Requirement
Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 3-1-2 – The cybersecurity requirements for business continuity management must be implemented.
Understanding the Requirement
This control requires that all cybersecurity requirements relevant to Business Continuity Management (BCM) are identified, documented, approved, and embedded into the organization's BCM processes. In practice that means codifying the security needs that support continuity (for example encryption, access restrictions, backup frequency, recovery objectives and third‑party dependencies), creating a concrete action plan to implement them, and ensuring the BCM procedures used by staff and suppliers explicitly reflect those requirements. This guidance aligns with the Essential Cybersecurity Controls (ECC – 2 : 2024) framework and is designed to make continuity plans both secure and operationally effective.
Technical Implementation
- Document cybersecurity requirements in the BCM policy. List required controls for critical services (encryption at rest/in transit, authentication/MFA, network segmentation, privileged access, logging/retention, backup cadence). Make each requirement traceable to an asset or business process and obtain formal approval from leadership.
- Create a prioritized action plan with owners and timelines. Break the work into sprints: identify critical systems, assign RTO and RPO for each, estimate effort to meet them, and assign owners. Include measurable milestones (e.g., "implement nightly encrypted backups for the payments DB by Q2", "establish offsite DR replication by month 3").
- Embed requirements into BCM procedures and runbooks. Update incident and recovery playbooks to include the cybersecurity steps required during failover and restoration (who revokes keys, how to restore encrypted backups, which firewall rules to apply). Ensure the runbooks are accessible during an incident and version controlled.
- Apply technical controls that support continuity. Implement automated backups with integrity checks and role‑based recovery access, replicate critical workloads to a secondary site or cloud region, enforce MFA for recovery/operator accounts, enable logging/monitoring for failover activities, and use configuration management to standardize recovery images.
- Test and validate regularly. Schedule tabletop exercises and full DR drills that verify cybersecurity requirements are effective in practice (e.g., can you recover encrypted backups with available keys? Do failover network ACLs permit necessary traffic without exposing services?). Record findings and feed them back into the action plan.
- Coordinate with vendors and stakeholders. Ensure contracts with suppliers reflect BCM cybersecurity expectations (backup SLAs, data handling, notification timelines). Train internal teams and external partners on their roles during a continuity event and maintain a contact list with clear escalation paths.
Example in a Small or Medium Business
Acme Online, a 60‑person e‑commerce SMB, identified its payment gateway, product database, and customer portal as critical services. The IT manager updated the BCM policy to require encrypted backups for the payments DB with an RTO of 4 hours and an RPO of 1 hour, multi‑factor authentication for recovery accounts, and documented vendor failover responsibilities. They created a 90‑day action plan: enable automated hourly backups to an offsite cloud bucket, configure replication of the web tier to a secondary region, and draft runbook steps that show how to restore services and revoke compromised credentials. Acme negotiated backup and recovery SLAs with its payment processor and cloud provider so vendor responsibilities were explicit. They ran a tabletop exercise to walk through the runbook, discovered missing decryption keys for archived backups, corrected the process and re‑tested with a full restore. After successful validation, the company scheduled quarterly tests and trained customer support on the communications plan to notify customers during outages. These steps gave Acme both a documented, approved policy and proven technical controls to meet the continuity requirement.
Summary
Meeting Control 3‑1‑2 requires combining clear policy decisions with concrete technical work: document and approve the cybersecurity requirements for continuity, build an actionable plan with owners and timelines, implement technical controls that preserve confidentiality, integrity and availability during failover, and validate through testing. For SMBs this approach keeps continuity plans practical and testable, ensures vendor alignment, and reduces recovery risk by making cybersecurity a first‑class element of business continuity management.