<section title="6.4. Business Continuity and Disaster Recovery"><subsection title="Objective"><paragraph
    title="6.4.1."


><![CDATA[<p>To ensure business continuity and disaster recovery processes are established to assist in meeting the agency’s business requirements, minimise any disruption to the availability of information and systems, and assist recoverability.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="6.4.2."


><![CDATA[<p>This section covers information on business continuity and disaster recovery relating specifically to systems.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="6.4.3."


><![CDATA[<p>Additional information relating to business continuity is contained in:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>ISO 22301:2019</strong></td>
<td>
<p class="no-uppercase"><strong>Security and resilience — Business continuity management systems — Requirements</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td>
<p><a title="ISO 22301:2019" rel="noopener noreferrer" href="https://www.iso.org/standard/75106.html" target="_blank">https://www.iso.org/standard/75106.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 27001:2013</strong></td>
<td><strong>Information Technology – Security Techniques - Information Security Management Systems - Requirements</strong></td>
<td style="text-align: center;">&nbsp;ISO</td>
<td>
<p><a title="ISO/IEC 27001:2013" rel="noopener noreferrer" href="https://www.iso.org/standard/54534.html" target="_blank">https://www.iso.org/standard/54534.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 27002:2022</strong></td>
<td>
<p class="no-uppercase"><strong>Information security, cybersecurity and privacy protection — Information security controls</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td>
<p><a title="ISO/IEC 27002:2022" rel="noopener noreferrer" href="https://www.iso.org/standard/75652.html" target="_blank">https://www.iso.org/standard/75652.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 27005:2018</strong></td>
<td><strong>Information Technology – Security Techniques - Information Security Risk Management</strong></td>
<td style="text-align: center;">&nbsp;ISO</td>
<td>
<p><a title="ISO/IEC 27005:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/75281.html" target="_blank">https://www.iso.org/standard/75281.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 27031:2011</strong></td>
<td>
<p class="no-uppercase"><strong>Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td>
<p><a title="ISO/IEC 27031:2011" rel="noopener noreferrer" href="https://www.iso.org/standard/44374.html" target="_blank">https://www.iso.org/standard/44374.html</a></p>
</td>
</tr>
<tr>
<td><strong><strong>SAA/SNZ HB 221:2004</strong></strong></td>
<td><strong>Business Continuity Management</strong></td>
<td style="text-align: center;">&nbsp;Standards NZ</td>
<td>
<p><span><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz/</a>&nbsp;<a rel="noopener noreferrer" href="https://www.standards.co.nz%20" target="_blank"></a></span></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="6.4.4."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<p>&nbsp;</p>
<table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td>GOV3, GOV7, INFOSEC1 and PHYSEC1</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements/&nbsp;&nbsp;&nbsp;</a></p>
<p><a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Availability requirements"><paragraph
    title="6.4.5.R.01."

    tags="Governance,Business Continuity"


><![CDATA[<p>Availability and recovery requirements will vary based on each agency’s business needs and are likely to be widely variable across government. Agencies will determine their own availability and recovery requirements and implement measures consistent with the agency's SRMP to achieve them as part of their risk management and governance processes.</p>]]></paragraph>
<paragraph
    title="6.4.5.C.01."

    tags="Governance,Business Continuity"


    classification="All Classifications"
    compliance="Must"
    cid="1120"
><![CDATA[<p>Agencies MUST determine availability and recovery requirements for their systems and implement measures consistent with the agency's SRMP to support them.</p>]]></paragraph>
</block>
<block title="Backup strategy"><paragraph
    title="6.4.6.R.01."

    tags="Governance,Business Continuity"


><![CDATA[<p>Having a backup strategy in place is a fundamental part of business continuity planning. The backup strategy ensures that critical business information is recoverable if lost. Vital records are defined as any information, systems data, configurations or equipment requirements necessary to restore normal operations.</p>]]></paragraph>
<paragraph
    title="6.4.6.C.01."

    tags="Governance,Business Continuity"


    classification="All Classifications"
    compliance="Should"
    cid="1123"
><![CDATA[<p>Agencies SHOULD:</p><ul>
<li>Identify vital records;</li>
<li>backup all vital records;</li>
<li>store copies of critical information, with associated documented recovery procedures, offsite and secured in accordance with the requirements for the highest classification of the information; and</li>
<li>test backup and restoration processes regularly to confirm their effectiveness.</li>
</ul>]]></paragraph>
</block>
<block title="Business Continuity plan"><paragraph
    title="6.4.7.R.01."

    tags="Governance,Business Continuity"


><![CDATA[<p>It is important to develop a business continuity plan to assist in ensuring that critical systems and data functions can be maintained when the system is operating under constraint, for example, when bandwidth is unexpectedly limited below established thresholds.</p>]]></paragraph>
<paragraph
    title="6.4.7.C.01."

    tags="Governance,Business Continuity"


    classification="All Classifications"
    compliance="Should"
    cid="1126"
><![CDATA[<p>Agencies SHOULD develop and document a business continuity plan.</p>]]></paragraph>
</block>
<block title="Disaster recovery plan"><paragraph
    title="6.4.8.R.01."

    tags="Governance,Business Continuity"


><![CDATA[<p>Developing and documenting a disaster recovery plan, will reduce the time between a disaster occurring, and critical functions of systems being restored.</p>]]></paragraph>
<paragraph
    title="6.4.8.C.01."

    tags="Governance,Business Continuity"


    classification="All Classifications"
    compliance="Should"
    cid="1129"
><![CDATA[<p>Agencies SHOULD develop and document a disaster recovery plan.</p>]]></paragraph>
</block>
</subsection>
</section>
