1
Define the scope and link it to governance
Specify which legal entities, locations, and functions are covered. Reference the company's broader risk management framework or corporate governance policy to position the BCP as part of a connected system.
π‘ Narrow scope beats broad scope β a focused policy that is actually followed is more valuable than a comprehensive one that sits unread in a shared drive.
2
Conduct or summarize the risk assessment
List the specific threats relevant to your industry, location, and size. Rate each by likelihood (1β5) and business impact (1β5). The highest-scoring threats drive the rest of the document.
π‘ Use industry-specific threat libraries (e.g., NIST SP 800-34 for IT, ISO 22301 Annex for general business) as a starting checklist rather than building your threat list from scratch.
3
Complete the business impact analysis by function
For each critical business function, document the financial cost per day of downtime, the maximum tolerable downtime, and all dependencies β systems, suppliers, and key personnel.
π‘ Interview each department head directly rather than estimating impacts centrally β they know which processes would fail first and which workarounds already exist informally.
4
Set specific RTO and RPO targets
Assign measurable recovery targets to each critical function based on the BIA findings. Confirm with IT that current infrastructure can actually meet the targets before committing them to the policy.
π‘ If the honest answer is that current infrastructure cannot meet the target, document the gap and the remediation plan β auditors respect honesty and a credible roadmap more than aspirational numbers.
5
Name the crisis management team and their backups
Fill in specific names and direct contact details β not just role titles β for every CMT position. Assign a documented backup for each. Include personal mobile numbers in a restricted annex.
π‘ Store contact details in a separate document outside your primary IT systems so the CMT can reach each other even during a network or email outage.
6
Write step-by-step response procedures
Draft the first-24-hours checklist for each major threat scenario. Use numbered steps, not paragraphs. Each step should name a specific role, a specific action, and a specific timeframe.
π‘ Have someone who was not involved in drafting the procedures attempt to follow them cold β ambiguities that seem obvious to the author become blockers in a real incident.
7
Schedule the first tabletop exercise
Book the initial tabletop exercise before the policy is formally approved so that testing is built into the launch, not deferred until 'later.' Use the exercise results to refine the procedures before sign-off.
π‘ A 90-minute tabletop covering a single realistic scenario (e.g., ransomware attack at 9am on a Monday) is more useful than a multi-day simulation that never gets scheduled.
8
Obtain executive approval and version it
Route the completed policy to the designated approver β typically the CEO, COO, or board risk committee. Record the version number, effective date, and approval date before distributing.
π‘ Distribute the approved policy as a read-only PDF and require all CMT members to sign an acknowledgment confirming they have read it and understand their role.