Strategies and solutions — General
ISO 22301 Clause 8.3.1 requires you to choose business continuity (BC) strategies and specific solutions by using your Business Impact Analysis (BIA) and risk assessment outputs as the decision inputs, not intuition or legacy plans. Operationalize it by mapping recovery objectives and prioritized risks to documented strategy decisions, then selecting implementable solutions with owners, funding, and evidence. 1
Key takeaways:
- Your BC strategies must trace directly to BIA outcomes (prioritized activities, RTO/RPO, resource needs) and risk assessment results. 1
- Auditors will look for decision records: why a strategy was chosen, what alternatives were rejected, and how solutions meet recovery objectives. 1
- “Strategies” are the approach; “solutions” are the concrete capabilities you implement, test, and maintain.
Clause 8.3.1 is where continuity programs either become operational or stay theoretical. The requirement is simple on paper: determine strategies and solutions based on BIA and risk assessment outputs. 1 In practice, it forces discipline in three places that examiners and cert auditors probe hard: (1) traceability from analysis to decisions, (2) alignment to stated recovery objectives, and (3) proof that selected solutions are feasible and resourced.
For a Compliance Officer, CCO, or GRC lead, the fastest path is to treat this as a controlled decision workflow. Your BIA provides “what must be recovered and by when.” Your risk assessment provides “what can disrupt it and how.” Clause 8.3.1 expects you to convert those inputs into documented choices: which continuity strategies you will use (for people, process, technology, facilities, third parties) and which solutions you will implement (specific redundancies, alternates, contracts, runbooks, and capabilities). 1
This page gives requirement-level implementation guidance: who owns what, how to structure decisions, what evidence to retain, and the exam questions that expose weak traceability.
Regulatory text
Requirement (verbatim): “The organization shall determine strategies and solutions based on BIA and risk assessment outputs.” 1
Operator interpretation: you must show a clear chain from:
- BIA outputs (prioritized activities, maximum tolerable outage, recovery time objectives, recovery point objectives where applicable, dependencies, minimum staffing, workarounds) to
- Risk assessment outputs (scenarios, likelihood/impact ratings, existing controls, residual risk) to
- Strategy decisions (the approach you will take to maintain/restore prioritized activities) and
- Solution selection (the specific capabilities you implement to execute the strategy).
All four elements must be documented and kept current. 1
Plain-English requirement meaning (what “good” looks like)
A passing implementation looks like this:
- For each prioritized product/service or activity, you can state the recovery objective(s) from the BIA.
- You can point to the top disruption scenarios (internal, external, third party, technology, facility, people) from the risk assessment that threaten those objectives.
- You documented a strategy choice that fits the objective and risk profile (example: “recover in-region within target time using active/standby” or “operate manually for a defined period using approved workarounds”).
- You implemented solutions that make the strategy real (example: contracts for alternate workspace, replicated systems, trained cross-functional teams, third-party failover arrangements, communications tooling, and tested runbooks).
- You can explain why alternatives were not chosen (cost, feasibility, risk tradeoffs) and who approved the decision. 1
Who it applies to
Entity scope: Any organization operating a business continuity management system (BCMS) aligned to ISO 22301. 1
Operational context: This clause is typically owned by the BCMS leader, but execution spans:
- Business unit owners accountable for prioritized activities and acceptable downtime
- Technology leadership for resilience architecture and recovery tooling
- Facilities/Workplace for site strategy and alternate workspace
- HR for staffing continuity, skills coverage, and succession plans
- Procurement/Vendor management for third-party continuity commitments
- Compliance/GRC for governance, approvals, evidence quality, and audit readiness
If you rely on third parties for critical activities (cloud, payments, call centers, logistics, data providers), they are part of “solutions.” You need explicit continuity expectations and proof those expectations are achievable.
What you actually need to do (step-by-step)
1) Normalize BIA and risk outputs into decision-ready inputs
Create a single “BC Strategy Input Pack” that includes, at minimum:
- Prioritized activities and supporting resources/dependencies from the BIA
- Recovery objectives per activity (time and service-level targets as defined by your BIA outputs)
- Top disruption scenarios and residual risks from the risk assessment
- Constraints (legal/regulatory, contractual, safety, data integrity, customer commitments)
Practical tip: auditors rarely fail you for the format of a BIA. They fail you when the BIA cannot be used to make decisions, or when strategy decisions clearly pre-date the BIA and never changed.
2) Define strategy options you will allow (a standard menu)
Build a short catalog of strategy patterns your organization will use, such as:
- Avoid (stop the activity, exit a location, change the operating model)
- Reduce (hardening, redundancy, diversification, additional controls)
- Transfer (insurance, outsourcing, contractual risk transfer, contingent services)
- Accept (explicit acceptance with documented rationale and approvals)
- Recover (restore within target using defined recovery approach)
Keep it short. Consistency increases defensibility and speeds approvals.
3) Run strategy selection workshops with accountable owners
For each prioritized activity, hold a structured decision session with:
- Process owner (accountable)
- Technology owner (recoverability)
- Third-party owner (outsourced dependencies)
- BCMS lead (facilitator)
- Risk/Compliance (challenge and documentation)
Outputs you must produce:
- Selected strategy pattern
- Rationale tied to BIA and risk outputs
- Named solution components required to execute the strategy
- Decision owner and approval path
- Identified gaps (what must be built, bought, or contracted)
4) Convert strategies into implementable solutions (capabilities)
Strategies are not controls until you fund and build solutions. Common solution categories:
- People: role-based coverage, cross-training, on-call models, delegated authorities
- Process: manual workarounds, alternate processing steps, paper fallback, queue management
- Technology: backups/restore, replication, alternate environments, access methods, identity recovery
- Facilities: alternate site, remote work readiness, access controls, equipment staging
- Third parties: continuity SLAs, subcontractor mapping, contingency providers, right-to-audit/assurance
- Communications: stakeholder contact trees, internal comms channel backups, customer notification playbooks
For each solution, define:
- Owner
- Required resources (tools, contracts, staffing)
- Implementation milestones
- Testing approach and acceptance criteria
- Ongoing maintenance requirements
5) Validate feasibility against recovery objectives
This is where weak programs get exposed. Compare “solution capability” to BIA objectives:
- If BIA requires rapid recovery but your architecture requires lengthy rebuild, you have a mismatch.
- If critical work depends on a third party and you have no tested alternative, your strategy is unproven.
Document any mismatch as a risk treatment decision: remediate, accept, or change the objective through governance.
6) Approve, publish, and integrate into plans and exercises
Your strategies and solutions must show up in:
- Business continuity plans and IT disaster recovery plans
- Crisis management playbooks and escalation triggers
- Training and exercising schedule
- Supplier/third-party oversight routines (assurance evidence intake, contract clauses, performance monitoring)
If you can’t point to where the strategy lives operationally, expect an audit finding.
Required evidence and artifacts to retain
Keep evidence in an auditor-friendly structure with traceability:
- BIA report and outputs (including prioritized activities, dependencies, and recovery objectives) 1
- Risk assessment report and outputs (scenarios, inherent/residual risk, assumptions) 1
- Strategy & solution decision log 1
- BC strategy catalog (standard strategy patterns and when to use them)
- Solution implementation records (project plans, architecture decisions, contracts, configuration baselines)
- Plan updates showing strategies embedded in BC/DR documentation
- Exercise/test results tied back to selected solutions, including issues and remediation tracking
- Third-party continuity assurance for critical providers (attestations, test participation evidence, contractual commitments)
Common exam/audit questions and hangups
Expect questions like:
- “Show me one critical service. Walk me from BIA to strategy to solution to test result.” 1
- “Where is the documented rationale that links the chosen strategy to the risk assessment?”
- “What dependencies could break this solution (identity, network, telecom, key third party)?”
- “Who approved accepting longer downtime than the BIA suggests?”
- “How do you know your third party can meet your recovery needs, and what is your contingency if they can’t?”
Hangups that trigger findings:
- No evidence of alternatives considered
- Generic strategy statements (“we will recover promptly”) with no solution mapping
- Solutions exist but are not tied to specific recovery objectives
- Decisions made by IT alone without business owner accountability
- Third-party reliance with no contractual or tested assurance
Frequent implementation mistakes (and how to avoid them)
Mistake 1: Copying last year’s strategy and calling it “based on BIA”
Avoid it: require a decision log entry that references current BIA and risk outputs for each critical activity. If the strategy didn’t change, document why.
Mistake 2: Treating “strategy” as a document section, not a set of choices
Avoid it: force a single-page per service/activity that lists BIA objectives, top scenarios, selected strategy, and required solutions.
Mistake 3: Over-focusing on technology recovery
Avoid it: explicitly address people, process, facilities, communications, and third-party solutions for each critical activity, even if the answer is “standard corporate capability covers this.”
Mistake 4: Picking solutions that can’t meet recovery objectives
Avoid it: add a feasibility checkpoint before approval. If capability cannot meet objectives, escalate and resolve via governance rather than burying the mismatch.
Mistake 5: Ignoring third-party concentration
Avoid it: for each critical activity, list “critical third-party dependencies” and the continuity assumption you are making about each one. If you can’t support the assumption with evidence, treat it as a risk and design a contingency.
Enforcement context and risk implications
No public enforcement sources were provided for this requirement, so you should treat “enforcement” as audit and certification risk rather than regulator penalty in this context. The operational risk is still material: if strategies and solutions are not grounded in BIA and risk outputs, you can end up funding resilience that doesn’t protect the most time-sensitive activities or overlooking a single-point-of-failure dependency. Clause 8.3.1 is designed to prevent that misallocation by forcing traceable, justifiable decisions. 1
Practical execution plan (30/60/90)
The requirement does not mandate a timeline. Use these phases as an execution pattern, then adapt to your governance cadence and resourcing.
First 30 days (Immediate)
- Inventory current BIA outputs, risk assessment outputs, and existing BC/DR strategies; identify gaps in traceability.
- Stand up a Strategy & Solution Decision Log template and approval workflow.
- Select one critical service as a pilot and complete end-to-end traceability (BIA → risk → strategy → solutions → evidence).
Next 60 days (Near-term)
- Run decision workshops for prioritized services/activities and populate the decision log.
- Build or update the strategy catalog (the standard menu) and align stakeholders on definitions.
- Identify solution gaps requiring projects or contracts; open remediation items with accountable owners.
Next 90 days (Operationalize and prove)
- Embed selected strategies into BC/DR plans and crisis playbooks.
- Run an exercise that specifically tests at least one key solution per critical service (restore, failover, manual workaround, third-party contingency).
- Review results, record corrective actions, and update decisions where assumptions were wrong.
Ongoing (Maintain)
- Re-run decisions when BIA/risk outputs change, when a critical third party changes, or after major incidents and tests.
- Keep evidence current and audit-ready; stale strategies are a common nonconformity driver. 1
Tooling note (where Daydream fits)
If you struggle with traceability and evidence sprawl, Daydream can act as the system of record for mapping BIA outputs and risk scenarios to strategy decisions, solution owners, and audit-ready artifacts. The main value is speed during audits: one workflow, one decision log, and clear linkage from analysis to implementation.
Frequently Asked Questions
What’s the difference between a “strategy” and a “solution” under ISO 22301 8.3.1?
A strategy is the chosen approach to maintain or restore prioritized activities based on BIA and risk outputs. A solution is the specific capability you implement to execute that strategy, such as an alternate site contract, a replication design, or a trained manual workaround. 1
Do we need a separate strategy for every business process?
Focus on prioritized activities and services identified by your BIA. Grouping is acceptable if the recovery objectives and dependencies are materially the same, and your decision log shows the rationale for treating them together. 1
What evidence best proves “based on BIA and risk assessment outputs”?
A decision log that explicitly references the relevant BIA outputs and risk scenarios, shows the chosen strategy, and lists the implemented solutions with approvals. Pair it with plan excerpts and test results that demonstrate the solutions work as intended. 1
Our BIA says we need faster recovery than IT can currently deliver. Is that automatically noncompliant?
The standard expects you to determine strategies and solutions based on BIA and risk outputs, then govern the gaps. Document the mismatch, decide whether to remediate, accept risk, or revise objectives through formal approval, and track actions to closure. 1
How should we treat third parties in strategy and solution selection?
Treat critical third-party services as dependencies that must be reflected in both the risk assessment and the solution design. Your artifacts should show what continuity assumptions you rely on from each third party and what contingency you have if those assumptions fail. 1
Can we satisfy 8.3.1 with a single enterprise-wide strategy statement?
A high-level strategy statement helps, but auditors usually expect strategy and solution decisions at the level where recovery objectives are set (critical services/activities). The evidence must show that the enterprise statement translates into implementable solutions aligned to BIA and risk outputs. 1
Footnotes
Frequently Asked Questions
What’s the difference between a “strategy” and a “solution” under ISO 22301 8.3.1?
A strategy is the chosen approach to maintain or restore prioritized activities based on BIA and risk outputs. A solution is the specific capability you implement to execute that strategy, such as an alternate site contract, a replication design, or a trained manual workaround. (Source: ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)
Do we need a separate strategy for every business process?
Focus on prioritized activities and services identified by your BIA. Grouping is acceptable if the recovery objectives and dependencies are materially the same, and your decision log shows the rationale for treating them together. (Source: ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)
What evidence best proves “based on BIA and risk assessment outputs”?
A decision log that explicitly references the relevant BIA outputs and risk scenarios, shows the chosen strategy, and lists the implemented solutions with approvals. Pair it with plan excerpts and test results that demonstrate the solutions work as intended. (Source: ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)
Our BIA says we need faster recovery than IT can currently deliver. Is that automatically noncompliant?
The standard expects you to determine strategies and solutions based on BIA and risk outputs, then govern the gaps. Document the mismatch, decide whether to remediate, accept risk, or revise objectives through formal approval, and track actions to closure. (Source: ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)
How should we treat third parties in strategy and solution selection?
Treat critical third-party services as dependencies that must be reflected in both the risk assessment and the solution design. Your artifacts should show what continuity assumptions you rely on from each third party and what contingency you have if those assumptions fail. (Source: ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)
Can we satisfy 8.3.1 with a single enterprise-wide strategy statement?
A high-level strategy statement helps, but auditors usually expect strategy and solution decisions at the level where recovery objectives are set (critical services/activities). The evidence must show that the enterprise statement translates into implementable solutions aligned to BIA and risk outputs. (Source: ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream