Business Continuity Policy


Document Number: ISMS-POL-BCP-01

Classification: L1 — Policy (Domain)

Version: 0.1.2

Effective Date: February 18, 2026

Author: Lucas Shin — Security Director

Approved By: Richard — CISO

Next Review Date: February 2027

Parent Policy: Information Security Policy (ISMS-POL-ISP-01)


1. Purpose

This policy defines the business continuity and resilience requirements for Cybercraft to ensure that critical business functions can continue during and recover from disruptions — including personnel loss, system failures, and security incidents.

As a 3–5 person SMB, Cybercraft's primary continuity risks are key person dependency and cloud service availability, rather than traditional physical disaster scenarios. This policy is designed to be proportionate and operationally sustainable.


2. Scope

2.1 Applicable Systems and Services

2.2 Applicable Personnel

2.3 Out of Scope


3. Key Person Risk

3.1 Risk Assessment

Derived from BYOD Security Policy (ISMS-POL-BYOD-01) Section 4 — single Security Director dependency:

Cybercraft's most significant continuity risk is key person dependency. The following roles represent single points of failure:

RolePersonCritical FunctionsRisk Level
Security DirectorLucasAll Intune/CA configuration, compliance monitoring, incident response, device enrollment/offboarding, policy maintenance, log review🔴 Critical — No backup personnel
CEOFarahBusiness operations, client relationships, financial management, contract authority🔴 Critical — No backup personnel
CISORichardPolicy approval, risk acceptance, escalation decisions, strategic security direction🟡 High — Security Director can escalate to CEO as interim

3.2 Mitigation Measures

MitigationDescriptionOwner
DocumentationAll security procedures documented in L3 procedures with sufficient detail for a competent replacement to executeLucas
Admin Account SeparationDedicated admin account (admin.lucas) credentials stored in a secure, accessible location known to CISO and CEOLucas / Richard
Break-Glass AccountEmergency admin account with Global Admin privileges, stored offline (printed credentials in a sealed envelope or secure vault), accessible by CEO and CISO onlyLucas / Farah / Richard
Cross-TrainingCISO (Richard) maintains basic familiarity with Intune dashboard, CA policies, and selective wipe proceduresLucas / Richard
RunbookEmergency operations runbook covering: device block, selective wipe, account disable, CA policy bypass, and incident escalationLucas

4. Emergency Policy Deviation

4.1 When Emergency Deviations Apply

Derived from BYOD Security Policy (ISMS-POL-BYOD-01) Section 7.1:

When a temporary operational need requires deviation from established security policies — for example:

4.2 Emergency Deviation Process

StepActionOwner
1Identify the business-critical need and the policy deviation requiredAny personnel
2Attempt to contact Security Director → CISO → CEO (in escalation order)Any personnel
3If no response within 2 hours and action is critical: CEO or CISO may authorise emergency deviation using break-glass proceduresFarah / Richard
4All emergency actions must be documented — who, what, when, whyPerson taking action
5Post-incident review within 72 hours to assess deviation impact and restore normal controlsLucas / Richard

5. Data Backup and Recovery

5.1 M365 Data Protection

Data TypeNative Protection3rd-Party Backup (AFI Backup)Retention
Exchange Online (email)Microsoft native retention + litigation hold capability✅ AFI Backup — automated backupNative: default retention policy / AFI: policy-defined retention
SharePoint / OneDriveVersion history (up to 500 versions), recycle bin (93 days)✅ AFI Backup — automated backupNative: 93 days recycle bin + version history / AFI: policy-defined retention
Teams chat and channelsRetained in Exchange Online (compliance)✅ AFI Backup — automated backupNative: default retention policy / AFI: policy-defined retention
Note: Cybercraft uses AFI Backup as a third-party M365 backup solution to supplement Microsoft's native retention capabilities. AFI Backup provides automated backup of Exchange Online, SharePoint, OneDrive, and Teams data to an independent infrastructure, ensuring recovery capability beyond Microsoft's native retention limits. Backup scope and retention settings are reviewed annually or upon significant platform changes.

5.2 SaaS Data

5.3 BYOD Device Data


6. Emergency Contact Chain

PriorityContactRoleCapabilities
1Lucas ShinSecurity DirectorFull technical control — Intune, CA, Entra ID, incident response
2RichardCISOPolicy decisions, risk acceptance, break-glass authorisation, basic Intune operations
3FarahCEOBusiness decisions, break-glass authorisation, external communications
4JeffGroup ChairmanCross-tenant escalation (HVT/TT), strategic decisions
Contact details are maintained in a separate Emergency Contact Register stored both in SharePoint and offline (printed copy held by CEO and CISO).

7. Service Availability

7.1 Dependency on Microsoft 365

Cybercraft's operations are heavily dependent on Microsoft 365 availability. In the event of a prolonged M365 outage:

7.2 Acceptable Downtime


8. Roles and Responsibilities

RolePersonResponsibilities
CEOFarahExecutive sponsor, business continuity decision authority, external communications during crisis, break-glass holder
CISORichardPolicy approval, emergency deviation authorisation, break-glass holder, cross-training participant
Security DirectorLucasBCP maintenance, runbook creation, key person risk mitigation, backup procedures, emergency contact register
All PersonnelAll staffKnow the emergency contact chain, report disruptions promptly, follow emergency deviation procedures

9. Compliance Mapping

ISO 27001 ControlRequirementCovered By
A.5.29Information security during disruptionSection 4 (Emergency policy deviation) + Section 7 (Service availability)
A.5.30ICT readiness for business continuitySection 5 (Data backup and recovery) + Section 7 (Service availability)
A.8.13Information backupSection 5 (Data backup — M365 native + AFI Backup + SaaS export)
A.8.14Redundancy of information processing facilitiesSection 7 (M365 cloud-based redundancy + fallback communications)

10. Document Control

VersionDateAuthorChanges
0.1.02026-02-18Lucas ShinInitial release — key person risk analysis, emergency deviation procedures, data backup strategy, emergency contact chain. Incorporates continuity elements from BYOD Security Policy.
0.1.12026-02-20Lucas ShinL2 policy reordering (renumbered). Updated cross-reference document numbers to reflect new P-numbering scheme.
0.1.22026-02-20Lucas ShinUpdated §5.1: Added AFI Backup as 3rd-party M365 backup solution (Exchange, SharePoint/OneDrive, Teams). Removed "no third-party backup" note. Updated A.8.13 compliance mapping reference.

Review Schedule


[End of Policy Document]