Establishing the business continuity policy

To meet the ISO 22301 establishing the business continuity policy requirement, top management must issue a documented business continuity policy that sets the direction for BC objectives, commits the organization to meeting applicable requirements, and commits to continual improvement (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements). Operationalize it by drafting a policy with clear scope, governance, and review rules, then approving, communicating, and periodically reviewing it.

Key takeaways:

  • The policy is a top-management instrument: it sets direction, not a runbook.
  • Auditors will test governance: approval, communication, applicability commitments, and periodic review evidence.
  • Write the policy to drive measurable objectives, assigned ownership, and an improvement loop tied to your BCMS.

“Establishing the business continuity policy” is a governance requirement, not a documentation exercise. Clause 5.2.1 of ISO 22301:2019 expects top management to set a clear, organization-wide policy that frames how you will set business continuity (BC) objectives, meet applicable requirements, and continually improve the business continuity management system (BCMS) (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

For a CCO, GRC lead, or continuity owner, the fastest path is to treat the policy as the “constitution” of the BCMS. It should be short enough that executives will sign it and staff will read it, but specific enough that it drives action: scope boundaries, accountability, and how requirements are identified and met. Most failed audits here are not because the policy is missing, but because it is generic, not clearly approved by top management, not communicated, or disconnected from objectives and review cadence.

This page translates the clause into operator steps, evidence to retain, and the exam questions you should be ready to answer.

Regulatory text

ISO requirement (excerpt): “Top management shall establish a business continuity policy that provides a framework for setting objectives, commits to satisfying applicable requirements, and includes continual improvement.” (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)

What the operator must do (plain-English)

You must have a documented, top-management-approved business continuity policy that:

  1. Provides a framework for setting BC objectives (the policy must point to how objectives will be defined and governed, not just state aspirations).
  2. Commits to satisfying applicable requirements (legal, regulatory, contractual, and other obligations you choose to adopt).
  3. Commits to continual improvement of the BCMS (a real improvement mechanism, not a slogan).
    This policy also needs to be communicated and periodically reviewed as part of keeping it effective (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

Plain-English interpretation (what “good” looks like)

A compliant policy answers, in one to two pages:

  • What BC means here: which parts of the business and which services/products are in scope.
  • Who is accountable: who owns the BCMS, who approves exceptions, and who reports to top management.
  • How objectives get set and tracked: the policy “frames” objectives by requiring measurable targets and management review, even if the objectives live elsewhere.
  • What requirements you commit to meet: you commit to identifying and meeting applicable obligations and keeping that obligation inventory current.
  • How you improve: you commit to learning from tests, incidents, audits, and reviews, then updating the BCMS.

If your policy reads like a brochure, auditors will treat it like a brochure.

Who it applies to

Entity types

  • Any organization implementing or certifying to ISO 22301 (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).
  • Business continuity practitioners responsible for operating the BCMS on behalf of top management.

Operational context (where this becomes real)

  • Organizations with material operational resilience needs: customer-facing services, regulated operations, safety-sensitive operations, complex supply chains, or significant third-party dependencies.
  • Distributed environments where multiple business units must align on one BC direction.
  • Environments with frequent change (system migrations, outsourcing, M&A) where continuity assumptions go stale quickly.

What you actually need to do (step-by-step)

Step 1: Confirm “top management” ownership and approval path

  • Identify who qualifies as top management in your governance model (board, CEO, executive committee, or equivalent).
  • Decide who will sponsor the policy and who will sign/approve it.
  • Define the policy’s relationship to other policies (risk management, information security, crisis management). Keep BC policy authoritative for BCMS direction.

Operator tip: If the policy is approved only at a program-manager level, you will struggle to prove “top management shall establish.”

Step 2: Define policy scope and applicability boundaries

Write explicit statements for:

  • Organizational scope (entities, regions, business units).
  • What “business continuity” covers (critical products/services, supporting processes, and dependencies).
  • Inclusion of relevant third parties (outsourcers, key suppliers, cloud/service providers) as continuity dependencies.

Avoid overpromising. If you cannot support an enterprise-wide scope, define a phased scope and document it.

Step 3: Write the “framework for setting objectives” section

Your policy should require that BC objectives:

  • Are established for relevant functions/services in scope.
  • Have assigned owners.
  • Are reviewed by management and updated when conditions change.

You do not need to list the objectives in the policy. You need language that forces objectives to exist, be governed, and be reviewable (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

Step 4: Insert a concrete commitment to satisfy applicable requirements

Include a clause that commits to:

  • Identifying applicable requirements (legal, regulatory, contractual, and internal commitments you adopt).
  • Maintaining a mechanism to keep them current.
  • Demonstrating compliance through controls, testing, and evidence.

This is where continuity policies often fail: they declare intent without connecting to obligation management.

Step 5: Specify continual improvement expectations

Continual improvement should be operational, for example:

  • Lessons learned from incidents and exercises feed corrective actions.
  • Audit findings, management review outputs, and KPI/KRI trends drive updates to plans, training, and controls.

Keep it outcome-based. You are committing to an improvement loop for the BCMS (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

Step 6: Add governance mechanics (short, but testable)

Include:

  • Roles: BCMS owner, business unit owners, IT/ops, third-party management, communications/crisis roles.
  • Policy exception handling: who can approve, how exceptions are documented, and expiry/renewal logic.
  • Document control expectations: versioning, approval, and where the authoritative copy lives.

Step 7: Communicate the policy in a way you can prove

Auditors will ask “how do you know people received it?” Build a lightweight communication plan:

  • Publish to a controlled repository (policy portal).
  • Require acknowledgement for in-scope roles (where feasible).
  • Brief key operational teams (incident response, IT operations, facilities, customer support).

Step 8: Review the policy periodically and on trigger events

ISO expects periodic review, and practical operations need trigger-based review after:

  • Major org changes (re-org, M&A).
  • Major technology changes (core platform migrations).
  • Material incidents or exercise outcomes.

Keep minutes or review records. The policy can say “periodically” while your procedure defines how review is executed (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

Required evidence and artifacts to retain

Maintain an audit-ready package that ties back to the clause:

Core artifacts

  • Business continuity policy (current, controlled version).
  • Top management approval evidence: signed approval page, board/executive minutes, or equivalent authorization record.
  • Communication evidence: publication record, acknowledgement logs, training/briefing attendance, intranet announcement with controlled distribution list.
  • Review evidence: documented periodic review results, version history, and rationale for changes.
  • Objective framework linkage: referenced BC objectives document(s) and evidence that objectives are set and reviewed (even if objectives are maintained outside the policy).
  • Applicable requirements linkage: a register or mapped list of applicable requirements relevant to BC and evidence of how the program tracks changes.

Practical packaging tip

Create a single “BC Policy Evidence” folder (or Daydream workspace) with an index page that points to each artifact and its owner. Auditors reward clarity.

Common exam/audit questions and hangups

Expect these questions, and prepare short, direct answers with evidence:

  • “Show me the BC policy and who approved it.” Provide the policy plus signed approval or meeting minutes.
  • “How does the policy provide a framework for objectives?” Point to the policy section that mandates objective setting and ownership, then show the objectives register and review record.
  • “What are ‘applicable requirements’ for your organization, and where is the commitment operationalized?” Show your requirements register and mapping to BC controls and testing.
  • “How is this policy communicated?” Provide the communication record and where it is published.
  • “When was it last reviewed, and what changed?” Provide version history and review notes.

Hangup to avoid: confusing the policy (direction and commitments) with plans and procedures (how-to details). You need both, but auditors test them differently.

Frequent implementation mistakes (and how to avoid them)

  1. Generic policy language copied from templates. Fix: add org-specific scope, governance, and objective framework language tied to how you actually run BC.
  2. No clear “applicable requirements” mechanism. Fix: explicitly reference a maintained obligations register and assign ownership.
  3. Policy exists but isn’t “established by top management.” Fix: get explicit executive approval; keep the record.
  4. Communication is informal. Fix: publish through a controlled channel and retain evidence.
  5. No review trail. Fix: maintain version history and documented review outcomes.

Enforcement context and risk implications

No public enforcement cases were provided for this requirement. Practically, failure here increases regulatory and customer risk because a weak policy often signals weak governance: unclear accountability, inconsistent objectives, and gaps in meeting contractual or regulatory continuity commitments. It also increases incident impact because teams default to ad hoc decision-making during disruption.

Practical 30/60/90-day execution plan

Numeric timelines and day counts are intentionally avoided here; treat this as phased execution you can run at your pace.

Immediate (foundation)

  • Confirm executive sponsor and approval route.
  • Draft the policy with the three required commitments: objectives framework, applicable requirements, continual improvement (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).
  • Decide scope boundaries and document control approach.

Near-term (operationalize)

  • Obtain top management approval and record it.
  • Publish and communicate the policy to in-scope teams; capture evidence.
  • Build or refresh the “applicable requirements” register relevant to continuity and connect it to control ownership.
  • Stand up the objective-setting mechanism (owners, review forum, and tracking).

Ongoing (prove and improve)

  • Run policy review through management review inputs (audit results, exercises, incidents).
  • Track improvements as corrective actions with owners and due dates.
  • Keep evidence continuously: approvals, communications, exceptions, and review notes.

Where Daydream fits naturally: Daydream can centralize the policy, approval records, communications evidence, and mappings between objectives, obligations, and corrective actions so audits do not become a scavenger hunt.

Frequently Asked Questions

Do we need a separate business continuity policy if we already have an enterprise risk policy?

If the risk policy does not explicitly provide a framework for BC objectives, commit to meeting applicable requirements for continuity, and commit to continual improvement of the BCMS, it will not satisfy the requirement on its own (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements). Many organizations keep a dedicated BC policy and cross-reference the risk policy.

What counts as “top management” for approval?

Use your organization’s definition of top management for management system governance, typically the executives who direct and control the organization at the highest level. Document who approved the policy and retain the approval record so you can demonstrate the policy was established by top management (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

How long should the business continuity policy be?

Keep it short enough to be read and enforced, but specific enough to define scope, governance, and the three required commitments (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements). Most teams treat it as a high-level direction document and put procedures and plans elsewhere.

Do we have to list our business continuity objectives inside the policy?

No. The requirement is that the policy provides a framework for setting objectives, not that it enumerates them (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements). Reference where objectives live and how they are approved, reviewed, and updated.

What are “applicable requirements” in a business continuity context?

Applicable requirements can include legal/regulatory obligations, customer and contractual commitments, and internal requirements you adopt for continuity. Your policy should commit to identifying and meeting them, and you should maintain evidence of how you track and operationalize those obligations (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

How do we prove “continual improvement” for the BC policy requirement?

Show that policy reviews and BCMS changes occur based on exercises, incidents, audits, and management review outputs, and that changes are controlled and approved (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements). Version history plus corrective action tracking is usually the cleanest proof.

Frequently Asked Questions

Do we need a separate business continuity policy if we already have an enterprise risk policy?

If the risk policy does not explicitly provide a framework for BC objectives, commit to meeting applicable requirements for continuity, and commit to continual improvement of the BCMS, it will not satisfy the requirement on its own (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements). Many organizations keep a dedicated BC policy and cross-reference the risk policy.

What counts as “top management” for approval?

Use your organization’s definition of top management for management system governance, typically the executives who direct and control the organization at the highest level. Document who approved the policy and retain the approval record so you can demonstrate the policy was established by top management (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

How long should the business continuity policy be?

Keep it short enough to be read and enforced, but specific enough to define scope, governance, and the three required commitments (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements). Most teams treat it as a high-level direction document and put procedures and plans elsewhere.

Do we have to list our business continuity objectives inside the policy?

No. The requirement is that the policy provides a framework for setting objectives, not that it enumerates them (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements). Reference where objectives live and how they are approved, reviewed, and updated.

What are “applicable requirements” in a business continuity context?

Applicable requirements can include legal/regulatory obligations, customer and contractual commitments, and internal requirements you adopt for continuity. Your policy should commit to identifying and meeting them, and you should maintain evidence of how you track and operationalize those obligations (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

How do we prove “continual improvement” for the BC policy requirement?

Show that policy reviews and BCMS changes occur based on exercises, incidents, audits, and management review outputs, and that changes are controlled and approved (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements). Version history plus corrective action tracking is usually the cleanest proof.

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
ISO 22301: Establishing the business continuity policy | Daydream