Scope of the BCMS
The ISO 22301 scope of the BCMS requirement means you must (1) define what parts of the organization, locations, products/services, and activities your BCMS covers, (2) apply every ISO 22301 requirement to everything inside that scope, and (3) keep the scope as controlled documented information. Auditors will test scope boundaries first because scope drives every downstream BCMS control.
Key takeaways:
- Your scope statement is a control boundary; anything in scope must meet all ISO 22301 clauses.
- “Scope” must be documented, controlled, and available to relevant stakeholders (not buried in a slide deck).
- Most findings come from scope exclusions that are not justified, not aligned to BIA/critical processes, or not reflected in evidence.
“Scope of the BCMS” is a deceptively short requirement with outsized operational impact. If your scope is vague, outdated, or inconsistent with how the business actually runs, you will struggle to pass an ISO 22301 audit and you will struggle to run an effective program during disruption. A good scope statement acts like a map: it tells the organization where ISO 22301 controls apply, which teams must participate, what assets and sites must be covered, and what third parties and outsourced processes must be included in analysis and planning.
For a Compliance Officer, CCO, or GRC lead, the goal is speed with defensibility: define scope clearly enough that you can operationalize the BCMS immediately, and control the document so it stays accurate as the organization changes. You also need to prevent a common failure mode: treating scope as a marketing sentence (“global BCMS covers all operations”) while evidence only exists for one region or one business line.
This page translates ISO 22301:2019 Clause 4.3.2 into concrete steps, audit-ready artifacts, and a practical execution plan you can run with your continuity lead, business owners, IT, facilities, and procurement/third-party risk teams.
Regulatory text
Requirement (excerpt): “The organization shall apply all requirements of this document within the determined scope. The scope shall be available as documented information.” 1
Operator interpretation:
- You must define the BCMS scope (your boundary).
- Everything inside that boundary must comply with all applicable ISO 22301 requirements (not a subset).
- The scope must exist as controlled documented information that people can access and auditors can verify. 1
What “apply all requirements within scope” means in practice
- If a site, business unit, or service is in scope, then your BCMS processes (BIA, risk assessment, strategies, plans, exercising, performance evaluation, management review, corrective action) must cover it.
- If a function is out of scope, you need a clean boundary and rationale; you also need to avoid “shadow scope” where dependencies pull it back in (for example, an out-of-scope team that runs an in-scope production platform).
Plain-English requirement
Document a clear statement of what your BCMS covers, then run the entire ISO 22301 program against that coverage area, and keep the scope document current, controlled, and accessible. 1
Who it applies to
Entity types: Any organization implementing ISO 22301, including public and private organizations, and business continuity practitioners operating the BCMS. 1
Operational contexts where scope gets tricky (and is often tested):
- Multi-entity groups (parent + subsidiaries) where legal entity boundaries do not match operational dependencies
- Multi-site operations (HQ, branches, warehouses, plants, data centers)
- Hybrid delivery (internal operations + outsourced activities + cloud services)
- Shared services (IT, HR, finance) that support multiple business lines, some intended for exclusion
What you actually need to do (step-by-step)
Step 1: Establish scope ownership and change control
- Assign a single accountable owner for the scope statement (often the BCMS manager; the GRC lead can own document control).
- Define how scope changes are proposed, reviewed, approved, and communicated (tie to your document control process).
- Set a trigger list for review: mergers, new products, new sites, major outsourcing, material technology changes, and organizational restructures.
Why this matters: Auditors treat a stale scope document as a signal the BCMS is not managed as a system. 1
Step 2: Draft the scope statement using a structured template
Avoid one-line scope statements. Use a scope format that forces clarity:
Recommended scope fields (include what you can defend with evidence):
- Organizational boundaries: legal entities, business units, departments included
- Physical boundaries: sites, offices, plants, warehouses, data centers
- Service boundaries: products and services delivered; customer-facing commitments
- Activity boundaries: critical processes, supporting processes, and enabling functions included
- Technology boundaries: key platforms, networks, and systems that support in-scope services
- Third-party boundaries: outsourced processes and key third parties that enable in-scope activities
- Explicit exclusions: what is excluded and why (with dependency check)
Practical wording tip: Use “includes” lists more than “covers all.” “Covers all” creates an audit burden you may not be ready to meet.
Step 3: Validate scope against how the business works
Run a short, structured validation with stakeholders:
- Business owners for in-scope services
- IT and security (for platforms and recovery dependencies)
- Facilities (for site and access constraints)
- Procurement/TPRM (for third-party dependencies)
- Legal/compliance (for entity boundaries and contractual commitments)
Validation tests auditors implicitly run:
- Does the scope match the org chart and service catalog?
- Do the most critical revenue/mission services appear in scope?
- Are key dependencies (IT, facilities, third parties) represented?
Step 4: Confirm “apply all requirements” coverage with a scope-to-clauses matrix
Create a simple matrix that maps:
- In-scope entities/sites/services/processes (rows)
- ISO 22301 program elements (columns: BIA, risk assessment, strategies, plans, training/awareness, exercising, internal audit, management review, corrective action)
This matrix becomes your operational checklist: if a row is in scope, it needs evidence across the columns. 1
Step 5: Publish as controlled documented information
“The scope shall be available as documented information” means:
- A formally approved document with version control
- Stored in a controlled repository with access controls
- Accessible to people who need it (continuity team, process owners, internal audit, relevant leadership)
If you keep it in a GRC tool, make sure you can export it for audit and show approval history.
Step 6: Make scope operational (embed into downstream BCMS work)
Update your BCMS operating rhythm to reference scope explicitly:
- BIA population is derived from in-scope services/processes
- Plan inventory is derived from in-scope sites/teams/systems
- Exercise schedule covers in-scope plans
- Internal audit sampling is drawn from in-scope components
- Third-party continuity due diligence aligns to in-scope outsourced dependencies
Daydream fit (where it earns a mention): If your scope touches many third parties, Daydream can help you keep the third-party inventory, criticality, and continuity evidence aligned to your BCMS scope so exclusions and gaps show up early instead of during an audit.
Required evidence and artifacts to retain
Minimum set that auditors and internal reviewers typically expect:
- BCMS Scope Statement (controlled document with version history and approvals) 1
- Scope rationale notes (meeting minutes, decision log, dependency analysis, exclusion justification)
- Scope-to-clauses coverage matrix (or equivalent traceability artifact)
- Communication evidence (where the scope is published; stakeholder distribution)
- Change control records (scope revisions, approvals, and trigger-based reviews)
Common exam/audit questions and hangups
Auditors often start here because scope sets the audit boundary.
- “Show me the documented scope and who approved it.” 1
- “How do you ensure all ISO 22301 requirements are applied within scope?” 1
- “What’s excluded, and how did you confirm exclusions don’t support in-scope services?”
- “Which sites and business units are included, and where is that reflected in your BIA and plans?”
- “How is the scope kept current after organizational changes?”
Hangup to anticipate: If your BIA includes processes outside the scope (or omits in-scope ones), auditors will treat that as evidence the scope is not real.
Frequent implementation mistakes (and how to avoid them)
| Mistake | Why it fails | How to avoid it |
|---|---|---|
| Vague “global” scope | Creates an obligation to show evidence everywhere | Write explicit inclusions by entity/site/service; expand deliberately |
| Exclusions without rationale | Looks like scope manipulation | Document why excluded parts do not affect in-scope services |
| Scope not reflected in BC artifacts | Scope becomes “paper only” | Derive BIA population, plan inventory, and exercises from scope |
| Scope not controlled | No proof of currency or approval | Put scope under document control with versioning and approvals |
| Ignoring third-party dependencies | In-scope services often depend on third parties | List key outsourced activities/third parties in scope boundary and tie them to BIA/strategies |
Enforcement context and risk implications
No public enforcement cases were provided for this requirement in the source catalog, and ISO 22301 is a voluntary standard rather than a regulator-issued rule. The risk is still concrete: a weak scope causes audit nonconformities, drives wasted effort (teams build plans for the wrong perimeter), and creates unmanaged continuity exposure where “out of scope” functions quietly support “in scope” services. 1
Practical 30/60/90-day execution plan
First 30 days (stabilize and publish)
- Name the scope owner and approver(s); establish document control.
- Draft the scope statement with explicit inclusions/exclusions.
- Hold a scope validation workshop with business, IT, facilities, and TPRM.
- Publish the controlled scope document in your policy repository.
By 60 days (make it auditable)
- Build the scope-to-clauses coverage matrix and use it as your BCMS workplan.
- Reconcile scope to BIA population and plan inventory; fix mismatches.
- Create an exclusions dependency check (short memo or table) and attach it to the scope decision log.
By 90 days (operate it)
- Embed scope checks into change management: require a BCMS scope impact review for material org/tech/third-party changes.
- Run an internal “scope audit”: pick several in-scope services and prove you have BIA, strategies, plans, and exercise evidence for each. 1
Frequently Asked Questions
Can we exclude certain departments from the BCMS scope?
Yes, but document the exclusion and confirm the excluded department does not provide required inputs, systems, or operational support for in-scope services. If it supports in-scope services, auditors may treat it as effectively in scope.
Does “scope shall be available as documented information” mean a formal policy?
It must be a controlled document with approval and version control. It can be a standalone scope document or part of the BCMS manual, as long as it is accessible and managed as documented information. 1
How detailed should the scope statement be?
Detailed enough that an independent person can tell what is included (entities, sites, services, activities) and what is excluded. If your statement can’t be used to generate a BIA and plan inventory, it is too vague.
What’s the fastest way to prove we “apply all requirements” within scope?
Maintain a scope-to-clauses matrix and map each in-scope service/site to BIA completion, continuity strategies, plan ownership, training/awareness, and exercise coverage. Auditors accept traceability when it is consistent and evidence-backed. 1
How do third parties fit into BCMS scope?
If an in-scope process is outsourced, the third party becomes part of your continuity dependency chain. Your scope should identify the outsourced activity and drive due diligence and continuity requirements through procurement and third-party risk workflows.
Our organization changes frequently. How do we keep scope current without constant rewrites?
Use trigger-based updates tied to change management and procurement, and keep a decision log that records additions/removals and rationale. Treat the scope as a living controlled document, not a one-time deliverable. 1
Footnotes
Frequently Asked Questions
Can we exclude certain departments from the BCMS scope?
Yes, but document the exclusion and confirm the excluded department does not provide required inputs, systems, or operational support for in-scope services. If it supports in-scope services, auditors may treat it as effectively in scope.
Does “scope shall be available as documented information” mean a formal policy?
It must be a controlled document with approval and version control. It can be a standalone scope document or part of the BCMS manual, as long as it is accessible and managed as documented information. (Source: ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)
How detailed should the scope statement be?
Detailed enough that an independent person can tell what is included (entities, sites, services, activities) and what is excluded. If your statement can’t be used to generate a BIA and plan inventory, it is too vague.
What’s the fastest way to prove we “apply all requirements” within scope?
Maintain a scope-to-clauses matrix and map each in-scope service/site to BIA completion, continuity strategies, plan ownership, training/awareness, and exercise coverage. Auditors accept traceability when it is consistent and evidence-backed. (Source: ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)
How do third parties fit into BCMS scope?
If an in-scope process is outsourced, the third party becomes part of your continuity dependency chain. Your scope should identify the outsourced activity and drive due diligence and continuity requirements through procurement and third-party risk workflows.
Our organization changes frequently. How do we keep scope current without constant rewrites?
Use trigger-based updates tied to change management and procurement, and keep a decision log that records additions/removals and rationale. Treat the scope as a living controlled document, not a one-time deliverable. (Source: ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream