The business continuity plan promises recovery of the ERP system within four hours. When the storage array fails, the IT team discovers that the last successful backup is three days old and the restore procedure has never been tested on the current hardware. The four-hour target becomes four days. A.5.30 prevents this mismatch by requiring that ICT readiness is planned, implemented and tested against defined recovery objectives.
Business continuity plans are only as good as the technology that supports them. A.5.30 focuses specifically on ensuring that ICT infrastructure, systems and services can be recovered within the timeframes the business requires — and that this capability is verified through regular testing.
What does the standard require?
- Conduct a business impact analysis (BIA). Identify which ICT services support critical business processes and determine the recovery time objectives (RTO) and recovery point objectives (RPO) for each.
- Plan ICT continuity. Develop continuity plans that describe how each critical ICT service will be recovered within its RTO and RPO. Plans must cover infrastructure, applications, data and the personnel needed for recovery.
- Implement recovery capabilities. Ensure that the technical infrastructure (backups, redundancy, failover mechanisms) is in place to meet the defined recovery objectives.
- Test and exercise. Regularly test ICT continuity plans under realistic conditions. Verify that systems can actually be restored within the target timeframes.
- Review and update. Plans are reviewed after significant changes to infrastructure, applications or business requirements and after every test or actual disruption.
In practice
Start with the BIA. The business impact analysis identifies which processes are critical and which ICT services they depend on. For each critical service, the business defines how long it can tolerate an outage (RTO) and how much data loss is acceptable (RPO). These numbers drive all subsequent technical decisions.
Build a recovery architecture that matches the targets. If the RTO for the ERP system is four hours, the recovery mechanism must demonstrably achieve four hours. This might require hot-standby systems, automated failover or pre-staged replacement hardware. Document the architecture and its relationship to the recovery targets.
Maintain a disaster recovery register. List every critical ICT system, its RTO, its RPO, the recovery mechanism in place, the last test date and the test result. This register is a central steering tool and a key audit artefact.
Test under realistic conditions. A restore test in a lab environment validates the procedure. A failover test under production-like load validates the capacity. An integrated exercise with business users validates the end-to-end process. Conduct all three types over the annual cycle.
Typical audit evidence
Auditors typically expect the following evidence for A.5.30:
- Business impact analysis — documented analysis of critical processes, their ICT dependencies, and defined RTO/RPO values
- ICT continuity plans — detailed recovery procedures for each critical system
- Disaster recovery register — overview of critical systems, recovery targets, mechanisms and test status
- Test reports — evidence of regular recovery tests with measured recovery times and identified improvements
- Infrastructure documentation — architecture diagrams showing redundancy, failover mechanisms and backup infrastructure
KPI
% of critical ICT systems with documented and tested continuity plans
This KPI measures operational readiness. A system counts as covered only if it has both a documented continuity plan and a successful test within the defined interval (typically 12 months). Target: 100% of critical systems.
Supplementary KPIs:
- Percentage of systems meeting their RTO in the last recovery test
- Percentage of systems meeting their RPO in the last recovery test
- Average age of the most recent successful restore test per critical system
BSI IT-Grundschutz
A.5.30 maps to the BSI framework for business continuity management:
- DER.4 (Business continuity management) — requires business impact analysis, continuity planning and regular testing for critical IT services.
- BSI-Standard 200-4 — provides comprehensive guidance on BCM including ICT continuity, BIA methodology and exercise planning.
Related controls
A.5.30 provides the technical foundation for business continuity:
- A.5.28 — Collection of evidence: Forensic evidence preservation must be considered in recovery procedures.
- A.5.29 — IS during disruption: Defines the security requirements that ICT continuity plans must satisfy.
- A.5.31 — Legal requirements: Regulatory requirements may mandate specific recovery capabilities.
- A.5.32 — Intellectual property rights: Software licensing must be considered in disaster recovery architectures.
Sources
- ISO/IEC 27001:2022 Annex A, Control A.5.30 — ICT readiness for business continuity
- ISO/IEC 27002:2022 Section 5.30 — Implementation guidance
- BSI IT-Grundschutz, DER.4 — Business continuity management
- BSI-Standard 200-4 — Business continuity management