Incident Handling Procedure and Business Continuity Plan
If an incident occurs and need to resolve a danger immediately, execute the Incident Handling Procedure. After that, if there is a business disrupt, execute the Business Continuity Plan.
In accordance with the official definition of the ISO 22301-Business Continuity Management Systems, an incident is a situation that might be, or could lead to, a disruption, loss, emergency or crisis. On the other hand, in the standard there is no official definition for disaster, but we can consider that is the same or similar to a crisis or emergency. So, an incident can result in a disaster.
In accordance with the official definition of the ISO 22301-Business Continuity Management Systems, an incident is a situation that might be, or could lead to, a disruption, loss, emergency or crisis. On the other hand, in the standard there is no official definition for disaster, but we can consider that is the same or similar to a crisis or emergency. So, an incident can result in a disaster.
Los términos y definiciones están incluidos en la ISO 27000 (no en la ISO 27001), y no existe una definición oficial para el término "organización", pero lo importante aquí es el alcance de la ISO 27001, el cual puede afectar a toda la organización o sólo a una parte. Por tanto, sí, se puede definir el alcance de la ISO 27001 para sólo una parte.
Por último, si quieres definir el alcance de la ISO 27001, este artículo te resultará muy útil:
And finally, you can use our templates. We have specifically documents for the development of the Business Continuity Plan, and you can download a free version if you click on the Free Demo tab: https://advisera.com/27001academy/iso22301-documentation-toolkit/
Both concepts are related with the same thing: risks. Let me explain the relation:
What is the SOA? Is a document that includes the applicability of all controls (basically each control can apply or not)
What is the risk treatment? Basically is a plan that include actions to reduce risks.
The actions that you need to include in the risk treatment, are related to the security controls, but What security controls? Only the controls that apply to the organization, and What controls can apply? Depends on the SOA. So, in other words, the Risk Treatment Plan is the "implementation plan" for the Statement of Applicability.
There are some domains of control that are not related to IT. Example: A.7 Human Resource Security and A.15 Supplier relationships. But A.12 is directly related with IT because has controls about backups, malware, monitoring, technical vulnerabilities, etc.
Remember that there are a list of documentes that you need to be compliant with ISO 27001, and one of this is related to the control A.12.1.1 Operating procedures for IT management. To see this list, please read this article (you also can see a list of Non-mandatory documents) List of mandatory documents required by ISO 27001 (2013 revision): https://advisera.com/27001academy/knowledgebase/list-of-mandatory-documents-required-by-iso-27001-2013-revision/
Context and interested parties
You can do it in the same document (recommended), although you also can do it in different documents. The standard does not establishes that both paragraphs have to be defined in the same document, only establishes that you have to define them. If you need more information about how to define the scope, please read this article How to define the ISMS scope: https://advisera.com/27001academy/knowledgebase/how-to-define-the-isms-scope/
Keep in mind that the control A.9.4.4 is for utility programs (any software that you need for your activity in the organization and you install it in the system operative), so the first step is to identify them in your organization. Next step: There are unnecessary utility programs? If yes, delete them. Next step: There are some utility program which can access any people? If yes, is necessary to establish a password. There are systems with password that access different people? If yes, it is necessary to establish different users (not unique user administrator or root for all ).
In your case, my recommendation is: segregate functions, create a new group and include on it users that do not need administrator access, it should be only for 1-2 people (administrator systems). If it is necessary that other users have administrator privilegies, you can create another group, but independent of the administrator group.