need to be integrated in the plan.
e. Liquidity risk management. Sound liquidity risk management practices enable a BSFI to maintain availability of funds even in times of financial stress or adverse changes in market conditions. In the event of a business disruption, sound liquidity risk management practices should similarly apply. The BSFI should ensure it has sufficient liquidity to support its recovery strategies and continue supporting the delivery of basic banking services to the clients pending full business resumption. Guidelines on liquidity risk management are in Appendix 71.
f. Project management. Senior management should ensure that availability and business continuity requirements are considered at the planning and development stages of new business products and services and other critical technology processes, such as systems development and acquisition, and change management.
g. Event/problem management. Operations personnel should be properly trained to recognize events that could trigger implementation of the plan. Although an event may not initially activate the plan, it may become necessary as conditions and circumstances change. Management should train and test BSFI personnel to implement and perform appropriate business continuity procedures within the timeframes of the plan.
h. Outsourcing. When a BSFI enters into an outsourcing arrangement, it should put due consideration on the business continuity and disaster recovery arrangements of the service provider to ensure continuity of operations. Detailed guidelines/standards on business continuity considerations for outsourcing arrangements are in Appendix 77.
i. Insurance. Insurance is an option available to a BSFI for recovery of losses that cannot be completely prevented and the expenses related to recovering from a disruption. The BSFI should regularly review the adequacy and coverage of its insurance policies in reducing any foreseeable risks caused by disruptive events, such as loss of offices, critical facilities and equipment, and casualty. Insurance policies may also need to address the BSFI’s legal responsibilities for failing to deliver services to its customers and counterparties. To facilitate the claims process, the BSFI should create and retain a comprehensive hardware and software inventory list in a secure off-site location and detailed expenses should be documented to support insurance claims.
(Circular No. 951 dated 20 March 2017)
Footnotes
- BSFIs shall comply with the foregoing standards on BCM within a period of one (1) year from 11 April 2017. In this regard, a BSFI should be able to show its plan of actions with specific timelines, as well as the status of initiatives being undertaken to fully comply with the provisions of Sec. 149 starting July 2017, upon request of the Bangko Sentral.
- Pursuant to Sec. 148 (Complexity of IT risk profile), BSFIs are classified as “simple” but maybe re-classified as “complex” depending on extent or degree of reliance of core business functions to technology.