Identification of strategies and solutions

ISO 22301 Clause 8.3.2 requires you to identify business continuity strategies and solutions for your prioritized activities so you can prevent disruptions where possible, reduce their likelihood, shorten outage duration, and limit impacts. Operationally, you must translate BIA priorities into documented, resourced, and approved continuity strategies with clear ownership, feasibility validation, and evidence that they can work under real constraints. 1

Key takeaways:

  • Start from prioritized activities and BIA outputs, not generic “DR best practices.”
  • Document strategy decisions with assumptions, resource needs, and feasibility checks you can defend in an audit.
  • Treat third parties and dependencies as first-class strategy inputs, not footnotes.

“Identification of strategies and solutions” is the point where business continuity stops being analysis and becomes an operating model. Your BIA tells you what must be protected and by when; Clause 8.3.2 expects you to choose realistic strategies that make those targets achievable, including the people, facilities, technology, information, and third-party capabilities required. 1

For a CCO, GRC lead, or operational resilience owner, the fastest path to compliance is to turn this requirement into a repeatable decision workflow: (1) take prioritized activities and their dependencies, (2) define credible disruption scenarios, (3) select strategy patterns (avoid, reduce, respond, recover), (4) confirm resources and feasibility, (5) capture approvals and embed the results into plans, contracts, and testing. You are building an auditable chain from “this activity is prioritized” to “here is the strategy that protects it” to “here is the evidence we can execute.”

This page gives you requirement-level guidance you can apply immediately: who must be involved, what decisions to make, what artifacts to retain, where audits get stuck, and how to run a practical execution plan.

Regulatory text

ISO 22301:2019 Clause 8.3.2 (excerpt): “The organization shall identify strategies that protect prioritized activities, reduce disruption likelihood, shorten disruption periods, and limit impact.” 1

What the operator must do

You must identify and document business continuity strategies and solutions aligned to prioritized activities. Those strategies must explicitly address four outcomes:

  1. Protect prioritized activities.
  2. Reduce the likelihood of disruption.
  3. Shorten disruption duration.
  4. Limit the impact of disruption on products and services.
    1

A strategy is not a plan. A strategy is the chosen approach (with resourcing and constraints) that makes recovery possible. Auditors will look for proof that your strategy choices are intentional, feasible, and tied to BIA-driven priorities.

Plain-English interpretation (what this requirement really means)

If an activity is prioritized, you cannot rely on informal heroics. You need a defined set of continuity options (people/process/technology/third party) that you’ve selected on purpose, can resource, and can execute under disruption conditions. The standard expects you to think beyond IT recovery: prevention and impact reduction measures count as strategies too, as long as they are tied to protecting prioritized activities. 1

Who it applies to (entity and operational context)

This applies to any organization implementing ISO 22301 and specifically to the teams accountable for continuity and resilience outcomes:

  • BCMS owner / business continuity manager: runs the strategy selection process and governance.
  • Process owners for prioritized activities: define operational constraints and minimum operating levels.
  • IT and security: provide recovery patterns and technical feasibility.
  • Facilities / workplace / physical security: address site loss and access constraints.
  • Third-party owners (procurement, TPRM, vendor managers): ensure external dependencies are covered.
  • Finance / HR: validate staffing, cross-training, emergency purchasing, and funding paths.

Operationally, this requirement bites hardest where you have:

  • Heavy reliance on SaaS/cloud and shared responsibility boundaries.
  • Single points of failure (specialist staff, unique equipment, one site, one supplier).
  • High-impact services with tight recovery objectives or customer/regulatory expectations.

What you actually need to do (step-by-step)

1) Set the strategy scope from BIA outputs

Create a scoped list of prioritized activities and, for each, capture the minimum required:

  • Target recovery needs (use your internal BIA outputs).
  • Upstream/downstream dependencies (systems, teams, facilities, third parties).
  • Peak periods and “no-fail” windows.

Deliverable: Prioritized Activity Strategy Register (one row per prioritized activity).

2) Define credible disruption conditions

For each prioritized activity, define disruption conditions you are designing against:

  • Site unavailable, staff unavailable, system outage, data corruption, third-party outage, supply interruption.
  • Assumptions that often fail (VPN capacity, phone routing, identity provider availability, key person availability).

Keep it practical: auditors favor assumptions you can explain and test.

Deliverable: Scenario/Assumption set referenced by each strategy choice.

3) Identify candidate strategies (menu of options)

Use a consistent menu so strategy selection is repeatable. Common categories:

  • Protection / prevention: redundancy, segregation of duties, maintenance regimes, monitoring, alternate suppliers.
  • Reduction of likelihood: change controls, capacity management, security hardening, supplier diversification.
  • Reduction of duration: automation, runbooks, warm standbys, rapid procurement paths, pre-staged equipment.
  • Impact limitation: manual workarounds, prioritization rules, customer communications, throttling or service degradation modes.
    1

Tip: Treat “manual workaround” as a real strategy only if you can staff it, train it, and operate it under stress.

4) Select the strategy per activity using decision criteria you can defend

Define criteria and record the decision. Typical criteria:

  • Meets the activity’s recovery need 1.
  • Feasible with available staffing and skills under disruption.
  • Dependency-resilient (doesn’t assume the failure domain still works).
  • Compatible with security and compliance constraints.
  • Cost/complexity is acceptable relative to risk appetite.

Deliverable: Strategy Decision Record per prioritized activity (or per cluster of activities with shared dependencies).

5) Identify required resources and “solutions” that make the strategy executable

Clause 8.3.2 is not satisfied by “we will recover.” You must map strategies to enabling solutions:

  • People: cross-training, on-call rosters, delegation, succession for key roles.
  • Facilities: alternate work locations, access procedures, physical controls.
  • Technology: backups, replication, alternate connectivity, identity and access continuity.
  • Information: offline copies of procedures, contact lists, system inventories.
  • Third parties: contractual commitments, support SLAs, incident comms paths, substitution options.
    1

Third-party reality check: If a prioritized activity depends on a third party, your strategy must cover (a) how you continue if they fail, or (b) how you get timely restoration from them, plus what evidence you have (contract terms, support model, test results).

6) Validate feasibility (tabletop first, then evidence-backed exercises)

Run feasibility checks focused on the likely failure points:

  • Is the alternate person actually available?
  • Do credentials work during identity provider outages?
  • Can the call tree be accessed without corporate email?
  • Do you have licensing rights to run in an alternate environment?

Deliverable: Feasibility validation notes and action items. Link each finding to strategy improvements.

7) Get formal approvals and integrate into plans and governance

Auditors expect governance. At minimum:

  • Strategy approval by accountable owners (business + IT + BCMS governance).
  • Funding/resourcing acceptance (even if phased).
  • Integration into business continuity plans, ITDR plans, crisis management, and third-party management workflows.

Practical tool: Daydream can keep a single “strategy-to-evidence” record per activity (strategy choice, dependencies, owners, required artifacts, and test results) so you can answer audits without hunting across shared drives.

Required evidence and artifacts to retain

Keep evidence that proves the strategy exists, is tied to priorities, and is feasible:

Core artifacts

  • Prioritized Activity Strategy Register (current, versioned).
  • Strategy Decision Records with rationale, assumptions, constraints, and owners.
  • Dependency maps for prioritized activities (systems, sites, teams, third parties).
  • Resource requirements list (people, facilities, technology, information).
  • Approval records (sign-offs, steering committee minutes).

Operational proof

  • Exercise/tabletop records tied to the strategies tested.
  • Remediation tracking for strategy gaps (with ownership and due dates).
  • Third-party evidence where applicable: contract clauses, support commitments, escalation paths, evidence of joint testing or incident coordination.

Common exam/audit questions and hangups

Expect auditors to push on traceability and feasibility:

  1. “Show me the link from BIA to strategy.”
    Hangup: strategies documented generically, not per prioritized activity.

  2. “How does this strategy reduce likelihood or duration?”
    Hangup: recovery-only thinking; no prevention or time-to-restore accelerators.

  3. “What assumptions did you make, and how did you validate them?”
    Hangup: assumptions are unstated or unrealistic (for example, “key staff will be available”).

  4. “How are third-party dependencies addressed?”
    Hangup: vendor continuity is assumed rather than evidenced.

  5. “Where are the resources committed?”
    Hangup: strategies require tooling or staffing that was never funded or assigned.

Frequent implementation mistakes (and how to avoid them)

Mistake Why it fails in audit or in crisis Fix
One strategy document for the whole enterprise Doesn’t show prioritized-activity protection Maintain a per-activity (or per-service) strategy register tied to BIA priorities
“Manual workaround” with no staffing model Unexecutable under real disruption Define roles, shifts, training, and the minimum operating level
Treating SaaS as “outsourced continuity” Your service still fails if the provider fails Add provider outage playbooks, comms paths, and substitution options
No documented assumptions Auditors can’t assess strategy credibility Record assumptions and validate them in exercises
Strategy decisions made by IT alone Business constraints and tolerances get missed Co-own strategy selection with process owners and BC governance

Enforcement context and risk implications

ISO 22301 is a certifiable standard rather than a regulator rule. Your exposure typically shows up as:

  • Certification findings (minor/major nonconformities) if strategies are not identified, not tied to priorities, or not feasible.
  • Customer and third-party due diligence failures when you cannot demonstrate continuity strategies for critical services.
  • Operational risk: without clear strategies, incidents turn into ad hoc decision-making, inconsistent recovery priorities, and avoidable downtime.
    1

Practical execution plan (30/60/90)

Use these phases as a delivery cadence; adjust to your environment and audit timeline.

First 30 days (Immediate)

  • Stand up the Prioritized Activity Strategy Register (even if incomplete).
  • Define decision criteria and a lightweight Strategy Decision Record template.
  • Run workshops with owners of the most critical prioritized activities to identify candidate strategies and key assumptions.
  • Flag third-party single points of failure for immediate treatment in strategy options.

By 60 days (Near-term)

  • Complete strategy selection for all prioritized activities (or document a controlled backlog with governance acceptance).
  • Map each strategy to resource needs and named owners.
  • Secure approvals through your resilience/BC steering forum.
  • Update or create playbooks so plans reflect strategy choices (including third-party coordination steps).

By 90 days (Operationalize)

  • Validate feasibility through tabletops focused on the highest-risk assumptions.
  • Track remediations to closure or risk acceptance.
  • Create an audit-ready evidence pack: register, decisions, approvals, and validation records in one place (Daydream can serve as the system of record if you need consistent evidence packaging).

Frequently Asked Questions

Do strategies have to be documented per “activity,” or can we do it per system or service?

ISO 22301 Clause 8.3.2 ties strategies to “prioritized activities,” so your documentation must show coverage for each prioritized activity. You can implement and document at a service/system level if you clearly map each prioritized activity to those shared strategies and dependencies. 1

Are preventive controls (like redundancy or security hardening) part of “strategies and solutions”?

Yes, if you can show they protect prioritized activities and reduce disruption likelihood, duration, or impact. Record the linkage and the assumptions so an auditor can see why the control matters for continuity outcomes. 1

What evidence is strongest for “feasibility”?

Exercise records tied to the specific strategy, with outcomes and remediation actions, are strong evidence. Also retain approvals and resource commitments that show the strategy can be executed with available people and tools. 1

How should we handle third-party dependencies under this requirement?

Treat each critical third party as a dependency that can fail and document your strategy for continuing or restoring the prioritized activity. Keep contract and escalation evidence, and document what you will do if the third party is unavailable. 1

We have strategies, but they live in different teams (ITDR, facilities, operations). Is that acceptable?

It can be, as long as you can produce a single traceable view per prioritized activity showing the chosen strategy, the enabling solutions, ownership, and approvals. Most audit pain comes from fragmentation and missing linkages, not from where documents live. 1

What’s the minimum we need to show in an ISO surveillance audit?

You need documented strategies that cover prioritized activities, show how they reduce likelihood/duration/impact, and show evidence of governance and feasibility validation. A strategy register plus decision records, approvals, and exercise evidence usually forms the core audit pack. 1

Footnotes

  1. ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements

Frequently Asked Questions

Do strategies have to be documented per “activity,” or can we do it per system or service?

ISO 22301 Clause 8.3.2 ties strategies to “prioritized activities,” so your documentation must show coverage for each prioritized activity. You can implement and document at a service/system level if you clearly map each prioritized activity to those shared strategies and dependencies. (Source: ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)

Are preventive controls (like redundancy or security hardening) part of “strategies and solutions”?

Yes, if you can show they protect prioritized activities and reduce disruption likelihood, duration, or impact. Record the linkage and the assumptions so an auditor can see why the control matters for continuity outcomes. (Source: ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)

What evidence is strongest for “feasibility”?

Exercise records tied to the specific strategy, with outcomes and remediation actions, are strong evidence. Also retain approvals and resource commitments that show the strategy can be executed with available people and tools. (Source: ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)

How should we handle third-party dependencies under this requirement?

Treat each critical third party as a dependency that can fail and document your strategy for continuing or restoring the prioritized activity. Keep contract and escalation evidence, and document what you will do if the third party is unavailable. (Source: ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)

We have strategies, but they live in different teams (ITDR, facilities, operations). Is that acceptable?

It can be, as long as you can produce a single traceable view per prioritized activity showing the chosen strategy, the enabling solutions, ownership, and approvals. Most audit pain comes from fragmentation and missing linkages, not from where documents live. (Source: ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)

What’s the minimum we need to show in an ISO surveillance audit?

You need documented strategies that cover prioritized activities, show how they reduce likelihood/duration/impact, and show evidence of governance and feasibility validation. A strategy register plus decision records, approvals, and exercise evidence usually forms the core audit pack. (Source: ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
ISO 22301: Identification of strategies and solutions | Daydream