Skip to main content

Business Continuity Plan

Also known as: BCP, Business Continuity, Business Continuity Planning

Documented arrangements an organisation uses to continue delivering its essential functions through and after a disruption, including disaster scenarios that take primary systems offline.

Written by Askara Solutions editorial team · Updated

A Business Continuity Plan is the answer to "what do we do when the office, the cloud region, or the supplier goes dark?" It is a planning artefact rather than a control: a documented set of arrangements that lets the business keep delivering its essential services while normal operations are degraded. NIS2 makes a BCP an effective regulatory expectation for in-scope organisations, and ISO 22301 is the international standard that gives the work a recognised shape.

The discipline starts with a business impact analysis. For each critical service, the planning team agrees the maximum tolerable downtime, the recovery time objective, and the recovery point objective. Those numbers drive everything downstream: the backup regime, the failover architecture, the staffing rota, and the supplier contracts that promise to support recovery within the stated windows.

A BCP that has never been rehearsed is documentation rather than continuity. The test schedule matters as much as the plan itself, and tabletop exercises that walk a leadership team through a plausible scenario typically expose more gaps than full failovers do. The Askara Solutions agent keeps the BCP, the BIA outputs, and the test evidence in the same operating record as the risk register, so the regulator can see one coherent story rather than three documents written by three teams.

Related terms

  • Information Security Management System

    The documented set of policies, procedures, and accountability that an organisation uses to manage information-security risk over time.

  • Risk Assessment

    The structured process of identifying threats, estimating likelihood and impact, and producing a defensible record of which risks the organisation accepts, treats, or transfers.

  • NIS2

    EU directive that extends cybersecurity obligations to a much wider set of organisations than its predecessor, requiring governance, risk management, incident reporting, and supply-chain security.

  • Incident Response

    Procedures, roles, and decisions activated when a security incident is detected, covering containment, eradication, recovery, regulatory notification, and post-incident learning.