Resources
ISO 22301 Clause 7.1 requires you to identify and provide the resources your Business Continuity Management System (BCMS) needs to operate and improve. To operationalize it quickly, define BCMS scope and obligations, map required people/tools/budget to each BCMS activity, assign owners, fund gaps, and retain objective evidence that resources are planned, approved, and in place. 1
Key takeaways:
- Build a BCMS resource plan tied to specific BCMS processes, not a generic “BC budget.”
- Prove resources exist with approvals, assignments, competencies, and service/support evidence.
- Treat third-party dependencies as BCMS resources and manage them with enforceable continuity requirements.
Footnotes
“Resources” sounds simple until an auditor asks, “Show me how you determined what you need, who approved it, and where you proved it works.” Clause 7.1 is a management-system requirement: you must make resourcing a deliberate decision, not an outcome of good intentions. The practical goal is predictable BCMS execution: risk assessment, business impact analysis (BIA), strategy selection, plan development, exercising, incident response coordination, internal audit, management review, corrective actions, and continual improvement all require capacity, tools, and funding.
For a Compliance Officer, CCO, or GRC lead, this requirement is about governance and evidence. You need a repeatable method to (1) calculate resource needs, (2) obtain decisions and funding, (3) assign accountable owners, and (4) keep records that demonstrate the BCMS is adequately supported over time. The fastest path is a resource register mapped to BCMS obligations, plus a resourcing workflow that connects gaps to risk acceptance or remediation decisions.
This page translates Clause 7.1 into a concrete operating model you can stand up quickly and defend in audits. 1
Regulatory text
ISO 22301 Clause 7.1: “The organization shall determine and provide the resources needed for the BCMS.” 1
Operator meaning: You must (a) decide what resources the BCMS requires, and (b) ensure those resources are actually available. “Resources” is broad: people (roles, time, competencies), infrastructure (workspaces, alternate sites), technology (backup, communications, tooling), information (documentation, inventories), and financial capacity (budget to implement and maintain the BCMS). The standard also expects continual improvement, so resourcing must be revisited when scope, risk, or business operations change. 1
Plain-English interpretation (what the requirement really demands)
You need a defensible resourcing decision for the BCMS: what you need, why you need it, who owns it, and proof it exists. Auditors typically fail teams here for two reasons:
- Resourcing is implied (“we all pitch in during a crisis”) rather than assigned and funded.
- Evidence is scattered across emails and tribal knowledge rather than captured as auditable artifacts.
Treat Clause 7.1 as a control: BCMS Resource Determination and Provisioning. Your output should connect BCMS obligations to capacity and funding, including coverage for third parties that your recovery depends on (cloud providers, telecoms, outsourced operations, critical suppliers).
Who it applies to (entity and operational context)
Clause 7.1 applies to any organization implementing ISO 22301, regardless of size or sector. It is most operationally relevant to:
- BCMS Owner / Business Continuity Manager: defines needs, priorities, and gaps.
- CCO / GRC Lead: ensures governance, evidence, and risk decisions are documented.
- CIO / CISO / IT Ops: provides technical continuity capabilities (backup, restore, DR).
- Facilities / Workplace / EHS: alternate workspace, physical access, site dependencies.
- Procurement / Third-Party Risk: continuity commitments from third parties.
- Finance / Budget Owners: funding approvals and tracking.
- Business Unit Leaders: allocate SMEs and time for BIA, plans, and exercises.
- HR / L&D: role assignments, training, and competency evidence.
Any environment with high operational dependency on third parties (SaaS, cloud, MSPs, logistics, call centers, payroll processors) should explicitly treat those relationships as BCMS resources and document continuity expectations.
What you actually need to do (step-by-step)
1) Define BCMS scope and minimum obligations
Start with what the BCMS must do in your organization. Minimum obligations usually include BIA, continuity strategies, documented plans, exercising, incident coordination, internal audit, management review, and corrective action tracking. Your resourcing plan must cover each obligation. 1
Artifact to create: BCMS scope statement + BCMS obligations list.
2) Build a BCMS resource register (single source of truth)
Create a register that maps each BCMS activity to required resources. Keep it simple and auditable.
Suggested columns (practical minimum):
- BCMS activity/process (e.g., BIA maintenance, plan updates, exercise execution)
- Resource type (people / technology / facilities / third party / financial)
- Resource description (specific, named where possible)
- Owner (role + person)
- Source of resource (internal team, shared service, third party)
- Availability assumptions (on-call, business hours, geographic constraints)
- Gap status (in place / partial / missing)
- Evidence link (approval, contract, ticket, configuration, training record)
3) Determine capacity and competency for people resources
For each critical role, document:
- Primary and backup role holders
- Competency requirements (experience, training, system access)
- Authority (who can declare, spend, communicate externally)
- Coverage model (who is available if the incident affects a region/team)
This is where most programs are weakest: the plan exists, but the people model does not.
Evidence you want: role charters, RACI, on-call rosters, training completion, access provisioning records.
4) Confirm technology and infrastructure resources that enable recovery
Document the continuity-enabling capabilities that your BCMS assumes exist, for example:
- Backup/restore capability and restore ownership
- DR environments and failover procedures
- Identity/admin access paths during outages
- Crisis communications tooling and contact data sources
- Workspace/remote-work contingencies
You are not proving perfect resilience. You are proving that the BCMS’s assumptions are resourced and owned.
Evidence you want: architecture diagrams, runbooks, test/exercise outcomes, system inventory extracts, configuration baselines.
5) Treat third parties as BCMS resources (and make it enforceable)
If a third party is required to meet recovery objectives, document:
- What service they provide that is needed for continuity
- Your dependency tier (critical/noncritical)
- Required continuity commitments (notification, support, recovery expectations)
- How you validate capability (reports, tests, contractual rights)
Evidence you want: contract clauses, SLAs, incident notification terms, continuity attestations where available, contact paths, escalation procedures.
6) Close gaps through funding, redesign, or risk acceptance
For each “missing/partial” item, force a decision:
- Fund and implement
- Redesign continuity strategy to reduce reliance
- Accept risk with documented rationale and approval
Auditors look for the decision trail that shows leadership determined and provided resources, not just identified needs. 1
7) Operationalize resourcing as a recurring governance cycle
Make resourcing part of normal management cadence:
- Reassess resources after major changes (reorgs, new systems, new third parties)
- Feed resource gaps into management review and corrective actions
- Track completion and evidence updates
Tip for serious operators: In Daydream, keep the resource register, gap actions, and evidence links in the same workflow so your “determined and provided” story is one click, not a scavenger hunt.
Required evidence and artifacts to retain
Auditors expect objective evidence that resourcing is deliberate and sustained. Keep:
- BCMS scope and boundaries (current version)
- BCMS resource register (current version + change history if feasible)
- Budget approvals or funding allocation records for BCMS work
- Role definitions (BCMS owner, incident roles, alternates) and assignment records
- Training/competency evidence for BCMS roles (tabletop participation can count if documented)
- Exercise/test plans and results that demonstrate resources can execute
- Inventory of continuity-enabling systems and ownership (at least for in-scope services)
- Third-party continuity dependencies list and supporting contracts/terms
- Management review minutes showing resourcing decisions and actions 1
Common exam/audit questions and hangups
Expect these questions, and prepare “show me” answers:
- “How did you determine what resources the BCMS needs?” (Method + mapping to BCMS obligations)
- “Show approved funding and who owns delivery.” (Budget line items, project approvals, accountable owners)
- “What happens if the BC manager is unavailable?” (Named alternates, delegation of authority)
- “Which third parties are required for recovery and how do you know they can support you?” (Dependency list + contractual/support evidence)
- “How do you keep this current after changes?” (Trigger events + review cadence + update records)
Hangups that stall audits: unclear scope, role coverage gaps, undocumented assumptions about IT DR, and third-party dependencies managed outside the BCMS.
Frequent implementation mistakes (and how to avoid them)
-
Mistake: Treating “resources” as a budget conversation only.
Fix: Build the resource register first, then align funding and staffing to it. -
Mistake: Naming teams, not owners.
Fix: Assign a specific accountable person for each resource line, with a backup. -
Mistake: Assuming IT DR equals BCMS resourcing.
Fix: Map business process recovery needs to the actual tools, people, and third parties required. -
Mistake: No evidence trail for decisions.
Fix: Capture approvals, risk acceptances, and gap remediation in a tracked workflow (ticketing/GRC/Daydream). -
Mistake: Ignoring third-party continuity dependencies.
Fix: Put critical third parties in the BCMS resource register with enforceable terms and escalation contacts.
Enforcement context and risk implications
No public enforcement cases are provided for this requirement in the source catalog, so you should frame risk in operational terms. Under-resourcing the BCMS typically shows up as missed plan maintenance, shallow exercises, poor recovery performance, and reliance on informal heroics. The business impact is loss of availability, customer harm, contractual breaches, and prolonged incident duration. Clause 7.1 exists to prevent continuity from being an unfunded mandate. 1
Practical 30/60/90-day execution plan
First 30 days: Establish control and baseline
- Confirm BCMS scope and list BCMS obligations that must be resourced.
- Stand up the BCMS resource register with owners and initial evidence links.
- Identify the top gaps that could block exercising or response (people coverage, communications, critical third parties).
- Create a simple approval path for resourcing decisions (who signs off, where it’s recorded).
By 60 days: Close priority gaps and harden evidence
- Obtain funding/allocations for the highest-risk gaps (or document risk acceptance).
- Formalize role assignments: incident roles, alternates, authority levels, and contact paths.
- Document third-party continuity dependencies and add missing contract terms to the contracting backlog.
- Run at least one exercise that tests whether the resourced model works, then document findings and corrective actions.
By 90 days: Make it repeatable and audit-ready
- Integrate resource review triggers into change management and third-party onboarding.
- Tie resource gaps to corrective action tracking and management review inputs.
- Normalize evidence capture (templates, named repositories, consistent versioning).
- Consider consolidating BCMS resourcing, actions, and evidence in Daydream so audits pull directly from your operating records rather than ad hoc compilations.
Frequently Asked Questions
Does ISO 22301 Clause 7.1 require a specific budget amount for BCMS?
No. It requires that you determine and provide the resources needed for your BCMS. Your evidence should show the rationale for resourcing decisions and that gaps are funded, redesigned, or formally accepted. 1
What counts as a “resource” for the BCMS?
People (roles/time/competency), technology, infrastructure/facilities, information, and financial support all qualify. Third parties that you depend on for recovery also count and should be documented as such. 1
How do I prove we “determined” resources rather than just having them?
Keep a resource register mapped to BCMS obligations plus decision records (approvals, meeting minutes, funding requests, risk acceptances). Auditors want to see a deliberate process and traceability. 1
We have disaster recovery runbooks in IT. Is that sufficient evidence for Clause 7.1?
It may cover part of technology resourcing, but Clause 7.1 applies to the whole BCMS. You still need business ownership, incident roles, exercising capacity, communications resources, and third-party dependencies documented and assigned. 1
How should we handle resource gaps we cannot fund this year?
Document the gap, assess the continuity impact within BCMS scope, and route it to a decision: redesign the strategy, phase remediation, or formally accept the risk with accountable approval. Keep the decision record with the resource register entry. 1
What’s the minimum set of artifacts an auditor will ask for?
Expect to show a current resource register, named role assignments (with backups), proof of funded/supporting capabilities (especially IT and communications), third-party dependency evidence, and management records that reflect resourcing decisions. 1
Footnotes
Frequently Asked Questions
Does ISO 22301 Clause 7.1 require a specific budget amount for BCMS?
No. It requires that you determine and provide the resources needed for your BCMS. Your evidence should show the rationale for resourcing decisions and that gaps are funded, redesigned, or formally accepted. (Source: ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)
What counts as a “resource” for the BCMS?
People (roles/time/competency), technology, infrastructure/facilities, information, and financial support all qualify. Third parties that you depend on for recovery also count and should be documented as such. (Source: ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)
How do I prove we “determined” resources rather than just having them?
Keep a resource register mapped to BCMS obligations plus decision records (approvals, meeting minutes, funding requests, risk acceptances). Auditors want to see a deliberate process and traceability. (Source: ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)
We have disaster recovery runbooks in IT. Is that sufficient evidence for Clause 7.1?
It may cover part of technology resourcing, but Clause 7.1 applies to the whole BCMS. You still need business ownership, incident roles, exercising capacity, communications resources, and third-party dependencies documented and assigned. (Source: ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)
How should we handle resource gaps we cannot fund this year?
Document the gap, assess the continuity impact within BCMS scope, and route it to a decision: redesign the strategy, phase remediation, or formally accept the risk with accountable approval. Keep the decision record with the resource register entry. (Source: ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)
What’s the minimum set of artifacts an auditor will ask for?
Expect to show a current resource register, named role assignments (with backups), proof of funded/supporting capabilities (especially IT and communications), third-party dependency evidence, and management records that reflect resourcing decisions. (Source: ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream