BIA – Business impact analysis
Potential damage impacts due to business process, system or data asset failures can be assessed based on material and immaterial assessment standards for the company. The impact value of all your assets can be classified on the basis of this analysis.
BIA assessment methodology: The business impact analysis can be used for the analysis of status change in all three information security aspects:
- damage in availability – over any period of time,
- damage in confidentiality,
- damage in integrity.
The software supports the performance of the business impact analyses from the aspect of data, business processes, or IT service. The scope of resources to be included in the impact analysis can be flexibly set.
Flexible parameterization of damage effects: The Damages table can be flexibly defined: the level of damages and the aspect of damage effects (material damages, damages to goodwill, legal consequences, personal injury, etc.) and their textual interpretation can be fully tailored to the company and its environment. Public administration (Information Security Act), market, and GDPR-specific damages table templates are also available.
BIA analyses: Based on the compiled methodology, the business impact analysis can be carried out by the designated responsible users.
BIA reports and results: The BIA analysis results are inherited along the lines of Inventory dependency relations, and they can be sorted into lists and are used for numerous other functions:
- Resource classification
- Identification of the vulnerability of certain asset elements, with a display of time
- Finding faults with the biggest impacts
- Consequences of simulated events
- Risk analysis effect data
- BCM recovery time objectives (RTO, MTPD)