1904 Contingency Planning Policy
Department of Human Services |
Index: |
POL1904 |
|
Revised: |
06/02/2025 |
||
Next Review: |
06/02/2027 |
Subject: DHS Information Security Policies
Policy
This policy establishes the Enterprise Contingency Planning Policy, for managing risks from information system disruptions, failures, and disasters through the establishment of an effective contingency planning program. The contingency planning program helps DHS implement security best practices with regards to enterprise business continuity and disaster recovery.
Authority
-
United States Department of Commerce National Institute for Standards and Technology (NIST)
-
United States Internal Revenue Service
-
United States Department of Health & Human Services – Administration of Children and Families (ACF), Office of Child Support Services (OCSS)
-
United States Department of Health & Human Services - Centers for Medicare & Medicaid Services (CMS)
-
Georgia Technology Authority
-
Social Security Administration
-
Federal Bureau Investigation (Criminal Justice Information Services)
References
Applicability
The scope of this policy is applicable to all Information Technology (IT) resources owned or operated by DHS. Any information, not specifically identified as the property of other parties, that is transmitted or stored on DHS IT resources (including email, messages, and files) is the property of DHS. All users (DHS employees, contractors, vendors, or others) of IT resources are responsible for adhering to this policy.
Definitions
- Recover Time Objectives (RTO)
-
The target time you set for the recovery of your IT and business activities after a disaster has struck.
- Recover Point Objectives (RPO)
-
The maximum targeted period in which data might be lost from an IT service due to a major incident.
- Controlled Unclassified Information (CUI)
-
Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified under Executive Order 13526 or the Atomic Energy Act, as amended.
Responsibilities
DHS shall adopt the Contingency Planning principles established in NIST SP 800-34 “Contingency Planning Guide for Federal Information Systems,” as the official policy for this domain. The following subsections outline the Contingency Planning standards that constitute DHS policy. Each DHS Business System is then bound to this policy, and shall develop or adhere to a program plan which demonstrates compliance with the policy related to the standards documented.
CP-1 Contingency Planning Procedures
-
Develop, document, and disseminate to designated agency personnel:
-
All organizational level contingency planning policy that:
-
Addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
-
Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and
-
-
Procedures to facilitate the implementation of the contingency planning policy and the associated controls.
-
-
Designate an agency official to manage the development, documentation, and dissemination of the contingency planning policy and procedures; and
-
Review and update the current contingency planning:
-
Policy every one (1) year (or if there is a significant change); and
-
Procedures every one (1) year, (or when there is a significant change).
-
CP-2 Contingency Plan
-
Develop a contingency plan for the information system that:
-
Identifies essential missions and business functions and associated contingency requirements;
-
Provides recovery objectives, restoration priorities and metrics;
-
Addresses contingency roles, responsibilities, assigned individuals with contact information;
-
Addresses maintaining essential missions and business functions despite a system disruption, compromise, or failure;
-
Addresses eventual, full system restoration without deterioration of the controls originally planned and implemented;
-
Addresses the sharing of contingency information; and
-
Is reviewed and approved by designated agency officials and other applicable agency stakeholders.
-
-
Distributes copies of the contingency plan to key contingency personnel;
-
Coordinate contingency planning activities with incident handling activities;
-
Review the contingency plan for the information system at a minimum annually;
-
Update the contingency plan to address changes to the organization, system, or environment of operation and problems encountered during contingency plan implementation, execution, or testing;
-
Communicate contingency plan changes to key contingency personnel;
-
Incorporate lessons learned from contingency plan testing, training, or actual contingency activities into contingency testing and training; and
-
Protect the contingency plan from unauthorized disclosure and modification.
CP-2 (1) Coordinate with Related Plans:
Coordinate contingency plan development with organizational elements responsible for related plans.
CP-3 Contingency Training
-
Provide contingency training to system users consistent with assigned roles and responsibilities:
-
Within 30 days of assuming a contingency role or responsibility;
-
When required by system changes; and
-
Annually thereafter; and
-
-
Review and update contingency training content at least every one (1) year and following a significant change.
CP-4 Contingency Plan Testing
-
Test the contingency plan for the system at a minimum, annually using the following tests to determine the effectiveness of the plan and the readiness to execute the plan: In accordance with NIST SP 800-84 Guide to Test, Training, and Exercise Process for IT Plans and Capabilities, NIST SP-34 Contingency Planning Guide for Federal Information Systems and other applicable guidance, and Business-unit Defined Tests and Exercises; and
-
Review the contingency plan test results; and
-
Initiate corrective actions, if needed.
CP-6 Alternate Storage Site
-
Establish an alternate storage site, including necessary agreements to permit the storage and retrieval of system backup information; and
-
Ensure that the alternate storage site provides controls equivalent to that of the primary site.
CP-7 Alternate Processing Site
-
Establish an alternate processing site, including necessary agreements to permit the transfer and resumption of system operations for essential mission and business functions within a time period consistent with recovery time and recovery point objectives (specified by the applicable system contingency plan or Continuity of Operations Plan (COOP) for the business function(s) supported by the system,when the primary processing capabilities are unavailable;
-
Make available at the alternate processing site, the equipment and supplies required to transfer and resume operations or put contracts in place to support delivery to the site within the organization-defined time period for transfer and resumption; and
-
Provide controls at the alternate processing site that are equivalent to those at the primary site
CP-7 (1) Separation From Primary Site:
Identify an alternate processing site that is sufficiently separated from the primary processing site to reduce susceptibility to the same threats.
CP-7 (2) Accessibility:
Identify potential accessibility problems to alternate processing sites in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.
CP 7 (3) Priority of Service:
Develop alternate processing site agreements that contain priority-of-service provisions in accordance with availability requirements (including recovery time objectives).
CP-8 Telecommunications Services
Establish alternate telecommunications services, including necessary agreements to permit the resumption of system operations for essential mission and business functions within a specific time period defined by the Agency’s business leadership as specified in the applicable system contingency plan, Information System Contingency Plan (ISCP), Business Impact Analysis (BIA), or Continuity of Operations Plan (COOP) when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
CP-8 (1) Priority of Service Provisions
-
Develop primary and alternate telecommunications service agreements that contain priority-of-service provisions in accordance with availability requirements (including recovery time objectives); and
-
Request Telecommunications Service Priority for all telecommunications services used for national security emergency preparedness if the primary and/or alternate telecommunications services are provided by a common carrier.
CP-9 Information System Backup
-
Conduct backups of user-level information contained in system and security-related documentation consistent with:
-
Daily Incremental backups and weekly full backups;
-
Maintaining three (3) generations of backups, at least one (1) of which is available online (a full backup and all related incremental backups);
-
-
Conduct backups of system-level information contained in the system consistent with:
-
Daily Incremental backups and weekly full backups;
-
Maintaining three (3) generations of backups, at least one (1) of which is available online (a full backup and all related incremental backups);
-
-
Conduct backups of system documentation, including security-and privacy-related documentation consistent with:
-
Daily Incremental backups and weekly full backups;
-
Maintaining three (3) generations of backups, at least one (1) of which is available online (a full backup and all related incremental backups); and
-
-
Protect the confidentiality, integrity, and availability of backup information.
CP-10 Information System Recovery and Reconstitution
Provide for the recovery and reconstitution of the system to a known state within agency-defined time period consistent with recovery time and recovery point objectives specified in the contingency plan, or COOP after a disruption, compromise, or failure.
Evaluation
The Office of Information Technology (OIT), upon recommendation of the DHS Chief Information Security Officer (CISO), evaluates this policy annually by:
-
Comparing its content and intent to evolving regulatory compliance standards imposed upon the Agency, such as, IRS 1075, NIST 800-53, and CMS MARS-E.
-
Addressing any deficiencies or gaps discovered during periodic audits conducted by Georgia DOAA or other regulatory bodies, such as, IRS, CMS, SSA, FBI, etc.