This Business Continuity Plan (BCP) documents Synoptix’s strategy and procedures to ensure continuity of critical business functions during and after a disruptive event (natural disaster, data-center outage, cyber incident, pandemic, prolonged third-party outage, loss of key personnel, etc.). The BCP’s goals are to:
This plan supplements (and must be used in coordination with) Synoptix’s Security Incident Response Program, Information Security Program, Access Control Policy, and Media Use & Handling Policy.
Applies to all Synoptix business units that contribute to delivering customer-facing services and critical internal operations, including:
These targets align with Synoptix’s InfoSec and DR plans:
Critical production systems (transactional DBs, API endpoints)
4 hours
1 hour
Support & incident triage capability (ticketing, communications)
4 hours
up to 4 hours
Non-critical services (internal tooling, analytics)
24 hours
4 hours
Backups & archived data
Restore within 24 hours (per test)
Nightly backups, RPO as above
Corporate email and collaboration tools
8 hours
up to 4 hours
Note: Exact RTO/RPO for customer-specific environments may vary by contract and hosting choice (customer-managed vs Synoptix Cloud). Always consult the customer contract/DPA.
BCP is activated when a disruption meets one or more of the following:
Executive Sponsor (CEO)
Authorize BCP activation, approve customer/public notifications, prioritize resources and funding.
Incident Commander / IRT Lead
Coordinate BCP activities, run the War Room, assign recovery teams and objectives, report status to Exec Sponsor.
Business Continuity Coordinator (BCC)
Maintain the BCP document, organize drills/tests, coordinate non-technical logistics (facilities, vendor coordination).
Infrastructure & DBA Team
Execute technical recovery tasks: failover, restore backups, network reconfiguration, re-issue credentials.
DevOps / Application Owners
Recover application stacks, deploy hotfixes, run smoke tests, validate data integrity.
Support & Customer Communications
Prepare and send customer notifications, triage customer issues, provide regular status updates.
HR / Facilities
Personnel safety accounting, arrange alternate workspace or remote access, handle staff communications.
Legal / Compliance
Review statements for regulatory needs, advise on breach notifications and contractual obligations.
Security Champions
Support secure handling of recovery activities, ensure remediation adheres to security policies.
All Employees
Follow instructions from managers and BCP coordinators, maintain personal availability for designated roles.
Identify dependencies and single points of failure.
This section provides high-level runbooks for typical scenarios. Each runbook has: detection → activation → containment → recovery → validation → communication → lessons learned.
Important: When a security incident is involved (ransomware, confirmed intrusion), run this plan in close coordination with the Security Incident Response Program — prioritize containment and forensic preservation.
Detection: Cloud provider reports region outage, or internal monitors show service unavailability.
Activation: IRT Lead recommends BCP activation; Exec Sponsor authorizes.
Immediate Actions (0–1 hour)
Containment & Failover (1–4 hours)
4. If multi-region architecture exists: initiate failover to secondary region (DNS failover or provider failover).
5. If no automatic failover, restore the most recent clean backup to DR/staging region and bring services online.
6. Rotate/verify credentials for any restored systems.
Recovery & Validation (4–24 hours)
7. Run smoke tests against restored services; validate essential transactions and data integrity.
8. Monitor logs closely for anomalies.
Communication
9. Send initial customer notification within 4 hours (if customers impacted) and update every 4–8 hours until services restored.
10. Prepare public statement if broad customer base impacted.
Post-Recovery
11. Conduct Lessons Learned and update failover playbook; schedule any remediation (e.g., improve multi-region strategy).
Detection: Unusual file encryption events, external notification of ransom demand, or data integrity failures.
Activation: Immediate BCP + IR Program activation; include Legal.
Immediate Actions (0–1 hour)
Containment & Eradication (1–24 hours)
4. Restore affected systems from the most recent clean backups (verify pre-compromise snapshot).
5. Rotate credentials (esp. admin keys and service accounts).
6. Apply patches and remediation to close the exploited vector.
Recovery & Validation (24–72 hours)
7. Validate data integrity and system behavior. Run extensive testing before re-enabling integrations.
8. Coordinate with customers about data exposure, remediation steps, and recommended actions (password rotations, logs review).
Communication & Reporting
9. Notify affected customers and regulators as required (within 48 hours of confirmation per Synoptix IR Program).
10. Prepare public communication only after Legal/Exec sign-off.
Post-Recovery
11. Conduct an in-depth post-mortem; update DR backup cadence and offline/immutable backups strategy.
Detection: Loss of internet connectivity for corporate office or primary network paths.
Activation: Partial BCP activation for affected worksite or service.
Immediate Actions
Recovery
4. Use alternate ISP or cellular-based internet to re-establish minimal operations (hotspotting for critical staff).
5. Prioritize support and customer communications.
Detection: Key employee unexpectedly unavailable (sudden resignation, illness, travel incident).
Activation: BCP team coordinates continuity; consider temporary role reassignment and knowledge transfer.
Immediate Actions
Recovery
4. Reassign projects and update schedule. Consider temporary contractor support if backlog risks continuity.
Detection: Government orders or elevated risk makes office inaccessible.
Activation: BCP for pandemic mode: prioritize remote work, critical staffing, and mental-health supports.
Immediate Actions
Recovery & Return to Work
4. Staged return to office based on local rules and Executive Sponsor guidance.
Internal — Initial Alert
Subject: [BCP] Incident Declared — [Brief Title]
Team,
An incident affecting [service/office] was detected at [time]. The Incident Commander is [name]. BCP is activated. Do not take independent actions that may interfere with recovery. Standby for further instructions via [War Room link / Slack channel].
— [Executive Sponsor / IRT Lead]
Customer — Initial Notification (impacted customers only)
Subject: Synoptix Service Notification — [Service Name] outage
Hello [Customer Name],
We are investigating an incident impacting [service]. Our Incident Response and Infrastructure teams have activated our Business Continuity Plan and are working on recovery. We will provide an update within [X hours]. If you require immediate assistance, contact [support@synoptix.com / phone].
We apologize for the inconvenience and will follow up with next steps.
— Synoptix Support Team
Public — If required
Short factual description, status, expected next update, contact/email.
(Legal reviews all external statements before publication.)
(Populate with real contacts and keep in KMS / secure internal wiki)
1.0
September 9, 2025
Initial Synoptix BCP tailored to existing InfoSec and DR practices.\
Business Continuity Coordinator / InfoSec Lead