To get the best help for your situation, first answer the questions on the guide's start page.
- Guide's start page
- Introduction to digital security risk management
- Risk management
- Safety and security management
- Continuity management and preparedness
- Information security
- Data protection
- Checklist
Recovery from security breaches
Use risk management to prepare for security breaches
Risk management is part of continuity management and supports good preparedness. The consequences of a security breach can be reduced and recovery made easier if the possibility of the event has been identified and the processing measures have been considered in advance.
Follow the disaster recovery plan
The organisation must prepare a disaster recovery plan for at least the critical functions and services of the organisation. The disaster recovery plan describes the actions and resources the organisation can use to return to a normal state or other level decided by the organisation’s management.
At least the most important identified risks must be taken into account in the disaster recovery plans.
Communicate recovery actions to management and stakeholders
By following the disaster recovery plan’s instructions for communications, you can keep the management and key stakeholders informed on
- the recovery progress
- the adequacy of resources, and
- other relevant details.
Agree in the plan on how to communicate with the stakeholders who are key in terms of recovery, such as service providers.
Develop protection processes
Maintaining good resilience, or ability to recover, requires continuous measures, and protection and recovery processes must be continuously developed. If changes are needed in your organisation’s processes, update them to reflect the new conditions.
You should add the development of protection and recovery measures to the management’s annual clock, for example.

Learn from past security breaches
Each deviation is an opportunity to develop your operation. During recovery, you should identify development areas that can, for example,
- develop the organisation’s protection processes
- decrease the probability of recurrence or impacts
- identify more effective or faster recovery methods
- identify useful recovery or protection processes that also work on other risks.
Measure the success of information security processes
The organisation must set indicators and identifiers suitable for its operations. With indicators, the organisation can assess
- whether the processes set for information security, recovery and digital security work appropriately
- how development activities have contributed to the success of information security processes.
Setting appropriate indicators also helps to make development
- regular
- systematic, and
- controlled.
Monitor needs and develop activities
As the digital operating environment changes, you must monitor the changes in the needs of the organisation and stakeholders. Changes may occur, for example, in the needs of the following actors:
- organisation
- management
- human resources
- specialists
- suppliers
- customers or
- other stakeholders.