Business continuity objectives and planning

ISO 22301:2019 Clause 6.2 requires you to set business continuity objectives for relevant functions, levels, and processes, then plan how you will achieve and measure them. Operationalize it by defining measurable continuity targets 1, assigning owners, resourcing the work, setting due dates, and creating an evaluation method that proves the objectives are being met (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

Key takeaways:

  • Business continuity objectives must be defined where they matter: critical processes, supporting functions, and organizational levels.
  • Objectives must be measurable and traceable to the BC policy, with named owners, resources, deadlines, and evaluation methods.
  • Your exam-ready evidence is a controlled objectives register plus plans, test results, and management review outputs that show progress and gaps.

“Business continuity objectives and planning” is the bridge between a high-level business continuity policy and what operators actually do during disruption. Clause 6.2 is where auditors stop accepting intent and start looking for measurable targets, assigned accountability, and proof of follow-through. If your BC program has a BIA and some recovery plans but no agreed objectives per process, you will struggle to demonstrate control effectiveness, prioritize investments, or defend exceptions.

For a Compliance Officer, CCO, or GRC lead, the fastest path is to treat objectives as a governed register: each objective ties to a business service or process, has a metric and target, an owner, a due date, the resources required, and an evaluation method. Planning then becomes the execution layer: projects, playbooks, testing, and reporting that show the organization is moving toward those targets and can prove it.

This page translates Clause 6.2 into requirement-level steps you can implement, evidence you can retain, and the exam questions that typically expose weak programs (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

Regulatory text

Requirement (excerpt): “The organization shall establish business continuity objectives at relevant functions, levels and processes.” (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)

What the operator must do: Establish documented business continuity objectives that are (a) set at the right scope (functions, levels, processes), (b) measurable, (c) consistent with your business continuity policy, (d) communicated, and (e) supported by plans that specify actions, resources, responsibilities, deadlines, and how you will evaluate results (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

Plain-English interpretation

You need to decide, in concrete terms, what “continuity” means for your organization and for the processes that keep it running, then build and run a plan that makes those targets real.

Practically, auditors expect answers to:

  • What must be recovered and by when? (objectives per critical process/service)
  • Who owns each target? (named accountable roles)
  • What are you doing to meet it? (projects, playbooks, contracts, technical controls, training)
  • How do you know it works? (tests, exercises, KPIs/KRIs, after-action reports, corrective actions)

Who it applies to (entity and operational context)

Clause 6.2 applies to any organization implementing a Business Continuity Management System (BCMS), regardless of industry or size (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

Operationally, it applies wherever disruption can break delivery of products/services, including:

  • Business services and product lines (customer-facing operations, revenue-critical workflows)
  • Supporting functions (IT, security operations, facilities, HR, finance, legal, procurement)
  • Locations and teams (sites, regions, remote work arrangements)
  • Third parties that underpin continuity (cloud providers, payroll processors, call centers, critical suppliers). Your objectives should account for dependencies even if the obligation ultimately sits in third-party contracts and oversight.

What you actually need to do (step-by-step)

1) Set the scope and “relevant” areas

Start with your service/process inventory and identify where continuity objectives are required:

  • Critical business services/processes (from BIA or risk assessment outputs)
  • Enabling processes (identity, network, workplace, communications, customer support)
  • Management levels that must own decisions (executive, business unit, process owners)

Deliverable: a scoped list of in-scope processes/services mapped to accountable owners.

2) Define measurable business continuity objectives

For each in-scope process/service, define objectives with:

  • Metric (what you measure)
  • Target (what “good” looks like)
  • Conditions/assumptions (e.g., “regional outage,” “loss of primary site,” “key staff unavailable”)
  • Tolerance and exceptions (what can slip, who can approve)

Common objective types (choose what fits your environment and policy):

  • Time-based recovery targets (for restoring a process capability)
  • Capacity/throughput targets during disruption
  • Data integrity targets (what data must be preserved and how)
  • Communications targets (customer/regulator communications readiness)
  • Dependency targets (minimum availability/response from critical third parties)

Tip for operators: Keep objectives few and auditable. If you cannot test it, you cannot defend it.

Deliverable: a controlled Business Continuity Objectives Register.

3) Align objectives to the BC policy and governance

Demonstrate internal consistency:

  • Map each objective to the BC policy statement(s) it supports.
  • Ensure leadership has approved the objective categories and exception process.
  • Define who can accept residual continuity risk when targets cannot be met.

Deliverable: crosswalk from objectives to policy; governance/approval record.

4) Build plans that make the objectives achievable

Clause 6.2 expects planning detail, not just targets. For each objective (or objective set), document:

  • What will be done (projects and operational procedures)
  • Resources required (people, tooling, alternate sites, funding line items, contracts)
  • Responsibilities (RACI; escalation paths)
  • Deadlines and milestones
  • How results will be evaluated (tests, exercises, KPIs; review cadence)

This is where you connect to other BCMS components:

  • Business continuity strategies and solutions
  • Incident/crisis management playbooks
  • IT disaster recovery plans and runbooks
  • Third-party continuity requirements and monitoring

Deliverable: an Objective Implementation Plan (often a roadmap with linked work items).

5) Communicate objectives to the people who must execute

Communication means more than posting a policy:

  • Provide process owners and on-call teams a one-page “continuity target sheet” per service.
  • Train crisis management roles on what must be achieved and what tradeoffs are allowed.
  • Ensure third-party owners know which suppliers underpin each objective.

Deliverable: training/communication records and role-based job aids.

6) Evaluate performance and drive corrective action

Define evaluation methods that produce evidence:

  • Exercises and tests tied to objectives (tabletop and operational tests)
  • After-action reports that state whether each objective was met
  • Corrective action plans with owners and due dates
  • Management review outputs that track progress and approve exceptions

Deliverable: test/exercise evidence plus corrective action tracking, showing closure.

Required evidence and artifacts to retain

Auditors typically want a straight line from objective → plan → proof. Retain:

  • Business Continuity Objectives Register (version-controlled)
  • Objective approvals (steering committee minutes, exec sign-off)
  • Plans/roadmaps that specify actions, resources, responsibilities, deadlines, evaluation method
  • BIAs or risk assessments that justify why objectives are “relevant” at those processes/levels
  • Exercise/test plans, scripts, results, and after-action reports
  • Corrective action log (issues, owners, status, closure evidence)
  • Communications/training materials and attendance/acknowledgements
  • Third-party continuity requirements and attestations where they support your objectives

If you manage this in Daydream, the practical win is traceability: objectives, owners, evidence, exceptions, and remediation tasks stay linked so you can answer audit questions without rebuilding the narrative from spreadsheets.

Common exam/audit questions and hangups

Expect examiners and auditors to probe:

  • “Show me your continuity objectives for this critical process. Who approved them?”
  • “How do these objectives align to your BC policy?”
  • “Which objectives rely on third parties, and how do you validate the dependency?”
  • “When did you last test against this objective, and did you meet it?”
  • “What happens when you miss an objective? Who accepts the risk, and where is that documented?”
  • “How do you ensure objectives stay current after org/tech changes?”

Hangups that slow audits:

  • Objectives exist only at enterprise level, not per process.
  • Targets are vague (“recover quickly,” “minimal downtime”).
  • Testing is performed, but it is not tied to specific objectives and pass/fail criteria.

Frequent implementation mistakes and how to avoid them

Mistake: Writing objectives that cannot be measured

Avoidance: Require every objective to have a metric, target, and evaluation method. If a target is politically hard to quantify, start with a measurable “minimum viable objective” and iterate after initial tests.

Mistake: Treating IT DR objectives as the only BC objectives

Avoidance: Add business process objectives (manual workarounds, staffing, customer communications, regulatory reporting). Many continuity failures are operational, not purely technical.

Mistake: No resourcing plan

Avoidance: For each objective, document what people, tools, and third-party commitments are required. If you cannot resource it, treat it as a risk decision with formal exception/acceptance.

Mistake: Testing that proves activity, not outcomes

Avoidance: Design exercises to produce objective-level evidence: did you meet the target, yes/no, under defined conditions?

Mistake: Objectives don’t survive change

Avoidance: Tie objective review to change management triggers: new systems, reorganizations, major vendor changes, new sites, material incidents.

Risk implications (why auditors care)

Poorly defined continuity objectives create two predictable outcomes:

  1. You cannot prioritize: teams spend on controls that do not move the needle on recoverability of the most important services.
  2. You cannot prove readiness: during audits, you show plans and tests but fail to demonstrate that they achieve specific continuity outcomes.

In a real incident, the gap shows up as misaligned expectations: leadership assumes a service can be restored within a certain timeframe, while engineering and operations planned for something else. Clause 6.2 is meant to remove that ambiguity (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

Practical execution plan (30/60/90)

First 30 days (Immediate)

  • Confirm BC policy exists and is current; capture the governing statements your objectives must support.
  • Compile the list of critical services/processes and owners (use existing BIA/risk outputs if available).
  • Stand up a draft Business Continuity Objectives Register with a small set of initial objectives for the most critical services.
  • Define the exception and approval workflow for objectives you cannot meet today.

By 60 days (Near-term)

  • Complete objectives for remaining in-scope services/processes and enabling functions.
  • Create objective implementation plans: actions, resources, responsibilities, deadlines, evaluation method.
  • Align third-party dependencies: identify which suppliers are required to meet each objective and document continuity requirements/assurance approach.
  • Build an exercise schedule that tests against objectives with pass/fail criteria.

By 90 days (Operationalize and prove)

  • Run exercises/tests tied to your top objectives; produce after-action reports with objective-level outcomes.
  • Open and track corrective actions; document risk acceptance where gaps remain.
  • Conduct a management review discussion that addresses objective attainment trends, major gaps, and resourcing decisions.
  • Establish ongoing review triggers (org/tech changes, incidents, vendor changes) and update cadence for the objectives register.

Frequently Asked Questions

Do business continuity objectives have to be set for every process in the company?

No. Clause 6.2 requires objectives at “relevant functions, levels and processes,” so you should scope objectives to critical services/processes and the functions that enable them (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

Are RTO/RPO required by ISO 22301 Clause 6.2?

Clause 6.2 does not mandate specific metrics by name in the excerpt provided. You can use time-based recovery targets, capacity targets, data integrity targets, or other measurable objectives, as long as they are defined, owned, planned, and evaluated (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

What’s the minimum evidence set to satisfy an auditor?

Maintain an objectives register, approvals, and at least one round of evaluation evidence (exercise/test results) tied back to those objectives, plus a corrective action log showing how gaps are handled (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

How do we handle objectives that depend on a critical third party?

Document the dependency in the objectives register, set the continuity requirement for that third party, and keep assurance evidence (contract clauses, attestations, test participation, or performance reviews). If the third party cannot meet the requirement, document the exception and compensating controls.

How often should we review continuity objectives?

ISO 22301 Clause 6.2 requires objectives to be established and supported by planning and evaluation; it does not set a review interval in the excerpt provided (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements). Set a practical cadence tied to management review and require out-of-cycle reviews after material changes or incidents.

Our teams have plans but resist adding “another register.” How do we keep this lightweight?

Use the register as an index, not a second system of record: one row per objective with links to existing runbooks, DR plans, and exercise evidence. The key is traceability from objective to proof, which is what audits typically lack.

Footnotes

  1. ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements

Frequently Asked Questions

Do business continuity objectives have to be set for every process in the company?

No. Clause 6.2 requires objectives at “relevant functions, levels and processes,” so you should scope objectives to critical services/processes and the functions that enable them (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

Are RTO/RPO required by ISO 22301 Clause 6.2?

Clause 6.2 does not mandate specific metrics by name in the excerpt provided. You can use time-based recovery targets, capacity targets, data integrity targets, or other measurable objectives, as long as they are defined, owned, planned, and evaluated (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

What’s the minimum evidence set to satisfy an auditor?

Maintain an objectives register, approvals, and at least one round of evaluation evidence (exercise/test results) tied back to those objectives, plus a corrective action log showing how gaps are handled (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

How do we handle objectives that depend on a critical third party?

Document the dependency in the objectives register, set the continuity requirement for that third party, and keep assurance evidence (contract clauses, attestations, test participation, or performance reviews). If the third party cannot meet the requirement, document the exception and compensating controls.

How often should we review continuity objectives?

ISO 22301 Clause 6.2 requires objectives to be established and supported by planning and evaluation; it does not set a review interval in the excerpt provided (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements). Set a practical cadence tied to management review and require out-of-cycle reviews after material changes or incidents.

Our teams have plans but resist adding “another register.” How do we keep this lightweight?

Use the register as an index, not a second system of record: one row per objective with links to existing runbooks, DR plans, and exercise evidence. The key is traceability from objective to proof, which is what audits typically lack.

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
ISO 22301: Business continuity objectives and planning | Daydream