Glossary of Cyber Continuity Terms and Definitions

The terminology used across cyber continuity, disaster recovery, and operational resilience disciplines draws from overlapping frameworks maintained by federal agencies, standards bodies, and sector-specific regulators. Precision in language directly affects how organizations plan, test, and execute continuity operations during cyber events. This reference defines the core terms structuring the cyber continuity service landscape, maps them to authoritative sources, and distinguishes between concepts that are frequently conflated in practice.


Definition and scope

Cyber continuity terminology spans three distinct regulatory and professional domains: information security (governed primarily by NIST and CISA), business continuity management (standardized under ISO 22301), and disaster recovery (addressed in NIST SP 800-34 Rev. 1). The boundaries between these domains are formal, not stylistic — a term's definition determines which regulatory obligation it triggers and which professional role owns it.

Authoritative term definitions include:

  1. Availability — One of the three properties in the CIA triad (Confidentiality, Integrity, Availability). NIST SP 800-53 Rev. 5 defines availability as "ensuring timely and reliable access to and use of information" (NIST SP 800-53 Rev. 5, §SC-1).
  2. Business Continuity Plan (BCP) — A documented set of procedures and resources enabling an organization to maintain essential functions during and after a disruption. ISO 22301:2019 defines the BCP as a product of Business Continuity Management Systems (BCMS).
  3. Continuity of Operations Plan (COOP) — Federal terminology for plans ensuring continuation of essential government functions. Governed under Federal Continuity Directive 1 (FCD-1) issued by FEMA (FEMA FCD-1).
  4. Cyber Recovery — A subset of disaster recovery focused specifically on restoring systems and data integrity following a cyber event such as ransomware or destructive malware. Distinct from general IT disaster recovery in scope and threat model — a distinction detailed in the disaster recovery vs. cyber recovery reference.
  5. Disaster Recovery Plan (DRP) — A documented procedure for recovering IT infrastructure after a disruptive event. NIST SP 800-34 Rev. 1 defines the DRP as distinct from the BCP: the DRP addresses technical infrastructure; the BCP addresses organizational operations (NIST SP 800-34 Rev. 1).
  6. Resilience — NIST defines cyber resilience as "the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources" (NIST SP 800-160 Vol. 2). The broader framework context is covered in cyber resilience frameworks in the US.
  7. Recovery Time Objective (RTO) — The maximum acceptable duration of downtime for a system or function following a disruptive event. RTOs are set during the Business Impact Analysis (BIA) phase. See recovery time objectives for cyber incidents for classification context.
  8. Recovery Point Objective (RPO) — The maximum acceptable data loss measured in time — specifically, how far back in time an organization can tolerate restoring from a backup. RPO governs backup frequency requirements. Detailed treatment appears at recovery point objectives in cybersecurity.
  9. Maximum Tolerable Downtime (MTD) — The outer boundary of acceptable disruption before organizational viability is threatened. MTD is broader than RTO; RTO must always be less than MTD.
  10. Incident Response Plan (IRP) — Procedures for detecting, containing, and eradicating a cyber incident. The IRP operates at a shorter time horizon than the BCP and feeds into it. See cyber incident response and continuity planning.

How it works

Term hierarchies in cyber continuity are not arbitrary — they reflect dependencies in planning architecture. The BCP sits at the top of the continuity planning hierarchy, governing organizational function. The DRP is subordinate to the BCP and governs technical recovery. The IRP is triggered first during a cyber event and hands off to the DRP once containment is achieved.

The NIST Cybersecurity Framework (CSF) 2.0 organizes cyber continuity activity into six functions: Govern, Identify, Protect, Detect, Respond, and Recover (NIST CSF 2.0). Terms like RTO and RPO sit within the Recover function. Terms like threat actor, attack vector, and threat intelligence sit within Identify and Detect.

The NIST Cybersecurity Framework and continuity planning reference maps these functions to specific continuity planning obligations.

Key term pairs that are frequently misapplied:


Common scenarios

Ransomware events expose gaps between IRP and DRP scope. The IRP governs the first 72 hours — isolation, forensic preservation, threat actor identification. The DRP governs the restoration sequence. If backup systems were encrypted before detection, the RPO calculation changes fundamentally. The ransomware and business continuity impact reference addresses this scenario class.

Healthcare organizations operating under HIPAA must align their BCP with the HIPAA Security Rule's Contingency Plan standard at 45 CFR §164.308(a)(7), which requires a data backup plan, disaster recovery plan, and emergency mode operation plan as distinct addressable or required implementation specifications (HHS HIPAA Security Rule). The HIPAA cybersecurity and continuity in healthcare reference provides sector-specific term context.

Financial sector organizations operate under additional term definitions from FFIEC and OCC guidance, where terms like "operational resilience" and "critical operations" carry specific regulatory meaning distinct from general NIST definitions (FFIEC IT Examination Handbook).


Decision boundaries

Selecting the correct term in planning documents is not semantic precision for its own sake — regulatory auditors and examiners apply definitions as written in governing frameworks. Submitting a DRP where a COOP is required under FCD-1, or conflating RTO with MTD in a HIPAA contingency plan, creates compliance exposure.

The following classification criteria determine which framework's definitions apply:

  1. Sector — Healthcare uses HIPAA; financial institutions use FFIEC; federal agencies use FEMA/FCD-1; critical infrastructure operators use CISA sector-specific guidance.
  2. Organization type — Private sector BCPs are governed by ISO 22301 and NIST SP 800-34; federal agency COOPs are governed by FCD-1 and FCD-2.
  3. Event type — Natural disaster and infrastructure failure events use traditional DR terminology; adversarial cyber events (ransomware, nation-state intrusion) trigger cyber recovery terminology with different trust assumptions.
  4. Regulatory audit scope — Terms that appear in audit questionnaires (SOC 2, FedRAMP, HIPAA, PCI DSS) must align exactly with the definitions used by the auditing body. NIST and ISO define the same concept differently in 3 key areas: scope of applicability, certification requirements, and integration with information security management systems (ISMS).

The cyber continuity maturity models reference maps these term choices to organizational maturity levels and the regulatory requirements for cyber continuity in the US provides the full compliance framework landscape.


References

Explore This Site