Business continuity plans and procedures

ISO 22301:2019 Clause 8.4 requires you to establish, implement, and maintain documented business continuity plans and procedures that your teams can execute during disruptive incidents, from initial response through recovery and return to normal operations (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements). Operationalize this by defining incident playbooks, roles, communications, recovery steps, exercising them, and keeping evidence that the plans work.

Key takeaways:

  • Your plans must be executable: clear triggers, roles, actions, and recovery objectives mapped to critical activities (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).
  • “Maintain” means controlled documents, recurring reviews, training, and exercises with tracked issues and remediation.
  • Auditors look for proof of implementation: exercised plans, results, follow-ups, and alignment to your BIA and risk context.

“Business continuity plans and procedures” is often treated as a document deliverable. ISO 22301 Clause 8.4 treats it as an operational capability: your organization must be able to manage disruptive incidents with defined, maintained plans and procedures that people can execute under pressure (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

For a Compliance Officer, CCO, or GRC lead, the fastest path is to translate the clause into a small set of artifacts that connect: (1) what you consider a disruptive incident, (2) who decides and who acts, (3) how you protect life/safety and stabilize operations, (4) how you recover prioritized activities, and (5) how you prove this works through exercises and corrective actions. The “procedures” part matters: runbooks, call trees, escalation criteria, and communications templates usually determine whether your plan is usable.

This page gives requirement-level guidance you can implement quickly, with step-by-step actions, audit-ready evidence, and the common exam hangups that derail otherwise solid continuity programs. It is written for operators who need a plan that survives real outages, third-party failures, cyber incidents, and facility disruptions without relying on heroics.

Regulatory text

ISO requirement (excerpt): “The organization shall establish, implement and maintain plans and procedures for managing disruptive incidents.” (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)

What this means for an operator

You must have documented business continuity plans and procedures that:

  • Exist (“establish”) as controlled documents with defined scope, assumptions, triggers, and ownership.
  • Are in use (“implement”) via training, awareness, integration into operations, and exercised execution.
  • Stay current (“maintain”) through change control, periodic review, testing/exercises, and documented improvements.

A plan that cannot be executed (missing roles, missing contact details, unclear decision rights, no recovery sequence) will not meet the intent of Clause 8.4, even if it is formally approved.

Plain-English interpretation of the requirement

You need a practical set of incident response and recovery playbooks that tell people:

  • When to declare a disruptive incident
  • Who is in charge and who does what
  • How to communicate internally and externally
  • How to keep critical activities running (or restore them)
  • How to recover systems, facilities, suppliers/third parties, and data
  • How to return to normal operations and document lessons learned

Clause 8.4 is not limited to IT disasters. “Disruptive incidents” can include cyber events, cloud outages, telecom failures, facility loss, key staff unavailability, supply chain disruption, and major third-party failures, as long as they threaten prioritized activities in your BCMS scope (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

Who it applies to

Entity scope

  • Any organization implementing or certifying to ISO 22301.
  • Business continuity practitioners and owners of plans/runbooks within the BCMS scope (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

Operational context (where this clause becomes “real”)

You should treat Clause 8.4 as applying across:

  • Enterprise crisis management (executive decisions, safety, legal, reputational response)
  • Business unit continuity (manual workarounds, alternate staffing, alternate sites)
  • Technology disaster recovery (system restoration sequencing, dependencies, access)
  • Third-party continuity (critical suppliers, SaaS/cloud providers, outsourcers)
  • Customer and regulator communications (approved messaging, notification paths)

If you have material outsourced operations, the clause effectively requires you to plan for third-party disruption because your ability to manage incidents depends on those external dependencies (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

What you actually need to do (step-by-step)

1) Set plan scope and structure (decide what “a plan” is in your org)

Define a small, consistent hierarchy. A workable pattern:

  • Crisis Management Plan (CMP): enterprise-level governance, declarations, comms, executive decisions.
  • Business Continuity Plans (BCPs): per critical function/team (Finance, Customer Support, Operations).
  • IT Disaster Recovery (DR) runbooks: per platform/app stack with dependency mapping.
  • Supporting procedures: call tree, comms templates, incident logging, alternate site procedure, remote work procedure.

Deliverable: a plan inventory with owners and last review dates (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

2) Define disruptive incident triggers and decision rights

Create clear criteria for:

  • Incident classification (operational disruption vs disruptive incident requiring BC activation)
  • Activation authority (who can declare BC activation; who can stand up the command structure)
  • Escalation paths (what triggers exec involvement; what triggers external communications)

Common operational decision point: if systems are down but business can operate via a workaround, your procedures should still require documentation, time-boxed reassessment, and defined comms.

3) Assign roles, backups, and contact methods

For each plan, document:

  • Role-based responsibilities (incident commander, operations lead, IT lead, comms lead, liaison to key third parties)
  • Named primary and alternate (or role-based roster maintained elsewhere with a controlled reference)
  • Out-of-band communications options if email/chat is down (phone bridge, SMS, alternate collaboration tool)

Hangup auditors spot: a plan that lists “IT will do X” without naming the on-call function or how to contact them.

4) Build procedures that people can execute under stress

Write procedures as checklists and decision trees, not essays. Minimum viable procedure set:

  • Initial response checklist: safety, stabilize, preserve evidence where relevant, start incident log.
  • Communications procedure: internal updates, customer updates, third-party escalation, executive brief cadence.
  • Workaround procedure(s): manual steps, acceptable risk approvals, data reconciliation steps after recovery.
  • Recovery procedure: restoration sequence, dependency order, access requirements, validation steps.
  • Return-to-normal procedure: backout of workarounds, validation, stakeholder sign-off, after-action review.

Include “inputs required” (credentials, contact lists, diagrams), and where they are stored in a resilient location.

5) Integrate third parties explicitly

For each critical third party dependency, your plans should include:

  • Escalation contact path (account team, support, emergency contact)
  • Service restoration expectations (what you need from them to recover your critical activity)
  • Fallback options (alternate provider, manual process, reduced service mode)
  • Decision criteria for switching/failing over or invoking contract remedies

A plan that assumes the third party will recover “soon” without a defined fallback is fragile in real events.

6) Train, exercise, and track corrective actions (“implement” and “maintain”)

You need evidence that plans are used and improved:

  • Conduct exercises that match your disruption scenarios.
  • Capture results: what worked, what failed, what changed.
  • Assign issues to owners with due dates and verify closure.
  • Update plans after organizational changes, system changes, supplier changes, and exercise findings (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

Practical approach: run short tabletop exercises for business teams and separate technical failover tests for IT, then run an integrated scenario exercise that forces comms and decision-making.

7) Put document control around everything

“Maintain” requires controlled documents:

  • versioning
  • approvals
  • distribution/access
  • review cadence
  • retention of superseded versions when required by your governance

If you use Daydream to manage compliance workflows, treat BC plans as controlled artifacts with mapped owners, review tasks, exercise evidence uploads, and corrective action tracking. The value is not storage; it’s the closed-loop governance that proves implementation during audits.

Required evidence and artifacts to retain

Maintain an audit-ready binder (digital is fine) with:

  • Plan inventory with owners, scope, and last review date (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements)
  • Crisis Management Plan, function-level BCPs, and DR runbooks (controlled versions)
  • Role assignments and on-call/roster references, including alternates
  • Contact lists and escalation paths, including critical third parties
  • Communications templates (customer notice, internal update, executive brief)
  • Exercise schedule, scenarios, and attendance records
  • Exercise outputs: after-action reports, identified gaps, corrective action plans, retest evidence
  • Change management linkage: proof that major changes trigger plan review
  • Training/awareness evidence for plan users

Auditors commonly ask for “show me the last time you used or tested this plan.” Keep that evidence tightly linked to the plan version in effect at the time.

Common exam/audit questions and hangups

Expect these lines of questioning:

  1. “Define ‘disruptive incident’ for your organization.” Your answer must match plan triggers and scope (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).
  2. “Who can activate the plan, and how do you know they’re available?” You need alternates and contact methods.
  3. “Walk me through recovery for a critical activity.” Auditors want sequence, dependencies, decision points, and validation steps.
  4. “How do you handle third-party outages?” Show escalation paths and fallback procedures.
  5. “How do you keep plans current?” Show reviews, change triggers, exercise findings, and corrective actions.

Hangups:

  • Plans stored in a single system that may be unavailable during the incident.
  • DR runbooks exist, but business procedures (workarounds, comms, decision rights) are missing.
  • Exercises are performed, but issues are not tracked to closure.

Frequent implementation mistakes and how to avoid them

Mistake Why it fails Fix
Writing a narrative “plan” with no checklists People cannot execute under stress Convert to stepwise procedures and decision trees
No defined activation criteria Delayed response and confusion Add triggers, severity levels, and activation authority
Contacts are stale Plan breaks during first call Use role-based lists with an owned update process
Third-party dependencies ignored Recovery blocked by supplier outage Add supplier escalation and fallback steps per critical dependency
Testing is “checkbox” No proof of implementation Keep scenarios, outputs, and corrective actions tied to plan versions
Plans don’t match real architecture/process Runbooks fail Require SME sign-off and align with change management

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement, so this page does not cite enforcement outcomes.

From a risk standpoint, Clause 8.4 failures tend to show up as:

  • extended downtime due to unclear restoration sequence and missing dependencies
  • inconsistent external communications that create contractual and reputational exposure
  • inability to meet customer commitments because third-party disruption was not planned for
  • audit findings that force rushed remediation because evidence of testing and maintenance is missing

A practical 30/60/90-day execution plan

Days 1–30: Establish the minimum viable plan set

  • Confirm BCMS scope and list disruptive incident types relevant to your operations (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).
  • Create plan templates (CMP, BCP, DR runbook) with required sections: triggers, roles, comms, recovery steps, validation, return-to-normal.
  • Build a plan inventory and assign owners and alternates.
  • Identify critical third parties and add escalation contact paths.
  • Put documents in a controlled repository with approvals and versioning.

Days 31–60: Implement and prove usability

  • Run tabletop exercises for the CMP and at least one critical function BCP.
  • Perform a technical DR walkthrough for a key system, focusing on dependency order and access prerequisites.
  • Create an issue tracker for gaps and assign remediation owners.
  • Train plan users on activation criteria, roles, and communications procedure.
  • Add resilient access: offline copies or alternate access path for critical procedures and contacts.

Days 61–90: Maintain through closed-loop governance

  • Update plans based on exercise findings and get re-approval.
  • Add more functions/systems to the plan set and standardize the format.
  • Run an integrated exercise that forces cross-team comms and third-party coordination.
  • Link plan maintenance to change management so major changes trigger review (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).
  • Prepare an “audit pack” that ties each plan to last review, last exercise, and last corrective action closure.

Frequently Asked Questions

Do we need separate business continuity plans and IT disaster recovery runbooks?

Clause 8.4 requires plans and procedures for managing disruptive incidents, which usually means both business and technology procedures (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements). If one document covers both clearly, that can work, but most organizations need separate runbooks to keep technical steps actionable.

What’s the minimum an auditor will accept as “implemented”?

Auditors typically expect evidence that people were trained and that plans were exercised, with documented outputs and updates (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements). A signed policy and an untested plan usually fails the “implement” intent.

How should we handle third-party outages in our continuity plans?

Document escalation contacts, expected support paths, and operational fallbacks for each critical third party dependency. Your recovery procedure should state what you do if the third party cannot restore service in the timeframe your business needs (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

Can we store our plans only in our GRC tool or intranet?

You can, but you also need a resilient access method if those systems are affected by the incident. Keep a controlled offline export or alternate access path for the small set of critical procedures and contacts.

How do we prove we “maintain” plans without over-documenting?

Use lightweight evidence: version history, review approvals, exercise reports, and an issues log showing closure. Tie reviews to change triggers so maintenance happens naturally as systems, org charts, and third parties change (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

We have great incident response for cybersecurity. Does that satisfy Clause 8.4?

It may cover part of the requirement if it includes recovery and return-to-normal for prioritized activities, not only containment and eradication. Clause 8.4 expects continuity procedures for disruptive incidents broadly, not only cyber events (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

Frequently Asked Questions

Do we need separate business continuity plans and IT disaster recovery runbooks?

Clause 8.4 requires plans and procedures for managing disruptive incidents, which usually means both business and technology procedures (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements). If one document covers both clearly, that can work, but most organizations need separate runbooks to keep technical steps actionable.

What’s the minimum an auditor will accept as “implemented”?

Auditors typically expect evidence that people were trained and that plans were exercised, with documented outputs and updates (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements). A signed policy and an untested plan usually fails the “implement” intent.

How should we handle third-party outages in our continuity plans?

Document escalation contacts, expected support paths, and operational fallbacks for each critical third party dependency. Your recovery procedure should state what you do if the third party cannot restore service in the timeframe your business needs (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

Can we store our plans only in our GRC tool or intranet?

You can, but you also need a resilient access method if those systems are affected by the incident. Keep a controlled offline export or alternate access path for the small set of critical procedures and contacts.

How do we prove we “maintain” plans without over-documenting?

Use lightweight evidence: version history, review approvals, exercise reports, and an issues log showing closure. Tie reviews to change triggers so maintenance happens naturally as systems, org charts, and third parties change (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

We have great incident response for cybersecurity. Does that satisfy Clause 8.4?

It may cover part of the requirement if it includes recovery and return-to-normal for prioritized activities, not only containment and eradication. Clause 8.4 expects continuity procedures for disruptive incidents broadly, not only cyber events (ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements).

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
ISO 22301: Business continuity plans and procedures | Daydream