Standard · ISO/IEC 22301:2019 · Business Continuity

ISO 22301 — keep operating when things go wrong.

ISO 22301 is the international standard for Business Continuity Management Systems — the certifiable framework for organisations that must keep running through disruptive incidents. Where ISO 27001 protects information confidentiality and integrity, ISO 22301 protects operational availability. The current edition is ISO 22301:2019, with a 2024 Climate Action Amendment adding climate-resilience considerations. Over 53,000 organisations hold active certifications globally — and demand has accelerated sharply since EU DORA took effect in January 2025, making operational resilience a regulatory expectation in financial services. For organisations whose continued operation matters, this is the framework regulators, customers and boards recognise.

Standard ISO 22301:2019+ 2024 Climate Amendment
Status Current2012 edition retired Oct 2021
Certifications worldwide 53,000+Active globally
Recent driver EU DORA 2025Operational resilience mandate
01 — The disruption timeline

When things go wrong, what happens when.

The clearest way to understand ISO 22301 is through its central timeline. A disruption hits at T=0. Two things must then happen: data has to be recoverable from a point not too far before T=0 (RPO), and operations have to be back online before damage becomes intolerable (RTO and MTPD). These aren't abstract concepts — they are the targets every business continuity plan must hit, the numbers every BIA must produce, and the values every recovery strategy must achieve. The rest of the standard is infrastructure for getting these numbers right and proving you can hit them.

Before T − RPO

Last good data

RPO threshold

Maximum acceptable data loss. Drives backup frequency.

T = 0 Disruption

Disruption hits

Incident

Operations interrupted. BCP activates.

After T + RTO

Service restored

RTO target

Critical activity must be running again. Drives recovery strategy.

After T + MTPD

Damage threshold

MTPD ceiling

Beyond this, organisational viability is threatened. Hard ceiling.

← Past Future →

The cardinal rule: RTO must always be less than MTPD. RTO is what you target; MTPD is what you cannot exceed. The gap between them is your safety margin — the buffer for activating recovery procedures, communicating with stakeholders, and absorbing the inevitable real-world friction that test exercises rarely capture. A BCMS where RTO equals MTPD has no margin for error. A BCMS where RTO is materially below MTPD is operating with discipline.

02 — BIA terminology

Five terms. One shared language.

Business Impact Analysis is the analytical heart of ISO 22301 — Clause 8.2.2, and the work that produces the numbers everything else depends on. The BIA process produces five quantitative parameters that calibrate the entire BCMS. Get these right and the rest of the standard's requirements become tractable; get them wrong and the BCMS produces plans that look defensible on paper but fail in real disruptions. Auditors will examine the BIA more closely than almost any other artefact in the management system.

MTPD Hard ceiling

Maximum Tolerable Period of Disruption

The longest a process can be unavailable before consequences become unacceptable to the organisation. Beyond MTPD, organisational viability is at risk — financial collapse, regulatory action, irrecoverable customer loss.

A bank's MTPD for online payment processing might be 12 hours; beyond that, regulatory and customer consequences become severe.
RTO Recovery target

Recovery Time Objective

Target time within which a disrupted activity must be restored. RTO must always be less than MTPD to provide a safety margin. RTO drives recovery strategy selection and resource allocation.

For the same bank's payment system, RTO might be 4 hours — comfortably below the 12-hour MTPD, leaving margin for activation friction.
RPO Data loss limit

Recovery Point Objective

Maximum acceptable data loss measured in time. RPO determines backup frequency. Critical services typically have lower RPOs (zero for transaction systems); non-essential services tolerate higher RPOs.

A hospital patient monitoring system has RPO of zero — no data loss tolerable. Its billing system might have RPO of 24 hours — re-entry is feasible.
MBCO Service floor

Minimum Business Continuity Objective

Lowest level of service the organisation has committed to provide during a disruption. Like a modified SLA for crisis conditions. Sets the operating target during recovery, not the steady-state target.

A telecommunications carrier might commit to 50% capacity for basic voice and SMS during a network outage — degraded but operational.
MAO Operational ceiling

Maximum Acceptable Outage

Often used interchangeably with MTPD — though some methodologies distinguish them, with MAO being process-level and MTPD being organisation-level. In practice, treat them as the same conceptual ceiling: the duration beyond which disruption causes intolerable harm. The BIA's job is to determine this number for every prioritised activity.

03 — BCMS clause structure

Seven clauses. Same backbone.

ISO 22301 follows ISO's Annex SL high-level structure — the same Plan-Do-Check-Act backbone shared with ISO 27001, ISO 27701, ISO 42001 and other ISO management system standards. For organisations holding any of those, the structure is immediately familiar and integration is structurally tractable. Clauses 4 through 10 form the operational heart; the substantive BCMS-specific work concentrates in Clause 8 (Operation), where BIA, risk assessment, continuity strategy, and BCP development all live.

04
Plan · Foundation Context of the organisation

Understanding the organisation, its context, interested parties, BCMS scope. The boundary decisions that drive every subsequent workstream. Critical for service-led businesses where scope ambiguity is common.

05
Plan · Direction Leadership

Top-management commitment, business continuity policy, organisational roles. The BCM Manager / Business Continuity Coordinator function and the accountability ladder live here. Senior buy-in is non-negotiable for credibility.

06
Plan · Risk Planning

Business continuity objectives, risk methodology, risk treatment planning. Where the disruption-scenario thinking gets formalised. The 2024 Climate Amendment's environmental considerations land here.

07
Do · Enablement Support

Resources, competence, awareness, communication, documented information. Crisis communications discipline lives here — alerting, escalation, stakeholder communication during incidents.

08
Do · Operation Operation

The operational heart of the standard. Six subclauses cover: operational planning, BIA & risk assessment, continuity strategies & solutions, business continuity plans & procedures, exercise programme, evaluation. Most of the substantive BCMS work concentrates here.

09
Check · Evidence Performance evaluation

Monitoring, measurement, internal audit, management review. The discipline that distinguishes "we have a BCP" from "we know the BCP works." Where exercise findings get translated into demonstrated effectiveness.

10
Act · Continual improvement Improvement

Nonconformity, corrective action, continual improvement. Closes the loop. Surveillance audits specifically test whether exercise findings actually drive BCMS evolution — frequent failure point for organisations that exercise but don't learn.

04 — Recovery strategy options

Cold, warm, hot, cloud.

Recovery strategies are calibrated to the RTO target. The standard does not prescribe specific solutions — it requires the organisation to select and document strategies appropriate to each prioritised activity's RTO. The four common patterns below cover the practical decision space. Most organisations operate a mixture: hot-site failover for tier-one critical activities; warm-site for second-tier; cloud-based for cost-sensitive workloads; cold-site only for activities with very long acceptable downtime. The selection drives infrastructure cost more than any other BCMS decision.

Site type · 01 C

Cold site

RTO: days to weeks

Empty facility with basic infrastructure — power, network, space. Equipment must be brought in and configured before recovery begins. Cheapest option, longest recovery. Suitable only for activities with very long MTPD.

Site type · 02 W

Warm site

RTO: hours to days

Pre-equipped facility with hardware ready to go — but data restoration and configuration still required before operations resume. Mid-range cost. Suitable for activities with moderate RTO requirements.

Site type · 03 H

Hot site

RTO: minutes to hours

Fully redundant facility with synchronised data — immediate failover capability. Most expensive option. Reserved for tier-one critical activities where RTO is measured in minutes or low single-digit hours.

Site type · 04

Cloud-based

RTO: configurable

Cloud-native disaster recovery — replication to cloud regions, automated failover orchestration, pay-for-what-you-use cost model. The dominant pattern for modern BCMS implementations; calibrated to RTO via service tier.

Geographic dispersal matters as much as site type. Recovery sites must be far enough from primary operations to avoid shared flood plains, hurricane corridors, infrastructure dependencies, and seismic zones. KSA-headquartered organisations frequently use cross-region failover to AWS Riyadh / AWS Bahrain or Azure UAE as their cloud-based DR pattern; multi-region deployment within a single hyperscaler is now standard for tier-one continuity. The 2024 Climate Action Amendment formalises the requirement to consider extreme weather and climate-related events in site selection.

05 — Testing & exercise programme

Four test types. Defined cadence.

ISO 22301 Clause 8.5 requires documented testing programmes with defined objectives, scope, frequency, and success criteria. Testing is what distinguishes a real BCMS from a paper one — auditors will examine evidence of genuine exercises far more closely than the plans themselves. The four test types below cover the practical exercise space, ascending in realism and cost. A mature programme runs all four on different cadences; comprehensive testing happens annually; lighter exercises run quarterly.

Test type · 01

Walkthrough

Quarterly · Low cost

Document review with response team. Plan content checked for completeness, accuracy, and currency. No simulation, no operational impact. The cheapest test, useful for catching documentation drift before harder exercises.

Test type · 02

Tabletop exercise

Semi-annual · Medium cost

Discussion-based scenario walked through by response team. Each role describes what they would do at each step. No actual recovery, but reveals communication gaps, assumption mismatches, and dependency surprises.

Test type · 03

Simulated scenario

Annual · Higher cost

Live exercise where response team executes the plan against a simulated incident. Recovery infrastructure activated, communication channels tested, time-to-restore measured. Real evidence of plan effectiveness.

Test type · 04

Full-scale recovery test

Annual or bi-annual · High cost

Complete failover to recovery infrastructure with operations actually running on backup systems. The most realistic and expensive test. Reserved for tier-one critical activities where RTO is short and stakes are high.

The most common audit finding on testing: exercises run, lessons identified, lessons not actioned. A BCMS that exercises annually but does not feed findings into BCP updates, training revisions, and infrastructure adjustments is operating without continual improvement. Surveillance audits specifically test the loop from exercise → finding → action → verification. Organisations that close the loop pass audit comfortably; organisations that exercise theatrically without learning typically pick up nonconformities.

06 — Integration with ISO 27001

Continuity and security. Two standards, one operating model.

ISO 22301 and ISO 27001 share the same Annex SL backbone — the same Plan-Do-Check-Act structure, the same management-system clause architecture, the same documentation discipline. ISO 27001's A.5.30 (ICT readiness for business continuity) directly references the BCMS work that ISO 22301 formalises. For organisations holding both, integrated operation produces meaningful efficiency: one management review cycle, one document set with continuity and security overlays, one internal audit programme, one set of crisis-communications infrastructure.

Continuity BCMS

ISO 22301:2019

Business Continuity Management System
  • BIA produces RTO, RPO, MTPD, MBCO targets
  • Recovery strategies calibrated to RTO
  • Crisis communications, exercise programme, lessons learned
  • Operational availability is the protected outcome
  • Drives infrastructure investment in DR / failover capability
+
InfoSec ISMS

ISO 27001:2022

Information Security Management System
  • Ninety-three Annex A controls, including A.5.30 ICT continuity
  • Confidentiality, integrity, availability — the CIA triad
  • Incident response infrastructure dovetails with BCP activation
  • Information security is the protected outcome
  • Underwrites security half of every privacy regulation

Holding both is increasingly the working pattern in financial services. EU DORA's January 2025 effective date materially accelerated demand for integrated security-and-continuity certification across European financial-sector organisations and their suppliers. ISO 27001 establishes the security baseline that protects information; ISO 22301 establishes the resilience baseline that protects operations. Many of our recent engagements deliver both as a single integrated build — sharing the same governance committee, internal audit programme, and certification body engagement. Read the ISO 27001 page for the security side.

07 — Certification pathway

From scoping to certificate.

The certification pathway runs through the same five phases used across the ISO management system family — Annex SL alignment means the audit mechanics are identical to ISO 27001 / 27701. Total elapsed time depends on starting maturity and the number of distinct critical activities the BIA has to characterise. Organisations with mature DR / IT continuity capabilities typically reach Stage 2 audit in 7 — 10 months; organisations starting from scratch typically take 10 — 16 months. Surveillance audits then run annually with full re-certification every three years.

Phase 01
1

Scoping & BIA

Define BCMS scope. Conduct Business Impact Analysis. Set RTO, RPO, MTPD targets per activity.

Phase 02
2

Build & implement

Strategy selection, BCP development, recovery infrastructure, crisis communications, awareness programme.

Phase 03
3

Exercise & audit

Initial exercise programme. Internal audit against the standard. Management review. Pre-certification readiness.

Phase 04
4

Stage 1 + 2 audits

Documentation review by certification body; on-site Stage 2 effectiveness audit; nonconformity remediation.

Phase 05
5

Certificate & surveillance

Three-year certificate. Annual surveillance audits. Continual exercise and improvement discipline.

08 — What the work looks like

Eleven workstreams ISO 22301 actually requires.

ISO 22301 work splits into BIA-and-strategy work (the analytical front end), build-and-document work (the operational middle), and exercise-and-audit work (the validation back end). The single biggest predictor of timeline is the number of distinct critical activities the BIA must characterise — for organisations with five to ten critical activities, the BIA alone runs four to eight weeks; for organisations with fifty or more, the BIA can take three to four months on its own.

W-01

BCMS scoping

Definition of organisational and operational scope for the BCMS. Boundary decisions: which entities, which activities, which products. Scope drives BIA effort and certification audit cost.

W-02

Business Impact Analysis

Per-activity assessment of disruption impact over time. Stakeholder interviews, dependency mapping, RTO/RPO/MTPD/MBCO determination. The substantive analytical work that calibrates the entire BCMS.

W-03

Risk assessment

Identification, analysis, evaluation of disruption risks. Threat modelling — natural disasters, cyber attacks, supplier failure, pandemics, infrastructure failure, climate-related events. Risk register and treatment planning.

W-04

Continuity strategy selection

Per-activity strategy decisions. Site type selection (cold / warm / hot / cloud), workforce continuity arrangements, supplier failover, manual procedure design. Investment decisions calibrated to BIA outputs.

W-05

Business Continuity Plans

Documented plans per critical activity. Activation triggers, escalation procedures, recovery steps, communication protocols, role assignments, resource requirements. The operational document set that activates during incidents.

W-06

Crisis communications infrastructure

Stakeholder communication during disruption — employees, customers, regulators, suppliers, media, public. Pre-prepared message templates, contact lists, channel infrastructure, spokesperson protocols.

W-07

Recovery infrastructure build

Substantive technical work: DR site provisioning, replication setup, failover automation, backup system deployment. The largest cost item; integration with cloud DR services where applicable.

W-08

Exercise programme

Walkthrough, tabletop, simulated, full-scale exercise design. Annual cadence definition, scenario library, success criteria. Lessons-learned capture and integration with continual improvement.

W-09

2024 Climate Amendment alignment

Assessment of climate-related risks affecting BCMS — extreme weather, sea-level rise, climate-induced supply chain disruption, regulatory climate-resilience requirements. Particularly relevant for GCC organisations facing intense heat events.

W-10

Internal audit & management review

Internal audit methodology, programme schedule, audit evidence retention. Management review cadence, agenda content, decision documentation. Both required by the standard.

W-11

Certification body engagement

Selection of accredited certification body, Stage 1 and Stage 2 audit scheduling, nonconformity response, ongoing surveillance audit cadence. The external-facing workstream that runs in parallel with implementation.

09 — How this is delivered

Three engagement shapes.

ISO 22301 work is delivered through one of three engagement shapes — depending on whether the organisation is starting fresh, running a focused BIA-only project, or maintaining post-certification. Most full implementations run as substantial project engagements; BIA-only engagements are increasingly common as organisations under DORA pressure need rapid analytical output before committing to certification; ongoing surveillance maintenance fits well into a retainer.

10 — Common questions

Things people ask on first call.

Common questions on ISO 22301 in early 2026 — particularly around the relationship to ISO 27001, the post-DORA acceleration of BCMS demand in financial services, the practical mechanics of BIA work, and the interaction with cloud-native disaster recovery patterns.

Is ISO 22301 the same as IT disaster recovery?
No — DR is a subset of business continuity, not equivalent. IT disaster recovery focuses specifically on restoring IT systems after disruption. Business continuity is broader: it covers people (workforce continuity), processes (manual workarounds, alternate suppliers), facilities (alternate sites, work-from-home), communications (crisis communications infrastructure), and IT (the DR component). ISO 22301 includes DR but extends well beyond it. Organisations that conflate the two typically have strong DR and weak continuity — they can recover their systems but cannot keep their business running through people, supplier, or facility disruptions. The standard's BIA process explicitly forces consideration of all dependency types, not just IT.
What's the difference between ISO 22301 and ISO 27001?
Different problems, same backbone. ISO 27001 is the Information Security Management System standard — it protects information confidentiality, integrity, and availability (the CIA triad), with availability being one of three concerns. ISO 22301 is the Business Continuity Management System standard — it protects operational availability specifically, with much greater depth on the recovery side. They share the Annex SL high-level structure (same Plan-Do-Check-Act backbone). ISO 27001's A.5.30 (ICT readiness for business continuity) explicitly references the BCMS work. For organisations needing both — increasingly common in financial services post-DORA — integrated implementation is materially more efficient than separate programmes. Read the ISO 27001 page.
How long does first-time certification take?
Typically 10 — 16 months for full first-time certification. Drivers of speed: existing IT DR capability, mature crisis-management infrastructure, dedicated programme owner, contained scope. Drivers of slowness: starting from scratch, broad scope with many distinct critical activities, complex multi-site organisation, weak documentation discipline. The single biggest predictor of timeline is the BIA scope — for organisations with five to ten critical activities, the BIA runs four to eight weeks; for organisations with fifty or more, the BIA alone can take three to four months. Compressing the BIA by skipping interviews or skipping dependency analysis typically fails at audit; the BIA is what auditors examine first.
Does cloud DR replace ISO 22301?
No — cloud DR is a delivery mechanism, ISO 22301 is the management system that proves you are using it correctly. Cloud-native disaster recovery (multi-region replication, automated failover, AWS / Azure / Oracle DR services) is increasingly the dominant infrastructure pattern. But infrastructure alone is not a BCMS — without BIA-derived RTO/RPO targets, documented BCPs, exercise programme, and management review, an organisation has technology but not management discipline. Auditors and regulators look for the management system around the technology. The pragmatic posture: cloud DR as the recovery infrastructure, ISO 22301 as the management system that operates it.
How does ISO 22301 relate to EU DORA?
DORA does not require ISO 22301 specifically, but ISO 22301 substantially satisfies DORA's operational resilience obligations. The Digital Operational Resilience Act took effect across EU financial services on 17 January 2025, mandating robust ICT risk management, incident response, business continuity, and digital operational resilience testing. ISO 22301 implementation produces the operational evidence DORA expects: BIA outputs map to DORA's critical function identification, BCP documentation maps to DORA's response and recovery requirements, exercise programmes map to DORA's testing requirements. For European financial-sector organisations and their suppliers, ISO 22301 is the most efficient route to DORA-aligned operational resilience evidence.
What's in the 2024 Climate Action Amendment?
Modest but real additions. Organisations must now consider how extreme weather, sea-level changes, and climate-induced supply chain disruptions affect their business continuity. For most organisations the amendment formalises considerations already implicitly present — particularly relevant for GCC organisations facing intense heat events affecting workforce, infrastructure, and energy availability. The amendment does not add new clauses; it adjusts existing requirements to make climate-related risk consideration explicit. Auditors are increasingly probing on this since 2025 — expect questions on environmental risk in surveillance audits, particularly for organisations in climate-vulnerable geographies.
When will the next edition of ISO 22301 be published?
Uncertain. ISO/TC 292 has formally approved a project to develop the next edition (ISO/AWI 22301), but as of early 2026 there is no confirmed publication date. Working drafts are progressing. Organisations should not delay current-edition certification waiting for the next edition — when it does land, transition windows of two to three years are typical for ISO management system standards (compare ISO 27001:2013 → 2022's three-year transition). Build to ISO 22301:2019 with confidence; transition work when the next edition arrives will be incremental, not foundational. Monitor ISO/TC 292 publications for status updates.
Should we integrate ISO 22301 with ISO 27001?
If pursuing both — almost always yes. They share the Annex SL backbone, the same management-system structure, the same documentation discipline. Running them as a single integrated management system means one management review cycle, one document set with security and continuity overlays, one internal audit programme, one certification body engagement (where the certification body offers integrated audits). The result is a unified operating model where each standard reinforces the other — ISO 27001's incident response infrastructure feeds ISO 22301's BCP activation; ISO 22301's BIA outputs inform ISO 27001's A.5.30 implementation. The exception is where security and continuity functions sit in materially different parts of the organisation with weak coordination — in that case, separate programmes may match operating reality better, even if they cost more.

Resilience is structure, not luck.

ISO 22301 is the framework that turns "we have a backup" into "we know we can keep operating." The discipline is real, the work is substantial, and the certification carries weight with regulators, customers, and boards. A 30-minute scoping call costs nothing — we will tell you honestly whether ISO 22301 makes sense for your situation, what the realistic BIA scope looks like, and whether the integrated build with ISO 27001 is the right approach for you.

Schedule a call