SlideShare a Scribd company logo
1 of 9
Contingency Planning Guide for Federal Information Systems
Marianne Swanson Pauline Bowen Amy Wohl Phillips Dean
Gallup David Lynes
NIST Special Publication 800-34 Rev. 1
Contingency Planning Guide for Federal Information Systems
Marianne Swanson Pauline Bowen Amy Wohl Phillips Dean
Gallup David Lynes
May 2010
U.S. Department of Commerce
Gary Locke, Secretary
National Institute of Standards and Technology
Patrick D. Gallagher, Director
Certain commercial entities, equipment, or materials may be
identified in this document in order to describe an experimental
procedure or concept adequately. Such identification is not
intended to imply recommendation or endorsement by the
National Institute of Standards and Technology, nor is it
intended to imply that the entities, materials, or equipment are
necessarily the best available for the purpose.
There are references in this publication to documents currently
under development by NIST in accordance with responsibilities
assigned to NIST under the Federal Information Security
Management Act of 2002. The methodologies in this document
may be used even before the completion of such companion
documents. Thus, until such time as each document is
completed, current requirements, guidelines, and procedures
(where they exist) remain operative. For planning and transition
purposes, federal agencies may wish to closely follow the
development of these new documents by NIST. Individuals are
also encouraged to review the public draft documents and offer
their comments to NIST.
All NIST documents mentioned in this publication, other than
the ones noted above, are available at
http://csrc.nist.gov/publications.
National Institute of Standards and Technology Special
Publication 800-34 Natl. Inst. Stand. Technol. Spec. Publ. 800-
34, 150 pages (May 2010) CODEN: NSPUE2
CONTINGENCY PLANNING GUIDE FOR FEDERAL
INFORMATION SYSTEMS
Reports on Computer Systems Technology
The Information Technology Laboratory (ITL) at the National
Institute of Standards and Technology (NIST) promotes the U.S.
economy and public welfare by providing technical leadership
for the nation’s measurement and standards infrastructure. ITL
develops tests, test methods, reference data, proof of concept
implementations, and technical analysis to advance the
development and productive use of information technology.
ITL’s responsibilities include the development of technical,
physical, administrative, and management standards and
guidelines for the cost-effective security and privacy of
sensitive unclassified information in federal computer systems.
This Special Publication 800-series reports on ITL’s research,
guidance, and outreach efforts in computer security and its
collaborative activities with industry, government, and
academic organizations.
ii
CONTINGENCY PLANNING GUIDE FOR FEDERAL
INFORMATION SYSTEMS
Authority
This document has been developed by the National Institute of
Standards and Technology (NIST) in furtherance of its statutory
responsibilities under the Federal Information Security
Management Act (FISMA) of 2002, Public Law 107-347.
NIST is responsible for developing standards and guidelines,
including minimum requirements, for providing adequate
information security for all agency operations and assets, but
such standards and guidelines shall not apply to national
security systems. This guideline is consistent with the
requirements of the Office of Management and Budget (OMB)
Circular A-130, Section 8b(3), “Securing Agency Information
Systems,” as analyzed in A-130, Appendix IV: Analysis of Key
Sections. Supplemental information is provided in A-130,
Appendix III.
This guideline has been prepared for use by federal agencies. It
may be used by nongovernmental organizations on a voluntary
basis and is not subject to copyright. Attribution would be
appreciated by NIST.
Nothing in this document should be taken to contradict
standards and guidelines made mandatory and binding on
federal agencies by the Secretary of Commerce under statutory
authority. Nor should these guidelines be interpreted as altering
or superseding the existing authorities of the Secretary of
Commerce, Director of the OMB, or any other federal official.
NIST Special Publication 800-34, Revision 1, 150 pages
(May 2010)
National Institute of Standards and Technology
Attn: Computer Security Division, Information Technology
Laboratory 100 Bureau Drive (Mail Stop 8930) Gaithersburg,
MD 20899-8930
iii
CONTINGENCY PLANNING GUIDE FOR FEDERAL
INFORMATION SYSTEMS
Compliance with NIST Standards and Guidelines
NIST develops and issues standards, guidelines, and other
publications to assist federal agencies in implementing the
Federal Information Security Management Act (FISMA) of 2002
and in managing cost- effective programs to protect their
information and information systems.
· Federal Information Processing Standards (FIPS) are
developed by NIST in accordance with FISMA. FIPS are
approved by the Secretary of Commerce and are compulsory and
binding for federal agencies. Since FISMA requires that federal
agencies comply with these standards, agencies may not waive
their use.
· Guidance documents and recommendations are issued in the
NIST Special Publication (SP) 800- series. Office of
Management and Budget (OMB) policies (including OMB
FISMA Reporting Instructions for the Federal Information
Security Management Act and Agency Privacy Management)
state that, for other than national security programs and
systems, agencies must follow NIST guidance.1
· Other security-related publications, including NIST
interagency and internal reports (NISTIRs) and ITL Bulletins,
provide technical and other information about NIST’s activities.
These publications are mandatory only when so specified by
OMB.
1 While agencies are required to follow NIST guidance in
accordance with OMB policy, there is flexibility within NIST’s
guidance in how agencies apply the guidance. Unless otherwise
specified by OMB, the 800-series guidance documents
published by NIST generally allow agencies some latitude in the
application. Consequently, the application of NIST guidance by
agencies can result in different security solutions that are
equally acceptable, compliant with the guidance, and meet the
OMB definition of adequate security for federal information
systems. When assessing federal agency compliance with NIST
guidance, auditors, evaluators, and assessors should consider
the intent of the security concepts and principles articulated
within the particular guidance document and how the agency
applied the guidance in the context of its specific mission
responsibilities, operational environments, and unique
organizational conditions.
iv
CONTINGENCY PLANNING GUIDE FOR FEDERAL
INFORMATION SYSTEMS
Acknowledgements
The authors, Marianne Swanson and Pauline Bowen of the
National Institute of Standards and Technology (NIST), Amy
Wohl Phillips, Dean Gallup, and David Lynes of Booz Allen
Hamilton, wish to thank their colleagues who reviewed drafts of
this document and contributed to its technical content. The
authors would like to acknowledge Kelley Dempsey, Esther
Katzman, Peter Mell, Murugiah Souppaya, Lee Badger, and
Elizabeth Lennon of NIST, and David Linthicum of Booz Allen
Hamilton for their keen and insightful assistance with technical
issues throughout the development of the document.
v
3.4.1 3.4.2 3.4.3 3.4.4 3.4.5 3.4.6 Plan 3.5.1 3.5.2 3.5.3 3.5.4
Plan
Backup and Recovery
................................................................................... 20
Backup Methods and Offsite Storage
............................................................ 21 Alternate Sites
...............................................................................................
21 Equipment Replacement
............................................................................... 24 Cost
Considerations
...................................................................................... 25
Roles and Responsibilities
............................................................................ 26
Testing, Training, and Exercises
(TT&E)..........................................................27
Testing....................................................................................
.......................27
Training..................................................................................
........................ 28 Exercises
...............................................................................................
........ 29 TT&E Program Summary
..............................................................................29
Maintenance
...............................................................................................
...... 31
Information System Contingency Plan
Development...............................34
CONTINGENCY PLANNING GUIDE FOR FEDERAL
INFORMATION SYSTEMS
Table of Contents
Executive
Summary.................................................................................
...................................1
Chapter 1.
1.1 1.2 1.3 1.4
Chapter 2.
2.1 2.2
Chapter 3.
3.1 3.2
3.3 3.4
3.5
3.6
Chapter 4.
4.1 4.2
4.3
Introduction
...............................................................................................
.....1
Purpose...................................................................................
.................................... 1 Scope
...............................................................................................
........................... 2 Audience
...............................................................................................
...................... 3 Document Structure
...............................................................................................
..... 4
Background
...............................................................................................
.....5
Contingency Planning and Resilience
........................................................................ 5 Types of
Plans
...............................................................................................
............. 7
1. 2.2.1 Business Continuity Plan (BCP)
...................................................................... 8
2. 2.2.2 Continuity of Operations (COOP) Plan
............................................................ 8
3. 2.2.3 Crisis Communications
Plan............................................................................9
4. 2.2.4 Critical Infrastructure Protection (CIP)
Plan.....................................................9
5. 2.2.5 Cyber Incident Response Plan
...................................................................... 10
6. 2.2.6 Disaster Recovery Plan (DRP)
...................................................................... 10
7. 2.2.7 Information System Contingency Plan
(ISCP)...............................................10
8. 2.2.8 Occupant Emergency Plan (OEP)
................................................................. 10
Information System Contingency Planning
Process................................13
Develop the Contingency Planning Policy
Statement...............................................14 Conduct the
Business Impact Analysis
(BIA)............................................................ 15
1. 3.2.1 Determine Business Processes and Recovery
Criticality..............................16
2. 3.2.2 Identify Resource Requirements
...................................................................19
3. 3.2.3 Identify System Resource Recovery Priorities
..............................................19
Identify Preventive Controls
...................................................................................... 19
Create Contingency Strategies
................................................................................. 20
Supporting
Information.............................................................................
................. 35 Activation and Notification Phase
............................................................................. 36
1. 4.2.1 Activation Criteria and
Procedure..................................................................36
2. 4.2.2 Notification Procedures
.................................................................................36
3. 4.2.3 Outage Assessment
...................................................................................... 38
Recovery
Phase......................................................................................
.................. 39 4.3.1 Sequence of Recovery
Activities...................................................................39
vi
4.4 4.5
Chapter 5.
5.1
5.2 5.3 5.4
5.5
2. 4.3.2 Recovery
Procedures..............................................................................
......39
3. 4.3.3 Recovery Escalation and
Notification............................................................40
Reconstitution Phase
...............................................................................................
. 41 Plan Appendices
...............................................................................................
........ 42
Technical Contingency Planning
Considerations.....................................43
Common Considerations
.......................................................................................... 43
1. 5.1.1 Use of the BIA
...............................................................................................
44
2. 5.1.2 Maintenance of Data Security, Integrity, and
Backup....................................44
3. 5.1.3 Protection of Resources
................................................................................ 46
4. 5.1.4 Adherence to Security Controls
..................................................................... 46
5. 5.1.5 Identification of Alternate Storage and Processing
Facilities.........................46
6. 5.1.6 Use of High Availability (HA)
Processes........................................................48
Client/Server Systems
..............................................................................................
48
1. 5.2.1 Client/Server Systems Contingency
Considerations.....................................49
2. 5.2.2 Client/Server Systems Contingency
Solution
s ..............................................51
Telecommunications Systems
.................................................................................. 52
1. 5.3.1 Telecommunications Contingency
Considerations........................................53
2. 5.3.2 Telecommunications Contingency

More Related Content

Similar to Contingency Planning Guide for Federal Information Systems Maria.docx

Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2newbie2019
 
NIST Risk management Framework NIST 800-30, rev. 1
NIST Risk management Framework NIST 800-30, rev. 1NIST Risk management Framework NIST 800-30, rev. 1
NIST Risk management Framework NIST 800-30, rev. 1David Sweigert
 
NIST Special Publication 800-37 Revision 2 Ris.docx
 NIST Special Publication 800-37 Revision 2  Ris.docx NIST Special Publication 800-37 Revision 2  Ris.docx
NIST Special Publication 800-37 Revision 2 Ris.docxrobert345678
 
Guide for Security-Focused Configuration Management of I.docx
Guide for Security-Focused Configuration Management of I.docxGuide for Security-Focused Configuration Management of I.docx
Guide for Security-Focused Configuration Management of I.docxwhittemorelucilla
 
NIST Malware Attack Prevention SP 800-83
NIST Malware Attack Prevention  SP 800-83NIST Malware Attack Prevention  SP 800-83
NIST Malware Attack Prevention SP 800-83David Sweigert
 
NIST Special Publication 800-39 Managi.docx
NIST Special Publication 800-39 Managi.docxNIST Special Publication 800-39 Managi.docx
NIST Special Publication 800-39 Managi.docxvannagoforth
 
Protecting non fed controlled unclassified info nist sp-800-171
Protecting non fed controlled unclassified info nist sp-800-171Protecting non fed controlled unclassified info nist sp-800-171
Protecting non fed controlled unclassified info nist sp-800-171RepentSinner
 
NIST 800-125 a DRAFT (HyperVisor Security)
NIST 800-125 a DRAFT   (HyperVisor Security)NIST 800-125 a DRAFT   (HyperVisor Security)
NIST 800-125 a DRAFT (HyperVisor Security)David Sweigert
 
3 - Firewall Guidlines.pdf
3 - Firewall Guidlines.pdf3 - Firewall Guidlines.pdf
3 - Firewall Guidlines.pdfAdmin621695
 
NIST Cybersecurity Event Recovery Guide 800-184
NIST Cybersecurity Event Recovery Guide  800-184NIST Cybersecurity Event Recovery Guide  800-184
NIST Cybersecurity Event Recovery Guide 800-184David Sweigert
 
NIST Special Publication 800-53 Revision 4 Securit.docx
NIST Special Publication 800-53 Revision 4 Securit.docxNIST Special Publication 800-53 Revision 4 Securit.docx
NIST Special Publication 800-53 Revision 4 Securit.docxvannagoforth
 
Instructions Describe the risk assessment process and how to desi.docx
Instructions Describe the risk assessment process and how to desi.docxInstructions Describe the risk assessment process and how to desi.docx
Instructions Describe the risk assessment process and how to desi.docxnormanibarber20063
 
Computer Security Incident Handling Guide Recommendati.docx
Computer Security Incident Handling Guide Recommendati.docxComputer Security Incident Handling Guide Recommendati.docx
Computer Security Incident Handling Guide Recommendati.docxpatricke8
 
NIST Special Publication 800-53 Revision 5
NIST Special Publication 800-53 Revision 5NIST Special Publication 800-53 Revision 5
NIST Special Publication 800-53 Revision 5VICTOR MAESTRE RAMIREZ
 
Computer Security Incident Handling Guide Recommendati
Computer Security Incident Handling Guide RecommendatiComputer Security Incident Handling Guide Recommendati
Computer Security Incident Handling Guide RecommendatiLynellBull52
 
SP 800-150, the Guide to Cyber Threat Information Sharing
SP 800-150, the Guide to Cyber Threat Information SharingSP 800-150, the Guide to Cyber Threat Information Sharing
SP 800-150, the Guide to Cyber Threat Information SharingDavid Sweigert
 
Computer Security Incident Handling Guide
Computer Security Incident Handling GuideComputer Security Incident Handling Guide
Computer Security Incident Handling GuideMuhammad FAHAD
 

Similar to Contingency Planning Guide for Federal Information Systems Maria.docx (20)

Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
NIST Risk management Framework NIST 800-30, rev. 1
NIST Risk management Framework NIST 800-30, rev. 1NIST Risk management Framework NIST 800-30, rev. 1
NIST Risk management Framework NIST 800-30, rev. 1
 
oow
oowoow
oow
 
NIST Special Publication 800-37 Revision 2 Ris.docx
 NIST Special Publication 800-37 Revision 2  Ris.docx NIST Special Publication 800-37 Revision 2  Ris.docx
NIST Special Publication 800-37 Revision 2 Ris.docx
 
Guide for Security-Focused Configuration Management of I.docx
Guide for Security-Focused Configuration Management of I.docxGuide for Security-Focused Configuration Management of I.docx
Guide for Security-Focused Configuration Management of I.docx
 
NIST Malware Attack Prevention SP 800-83
NIST Malware Attack Prevention  SP 800-83NIST Malware Attack Prevention  SP 800-83
NIST Malware Attack Prevention SP 800-83
 
NIST Special Publication 800-39 Managi.docx
NIST Special Publication 800-39 Managi.docxNIST Special Publication 800-39 Managi.docx
NIST Special Publication 800-39 Managi.docx
 
Nist ir
Nist irNist ir
Nist ir
 
Protecting non fed controlled unclassified info nist sp-800-171
Protecting non fed controlled unclassified info nist sp-800-171Protecting non fed controlled unclassified info nist sp-800-171
Protecting non fed controlled unclassified info nist sp-800-171
 
Nist.sp.800 124r1
Nist.sp.800 124r1Nist.sp.800 124r1
Nist.sp.800 124r1
 
NIST 800-125 a DRAFT (HyperVisor Security)
NIST 800-125 a DRAFT   (HyperVisor Security)NIST 800-125 a DRAFT   (HyperVisor Security)
NIST 800-125 a DRAFT (HyperVisor Security)
 
3 - Firewall Guidlines.pdf
3 - Firewall Guidlines.pdf3 - Firewall Guidlines.pdf
3 - Firewall Guidlines.pdf
 
NIST Cybersecurity Event Recovery Guide 800-184
NIST Cybersecurity Event Recovery Guide  800-184NIST Cybersecurity Event Recovery Guide  800-184
NIST Cybersecurity Event Recovery Guide 800-184
 
NIST Special Publication 800-53 Revision 4 Securit.docx
NIST Special Publication 800-53 Revision 4 Securit.docxNIST Special Publication 800-53 Revision 4 Securit.docx
NIST Special Publication 800-53 Revision 4 Securit.docx
 
Instructions Describe the risk assessment process and how to desi.docx
Instructions Describe the risk assessment process and how to desi.docxInstructions Describe the risk assessment process and how to desi.docx
Instructions Describe the risk assessment process and how to desi.docx
 
Computer Security Incident Handling Guide Recommendati.docx
Computer Security Incident Handling Guide Recommendati.docxComputer Security Incident Handling Guide Recommendati.docx
Computer Security Incident Handling Guide Recommendati.docx
 
NIST Special Publication 800-53 Revision 5
NIST Special Publication 800-53 Revision 5NIST Special Publication 800-53 Revision 5
NIST Special Publication 800-53 Revision 5
 
Computer Security Incident Handling Guide Recommendati
Computer Security Incident Handling Guide RecommendatiComputer Security Incident Handling Guide Recommendati
Computer Security Incident Handling Guide Recommendati
 
SP 800-150, the Guide to Cyber Threat Information Sharing
SP 800-150, the Guide to Cyber Threat Information SharingSP 800-150, the Guide to Cyber Threat Information Sharing
SP 800-150, the Guide to Cyber Threat Information Sharing
 
Computer Security Incident Handling Guide
Computer Security Incident Handling GuideComputer Security Incident Handling Guide
Computer Security Incident Handling Guide
 

More from maxinesmith73660

You have been chosen to present in front of your local governing boa.docx
You have been chosen to present in front of your local governing boa.docxYou have been chosen to present in front of your local governing boa.docx
You have been chosen to present in front of your local governing boa.docxmaxinesmith73660
 
You have been charged with overseeing the implementation of cybersec.docx
You have been charged with overseeing the implementation of cybersec.docxYou have been charged with overseeing the implementation of cybersec.docx
You have been charged with overseeing the implementation of cybersec.docxmaxinesmith73660
 
You have been commissioned to create a manual covering the installat.docx
You have been commissioned to create a manual covering the installat.docxYou have been commissioned to create a manual covering the installat.docx
You have been commissioned to create a manual covering the installat.docxmaxinesmith73660
 
You have been challenged by a mentor you respect and admire to demon.docx
You have been challenged by a mentor you respect and admire to demon.docxYou have been challenged by a mentor you respect and admire to demon.docx
You have been challenged by a mentor you respect and admire to demon.docxmaxinesmith73660
 
You have been chosen as the consultant group to assess the organizat.docx
You have been chosen as the consultant group to assess the organizat.docxYou have been chosen as the consultant group to assess the organizat.docx
You have been chosen as the consultant group to assess the organizat.docxmaxinesmith73660
 
You have been assigned a reading by WMF Petrie; Diospolis Parva (.docx
You have been assigned a reading by WMF Petrie; Diospolis Parva (.docxYou have been assigned a reading by WMF Petrie; Diospolis Parva (.docx
You have been assigned a reading by WMF Petrie; Diospolis Parva (.docxmaxinesmith73660
 
You have been asked to speak to city, municipal, and state elected a.docx
You have been asked to speak to city, municipal, and state elected a.docxYou have been asked to speak to city, municipal, and state elected a.docx
You have been asked to speak to city, municipal, and state elected a.docxmaxinesmith73660
 
You have been asked to provide a presentation, covering the history .docx
You have been asked to provide a presentation, covering the history .docxYou have been asked to provide a presentation, covering the history .docx
You have been asked to provide a presentation, covering the history .docxmaxinesmith73660
 
You have been asked to organize a community health fair at a loc.docx
You have been asked to organize a community health fair at a loc.docxYou have been asked to organize a community health fair at a loc.docx
You have been asked to organize a community health fair at a loc.docxmaxinesmith73660
 
You have been asked to explain the differences between certain categ.docx
You have been asked to explain the differences between certain categ.docxYou have been asked to explain the differences between certain categ.docx
You have been asked to explain the differences between certain categ.docxmaxinesmith73660
 
You have been asked to evaluate a 3-year-old child in your clinic.  .docx
You have been asked to evaluate a 3-year-old child in your clinic.  .docxYou have been asked to evaluate a 3-year-old child in your clinic.  .docx
You have been asked to evaluate a 3-year-old child in your clinic.  .docxmaxinesmith73660
 
You have been asked to develop UML diagrams to graphically depict .docx
You have been asked to develop UML diagrams to graphically depict .docxYou have been asked to develop UML diagrams to graphically depict .docx
You have been asked to develop UML diagrams to graphically depict .docxmaxinesmith73660
 
You have been asked to develop UML diagrams to graphically depict an.docx
You have been asked to develop UML diagrams to graphically depict an.docxYou have been asked to develop UML diagrams to graphically depict an.docx
You have been asked to develop UML diagrams to graphically depict an.docxmaxinesmith73660
 
You have been asked to develop a quality improvement (QI) process fo.docx
You have been asked to develop a quality improvement (QI) process fo.docxYou have been asked to develop a quality improvement (QI) process fo.docx
You have been asked to develop a quality improvement (QI) process fo.docxmaxinesmith73660
 
You have been asked to design and deliver a Microsoft PowerPoint pre.docx
You have been asked to design and deliver a Microsoft PowerPoint pre.docxYou have been asked to design and deliver a Microsoft PowerPoint pre.docx
You have been asked to design and deliver a Microsoft PowerPoint pre.docxmaxinesmith73660
 
You have been asked to be the project manager for the development of.docx
You have been asked to be the project manager for the development of.docxYou have been asked to be the project manager for the development of.docx
You have been asked to be the project manager for the development of.docxmaxinesmith73660
 
You have been asked to conduct research on a past forensic case to a.docx
You have been asked to conduct research on a past forensic case to a.docxYou have been asked to conduct research on a past forensic case to a.docx
You have been asked to conduct research on a past forensic case to a.docxmaxinesmith73660
 
You have been asked for the summary to include the following compone.docx
You have been asked for the summary to include the following compone.docxYou have been asked for the summary to include the following compone.docx
You have been asked for the summary to include the following compone.docxmaxinesmith73660
 
You have been asked to be the project manager for the developmen.docx
You have been asked to be the project manager for the developmen.docxYou have been asked to be the project manager for the developmen.docx
You have been asked to be the project manager for the developmen.docxmaxinesmith73660
 
You have been asked by management, as a senior member of your co.docx
You have been asked by management, as a senior member of your co.docxYou have been asked by management, as a senior member of your co.docx
You have been asked by management, as a senior member of your co.docxmaxinesmith73660
 

More from maxinesmith73660 (20)

You have been chosen to present in front of your local governing boa.docx
You have been chosen to present in front of your local governing boa.docxYou have been chosen to present in front of your local governing boa.docx
You have been chosen to present in front of your local governing boa.docx
 
You have been charged with overseeing the implementation of cybersec.docx
You have been charged with overseeing the implementation of cybersec.docxYou have been charged with overseeing the implementation of cybersec.docx
You have been charged with overseeing the implementation of cybersec.docx
 
You have been commissioned to create a manual covering the installat.docx
You have been commissioned to create a manual covering the installat.docxYou have been commissioned to create a manual covering the installat.docx
You have been commissioned to create a manual covering the installat.docx
 
You have been challenged by a mentor you respect and admire to demon.docx
You have been challenged by a mentor you respect and admire to demon.docxYou have been challenged by a mentor you respect and admire to demon.docx
You have been challenged by a mentor you respect and admire to demon.docx
 
You have been chosen as the consultant group to assess the organizat.docx
You have been chosen as the consultant group to assess the organizat.docxYou have been chosen as the consultant group to assess the organizat.docx
You have been chosen as the consultant group to assess the organizat.docx
 
You have been assigned a reading by WMF Petrie; Diospolis Parva (.docx
You have been assigned a reading by WMF Petrie; Diospolis Parva (.docxYou have been assigned a reading by WMF Petrie; Diospolis Parva (.docx
You have been assigned a reading by WMF Petrie; Diospolis Parva (.docx
 
You have been asked to speak to city, municipal, and state elected a.docx
You have been asked to speak to city, municipal, and state elected a.docxYou have been asked to speak to city, municipal, and state elected a.docx
You have been asked to speak to city, municipal, and state elected a.docx
 
You have been asked to provide a presentation, covering the history .docx
You have been asked to provide a presentation, covering the history .docxYou have been asked to provide a presentation, covering the history .docx
You have been asked to provide a presentation, covering the history .docx
 
You have been asked to organize a community health fair at a loc.docx
You have been asked to organize a community health fair at a loc.docxYou have been asked to organize a community health fair at a loc.docx
You have been asked to organize a community health fair at a loc.docx
 
You have been asked to explain the differences between certain categ.docx
You have been asked to explain the differences between certain categ.docxYou have been asked to explain the differences between certain categ.docx
You have been asked to explain the differences between certain categ.docx
 
You have been asked to evaluate a 3-year-old child in your clinic.  .docx
You have been asked to evaluate a 3-year-old child in your clinic.  .docxYou have been asked to evaluate a 3-year-old child in your clinic.  .docx
You have been asked to evaluate a 3-year-old child in your clinic.  .docx
 
You have been asked to develop UML diagrams to graphically depict .docx
You have been asked to develop UML diagrams to graphically depict .docxYou have been asked to develop UML diagrams to graphically depict .docx
You have been asked to develop UML diagrams to graphically depict .docx
 
You have been asked to develop UML diagrams to graphically depict an.docx
You have been asked to develop UML diagrams to graphically depict an.docxYou have been asked to develop UML diagrams to graphically depict an.docx
You have been asked to develop UML diagrams to graphically depict an.docx
 
You have been asked to develop a quality improvement (QI) process fo.docx
You have been asked to develop a quality improvement (QI) process fo.docxYou have been asked to develop a quality improvement (QI) process fo.docx
You have been asked to develop a quality improvement (QI) process fo.docx
 
You have been asked to design and deliver a Microsoft PowerPoint pre.docx
You have been asked to design and deliver a Microsoft PowerPoint pre.docxYou have been asked to design and deliver a Microsoft PowerPoint pre.docx
You have been asked to design and deliver a Microsoft PowerPoint pre.docx
 
You have been asked to be the project manager for the development of.docx
You have been asked to be the project manager for the development of.docxYou have been asked to be the project manager for the development of.docx
You have been asked to be the project manager for the development of.docx
 
You have been asked to conduct research on a past forensic case to a.docx
You have been asked to conduct research on a past forensic case to a.docxYou have been asked to conduct research on a past forensic case to a.docx
You have been asked to conduct research on a past forensic case to a.docx
 
You have been asked for the summary to include the following compone.docx
You have been asked for the summary to include the following compone.docxYou have been asked for the summary to include the following compone.docx
You have been asked for the summary to include the following compone.docx
 
You have been asked to be the project manager for the developmen.docx
You have been asked to be the project manager for the developmen.docxYou have been asked to be the project manager for the developmen.docx
You have been asked to be the project manager for the developmen.docx
 
You have been asked by management, as a senior member of your co.docx
You have been asked by management, as a senior member of your co.docxYou have been asked by management, as a senior member of your co.docx
You have been asked by management, as a senior member of your co.docx
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

Contingency Planning Guide for Federal Information Systems Maria.docx

  • 1. Contingency Planning Guide for Federal Information Systems Marianne Swanson Pauline Bowen Amy Wohl Phillips Dean Gallup David Lynes NIST Special Publication 800-34 Rev. 1 Contingency Planning Guide for Federal Information Systems Marianne Swanson Pauline Bowen Amy Wohl Phillips Dean Gallup David Lynes May 2010 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Director Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. There are references in this publication to documents currently under development by NIST in accordance with responsibilities assigned to NIST under the Federal Information Security Management Act of 2002. The methodologies in this document may be used even before the completion of such companion documents. Thus, until such time as each document is completed, current requirements, guidelines, and procedures (where they exist) remain operative. For planning and transition purposes, federal agencies may wish to closely follow the development of these new documents by NIST. Individuals are also encouraged to review the public draft documents and offer their comments to NIST. All NIST documents mentioned in this publication, other than the ones noted above, are available at http://csrc.nist.gov/publications.
  • 2. National Institute of Standards and Technology Special Publication 800-34 Natl. Inst. Stand. Technol. Spec. Publ. 800- 34, 150 pages (May 2010) CODEN: NSPUE2 CONTINGENCY PLANNING GUIDE FOR FEDERAL INFORMATION SYSTEMS Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. ii CONTINGENCY PLANNING GUIDE FOR FEDERAL INFORMATION SYSTEMS Authority This document has been developed by the National Institute of Standards and Technology (NIST) in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. NIST is responsible for developing standards and guidelines, including minimum requirements, for providing adequate information security for all agency operations and assets, but such standards and guidelines shall not apply to national security systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), “Securing Agency Information
  • 3. Systems,” as analyzed in A-130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in A-130, Appendix III. This guideline has been prepared for use by federal agencies. It may be used by nongovernmental organizations on a voluntary basis and is not subject to copyright. Attribution would be appreciated by NIST. Nothing in this document should be taken to contradict standards and guidelines made mandatory and binding on federal agencies by the Secretary of Commerce under statutory authority. Nor should these guidelines be interpreted as altering or superseding the existing authorities of the Secretary of Commerce, Director of the OMB, or any other federal official. NIST Special Publication 800-34, Revision 1, 150 pages (May 2010) National Institute of Standards and Technology Attn: Computer Security Division, Information Technology Laboratory 100 Bureau Drive (Mail Stop 8930) Gaithersburg, MD 20899-8930 iii CONTINGENCY PLANNING GUIDE FOR FEDERAL INFORMATION SYSTEMS Compliance with NIST Standards and Guidelines NIST develops and issues standards, guidelines, and other publications to assist federal agencies in implementing the Federal Information Security Management Act (FISMA) of 2002 and in managing cost- effective programs to protect their information and information systems. · Federal Information Processing Standards (FIPS) are developed by NIST in accordance with FISMA. FIPS are approved by the Secretary of Commerce and are compulsory and binding for federal agencies. Since FISMA requires that federal agencies comply with these standards, agencies may not waive their use. · Guidance documents and recommendations are issued in the NIST Special Publication (SP) 800- series. Office of
  • 4. Management and Budget (OMB) policies (including OMB FISMA Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management) state that, for other than national security programs and systems, agencies must follow NIST guidance.1 · Other security-related publications, including NIST interagency and internal reports (NISTIRs) and ITL Bulletins, provide technical and other information about NIST’s activities. These publications are mandatory only when so specified by OMB. 1 While agencies are required to follow NIST guidance in accordance with OMB policy, there is flexibility within NIST’s guidance in how agencies apply the guidance. Unless otherwise specified by OMB, the 800-series guidance documents published by NIST generally allow agencies some latitude in the application. Consequently, the application of NIST guidance by agencies can result in different security solutions that are equally acceptable, compliant with the guidance, and meet the OMB definition of adequate security for federal information systems. When assessing federal agency compliance with NIST guidance, auditors, evaluators, and assessors should consider the intent of the security concepts and principles articulated within the particular guidance document and how the agency applied the guidance in the context of its specific mission responsibilities, operational environments, and unique organizational conditions. iv CONTINGENCY PLANNING GUIDE FOR FEDERAL INFORMATION SYSTEMS Acknowledgements The authors, Marianne Swanson and Pauline Bowen of the National Institute of Standards and Technology (NIST), Amy Wohl Phillips, Dean Gallup, and David Lynes of Booz Allen Hamilton, wish to thank their colleagues who reviewed drafts of this document and contributed to its technical content. The authors would like to acknowledge Kelley Dempsey, Esther
  • 5. Katzman, Peter Mell, Murugiah Souppaya, Lee Badger, and Elizabeth Lennon of NIST, and David Linthicum of Booz Allen Hamilton for their keen and insightful assistance with technical issues throughout the development of the document. v 3.4.1 3.4.2 3.4.3 3.4.4 3.4.5 3.4.6 Plan 3.5.1 3.5.2 3.5.3 3.5.4 Plan Backup and Recovery ................................................................................... 20 Backup Methods and Offsite Storage ............................................................ 21 Alternate Sites ............................................................................................... 21 Equipment Replacement ............................................................................... 24 Cost Considerations ...................................................................................... 25 Roles and Responsibilities ............................................................................ 26 Testing, Training, and Exercises (TT&E)..........................................................27 Testing.................................................................................... .......................27 Training.................................................................................. ........................ 28 Exercises ............................................................................................... ........ 29 TT&E Program Summary ..............................................................................29 Maintenance ............................................................................................... ...... 31 Information System Contingency Plan Development...............................34 CONTINGENCY PLANNING GUIDE FOR FEDERAL INFORMATION SYSTEMS Table of Contents Executive
  • 6. Summary................................................................................. ...................................1 Chapter 1. 1.1 1.2 1.3 1.4 Chapter 2. 2.1 2.2 Chapter 3. 3.1 3.2 3.3 3.4 3.5 3.6 Chapter 4. 4.1 4.2 4.3 Introduction ............................................................................................... .....1 Purpose................................................................................... .................................... 1 Scope ............................................................................................... ........................... 2 Audience ............................................................................................... ...................... 3 Document Structure ............................................................................................... ..... 4 Background ............................................................................................... .....5 Contingency Planning and Resilience ........................................................................ 5 Types of Plans ............................................................................................... ............. 7 1. 2.2.1 Business Continuity Plan (BCP) ...................................................................... 8 2. 2.2.2 Continuity of Operations (COOP) Plan
  • 7. ............................................................ 8 3. 2.2.3 Crisis Communications Plan............................................................................9 4. 2.2.4 Critical Infrastructure Protection (CIP) Plan.....................................................9 5. 2.2.5 Cyber Incident Response Plan ...................................................................... 10 6. 2.2.6 Disaster Recovery Plan (DRP) ...................................................................... 10 7. 2.2.7 Information System Contingency Plan (ISCP)...............................................10 8. 2.2.8 Occupant Emergency Plan (OEP) ................................................................. 10 Information System Contingency Planning Process................................13 Develop the Contingency Planning Policy Statement...............................................14 Conduct the Business Impact Analysis (BIA)............................................................ 15 1. 3.2.1 Determine Business Processes and Recovery Criticality..............................16 2. 3.2.2 Identify Resource Requirements ...................................................................19 3. 3.2.3 Identify System Resource Recovery Priorities ..............................................19 Identify Preventive Controls ...................................................................................... 19 Create Contingency Strategies ................................................................................. 20 Supporting Information............................................................................. ................. 35 Activation and Notification Phase ............................................................................. 36 1. 4.2.1 Activation Criteria and Procedure..................................................................36 2. 4.2.2 Notification Procedures
  • 8. .................................................................................36 3. 4.2.3 Outage Assessment ...................................................................................... 38 Recovery Phase...................................................................................... .................. 39 4.3.1 Sequence of Recovery Activities...................................................................39 vi 4.4 4.5 Chapter 5. 5.1 5.2 5.3 5.4 5.5 2. 4.3.2 Recovery Procedures.............................................................................. ......39 3. 4.3.3 Recovery Escalation and Notification............................................................40 Reconstitution Phase ............................................................................................... . 41 Plan Appendices ............................................................................................... ........ 42 Technical Contingency Planning Considerations.....................................43 Common Considerations .......................................................................................... 43 1. 5.1.1 Use of the BIA ............................................................................................... 44 2. 5.1.2 Maintenance of Data Security, Integrity, and Backup....................................44 3. 5.1.3 Protection of Resources ................................................................................ 46 4. 5.1.4 Adherence to Security Controls ..................................................................... 46
  • 9. 5. 5.1.5 Identification of Alternate Storage and Processing Facilities.........................46 6. 5.1.6 Use of High Availability (HA) Processes........................................................48 Client/Server Systems .............................................................................................. 48 1. 5.2.1 Client/Server Systems Contingency Considerations.....................................49 2. 5.2.2 Client/Server Systems Contingency Solution s ..............................................51 Telecommunications Systems .................................................................................. 52 1. 5.3.1 Telecommunications Contingency Considerations........................................53 2. 5.3.2 Telecommunications Contingency