Impact Tolerance Setting: A Practitioner Methodology

Photo of author
Written By Chris Ekai
Key Takeaways
Impact tolerances define the maximum tolerable disruption to an important business service before intolerable harm occurs to consumers, markets, or financial stability.
The PRA and FCA required UK firms to remain within impact tolerances by 31 March 2025; DORA imposes similar expectations across the EU from January 2025.
A robust methodology uses five steps: identify important business services, map dependencies, define harm thresholds, calibrate tolerances, and test against severe-but-plausible scenarios.
Tolerances must go beyond a single time metric; best practice includes financial thresholds, customer volumes, data-integrity limits, and reputational triggers.
Calibration should anchor to consumer harm data, complaint volumes, and regulatory expectations rather than internal recovery convenience.
Scenario testing must incrementally increase in severity until the organisation can no longer stay within tolerance, revealing true vulnerability points.
Board ownership and annual recalibration are non-negotiable; tolerances are governance artefacts, not technical settings.

The FCA’s 2025 Insights and Observations report flagged a persistent weakness across regulated firms: impact tolerances that rely on a single time-based metric with limited rationale for why that threshold represents the point of intolerable harm.

Too many organisations set a number that feels comfortable rather than one that reflects genuine consumer or market consequences.

That gap matters. Since 31 March 2025, every PRA- and FCA-regulated firm must demonstrate it can remain within impact tolerances for each important business service under severe-but-plausible scenarios.

The EU’s DORA regulation, enforceable since January 2025, drives similar expectations for digital operational resilience across 27 member states.

This methodology guide gives you a repeatable, five-step process for setting, calibrating, and testing impact tolerances.

Every step includes tables, worked examples, and templates you can adapt directly. The approach aligns with ISO 22301 recovery concepts and the broader operational resilience vs business continuity framework that underpins modern resilience programmes.

Impact Tolerance Setting: A Practitioner Methodology
Impact Tolerance Setting: A Practitioner Methodology

What Is an Impact Tolerance?

An impact tolerance is the maximum tolerable level of disruption to an important business service, measured by duration and any other relevant metrics.

The PRA defines it as the point at which disruption would pose a risk to a firm’s safety and soundness or to financial stability. The FCA frames it as the point of intolerable consumer harm or risk to market integrity.

These definitions drive every decision in the calibration process. Understanding this concept is fundamental to your wider business continuity management and enterprise risk management framework.

Impact Tolerance vs RTO vs Risk Appetite

ConceptDefinitionSet ByPurpose
Impact ToleranceMaximum tolerable disruption before intolerable harm to consumers/marketsBoard / service ownerDrives resilience investment and scenario testing
RTO (Recovery Time Objective)Target time to restore a process after disruptionBCM team (via BIA)Drives recovery plan design and DR infrastructure
RPO (Recovery Point Objective)Maximum acceptable data loss measured in timeIT / BCM teamDrives backup frequency and replication strategy
Risk AppetiteAggregate amount and type of risk the board is willing to acceptBoard / risk committeeSets boundaries for strategic risk-taking
MTPDMaximum tolerable period of disruption before viability is threatenedSenior managementTriggers escalation to crisis management

The critical insight: an impact tolerance looks outward from the customer or market perspective, while RTOs and RPOs look inward at recovery capability.

A firm can meet every RTO and still breach its impact tolerance if the customer experience degrades beyond acceptable limits. This distinction is what separates operational resilience from traditional business continuity.

Step 1: Identify Important Business Services

Before setting any tolerance, you must define what matters. The PRA and FCA require firms to identify their “important business services” (IBS) — services delivered to external end-users where disruption could cause intolerable harm.

This is not the same as a business impact analysis process list; IBS are defined from the customer and market perspective, not the internal process perspective.

IBS Identification Criteria

CriterionDescriptionExample Questions
Consumer dependencyService is essential for consumers to access financial products or manage their affairsCan customers access their money? Can they make payments? Can they view their balances?
Market significanceDisruption would affect the orderly functioning of financial marketsDoes the service support price discovery, clearing, or settlement?
Financial stabilityService failure could pose systemic riskDoes the service underpin critical financial infrastructure?
Regulatory obligationService is tied to a specific regulatory requirement or licence conditionIs the service a condition of the firm’s authorisation?
Third-party provisionService is delivered through or depends heavily on third partiesDo external providers handle key processing, hosting, or data?

Step 2: Map Dependencies and Resources

Once you have identified your important business services, map the people, processes, technology, facilities, information, and third-party providers that support each service end-to-end.

The FCA has been clear that mapping must be comprehensive enough to identify single points of failure and concentration risks. This feeds directly into your risk register and dependency analysis.

Dependency Mapping Template

IBS NamePeopleTechnologyDataThird PartiesFacilities
Customer PaymentsPayments ops team (12 FTE); on-call rotaCore banking system; SWIFT gateway; API layerTransaction records; customer auth data; AML screeningPayment processor (Vendor A); cloud host (Vendor B)Primary DC (London); DR site (Manchester)
Client OnboardingKYC team (8 FTE); compliance analystsCRM; ID verification platform; document mgmtPII; KYC/AML data; beneficial ownership recordsID verification provider; credit reference agencyHead office; remote-capable
Investment TradingTrading desk (20 FTE); risk analystsOrder management system; market data feeds; FIX connectivityTrade data; position records; market dataExchange connectivity; prime broker; clearing houseTrading floor; DR trading room

Step 3: Define Harm Thresholds and Metrics

This is where most firms struggle. The FCA flagged that firms use a narrow range of metrics and lack the rationale connecting those metrics to genuine harm.

Best practice requires multiple harm dimensions, each with a measurable threshold that represents the tipping point from tolerable to intolerable disruption. These thresholds connect to your key risk indicators and risk appetite statement.

Impact Tolerance Setting: A Practitioner Methodology
Impact Tolerance Setting: A Practitioner Methodology

Harm Dimensions and Metric Examples

Harm DimensionMetricThreshold Example (Payments)Data Source
DurationHours/days of service unavailabilityMaximum 4 hours total outage in any 24-hour periodIncident management system
Consumer volumeNumber of customers unable to access the serviceNo more than 50,000 customers affected simultaneouslyTransaction monitoring; call centre data
Financial lossCumulative financial impact to consumers or firmNo more than £25 million cumulative consumer financial impactFinance systems; claims data
Data integrityRecords corrupted, lost, or compromisedZero tolerance for irrecoverable loss of transaction recordsDatabase integrity checks; reconciliation logs
Market impactEffect on market functioning or price discoveryNo disruption exceeding 30 minutes during market hoursExchange connectivity monitoring
ReputationalMedia coverage, complaint volumes, NPS impactFewer than 500 formal complaints within 48 hours of disruptionComplaints register; social media monitoring

Each harm dimension should have a documented rationale explaining why that threshold represents the point of intolerable harm.

The rationale is not optional; the FCA explicitly requires it as part of the firm’s self-assessment and it supports your broader compliance risk assessment programme.

Step 4: Calibrate Impact Tolerances

Calibration converts your harm thresholds into a single, board-approved impact tolerance for each important business service. The tolerance is set at the most conservative (binding) constraint across all harm dimensions.

This means if consumer volume harm triggers at 4 hours but financial loss triggers at 6 hours, the impact tolerance is 4 hours. The calibration must reflect regulatory expectations, not internal convenience.

Impact Tolerance Setting: A Practitioner Methodology
Impact Tolerance Setting: A Practitioner Methodology

Calibration Decision Matrix

IBSDuration LimitConsumer VolumeFinancial CapData IntegrityCalibrated Tolerance
Customer Payments4 hours50,000 customers£25m cumulativeZero irrecoverable loss4 hours (binding: duration + consumer volume)
Client Onboarding24 hours5,000 applications£5m cumulativeZero PII loss24 hours (binding: duration)
Investment Trading30 minutes (market hours)All trading clients£50m market exposureZero trade record loss30 minutes during market hours (binding: market impact)
Claims Processing48 hours10,000 claimants£10m delayed paymentsZero claim record loss48 hours (binding: consumer financial harm)

Calibration Governance Checklist

Governance RequirementEvidence Required
Board approval of each toleranceBoard minutes recording approval with named owner per IBS
Documented rationale per harm dimensionWritten explanation linking threshold to consumer/market harm
Alignment with risk appetite statementCross-reference showing tolerance sits within board risk appetite
Regulatory benchmarkingComparison with sector peers, regulatory guidance, and supervisory feedback
Annual review and recalibration triggerPolicy requiring review at minimum annually or after material change
Self-assessment documentationAnnual self-assessment per PRA SS1/21 and FCA PS21/3 requirements

Step 5: Test, Validate, and Refine

Setting a tolerance is meaningless without testing it.

The PRA requires firms to use “severe but plausible” scenarios that vary in nature, severity, and duration, testing incrementally until the firm can no longer stay within tolerance.

This reveals the true gap between aspiration and capability. Testing methodology feeds into your scenario analysis programme and aligns with your disaster recovery plan exercises.

Scenario Testing Framework

Scenario TypeDescriptionSeverity LevelTesting Method
Cyber attackRansomware encrypts core systems; data exfiltration detectedHighSimulated attack with isolated environment; communication exercise
Third-party failureCritical vendor experiences prolonged outage (>72 hours)Medium-HighTabletop with vendor representatives; switchover drill
Pandemic / people risk40% of key staff unavailable for 2+ weeksMediumRemote-working stress test; cross-training validation
Facility lossPrimary data centre or office destroyedHighFull DR failover exercise; alternative site activation
Combined scenarioCyber attack during peak trading period with concurrent vendor failureSevereFull-scale simulation combining multiple failure modes

Testing Outcomes and Actions

Test ResultInterpretationRequired ActionReporting
Within toleranceService maintained within all harm thresholds under scenarioDocument result; schedule next test cycleGreen status in board dashboard
Near-breach (within 80-100%)Service approached but did not exceed tolerancePrioritise remediation of identified weaknesses; retest within 90 daysAmber status; escalate to risk committee
Tolerance breachedService exceeded one or more harm thresholdsMandatory remediation plan with owner, deadline, and investment caseRed status; board escalation; regulatory notification consideration
UntestableInsufficient data, tooling, or access to run meaningful testInvest in monitoring, tooling, or mapping before next test windowGap flagged in self-assessment

Key Risk Indicators for Impact Tolerance Monitoring

Once tolerances are live, continuous monitoring is essential. The KRIs below provide early warning that a service is drifting toward a tolerance breach.

These supplement your existing KRI dashboard and connect to the leading vs lagging KRI framework.

KRITypeGreenAmberRedData Source
Service availability (%)Leading>99.9%99.5-99.9%<99.5%Real-time monitoring platform
Incident count per IBS (monthly)Lagging0-12-3>3Incident management system
Mean time to detect (MTTD)Leading<15 min15-60 min>60 minSIEM / monitoring tools
Mean time to recover (MTTR)Lagging<50% of tolerance50-80% of tolerance>80% of toleranceIncident records
Third-party SLA adherence (%)Leading>98%95-98%<95%Vendor performance reports
Overdue remediation actionsLeading01-3>3Issues register
Days since last scenario testLeading<90 days90-180 days>180 daysTesting calendar
Customer complaints post-incidentLagging<5050-200>200Complaints register
Impact Tolerance Setting: A Practitioner Methodology
Impact Tolerance Setting: A Practitioner Methodology

90-Day Implementation Roadmap

This roadmap takes you from initial assessment through to board-reported, tested impact tolerances.

Each phase produces artefacts that satisfy both PRA/FCA and DORA expectations. The approach aligns with your risk management lifecycle and risk management process steps.

PhaseActionsDeliverablesSuccess Metrics
Days 1-30: Identify & MapReview and confirm IBS register; conduct dependency mapping workshops for top 5 services; gather historical incident, complaint, and financial loss data; benchmark against regulatory guidance and peer practicesValidated IBS register; end-to-end dependency maps; historical harm data pack; regulatory gap analysis100% of IBS confirmed by exec committee; maps completed for top 5 services; data pack covers 3+ years
Days 31-60: Calibrate & GovernDefine harm dimensions and thresholds per IBS; run calibration workshops with service owners; draft board paper with proposed tolerances; secure board approval; document rationale per toleranceBoard-approved impact tolerances; calibration rationale documents; governance framework (RACI, review triggers); updated risk appetite statement cross-referenceAll IBS have multi-metric tolerances; board minutes record approval; rationale documents pass peer review
Days 61-90: Test & ReportDesign and execute first scenario tests per IBS; document test results and gap analysis; produce self-assessment report; brief board on tolerance compliance status; plan Year 2 testing programmeScenario test reports; remediation plan for any breaches; self-assessment report; board resilience dashboard; Year 2 testing calendarAll IBS tested against at least one severe-but-plausible scenario; remediation plans owned and funded; self-assessment submitted

Common Pitfalls and How to Avoid Them

Based on FCA supervisory observations and practitioner experience, these are the mistakes that repeatedly undermine impact tolerance programmes.

Awareness of these pitfalls should be built into your RCSA process and internal audit risk assessment scope.

PitfallRoot CauseRemedy
Single time-based metric onlyLegacy BCM thinking carries over to ORAdopt multi-dimensional harm metrics: duration + volume + financial + data integrity + reputational
Tolerances set for internal comfortDesire to avoid breaches rather than reflect real consumer harmAnchor to external data: complaint volumes, financial loss history, regulatory thresholds
No documented rationaleTolerance treated as a technical setting rather than a governance artefactRequire written justification per harm dimension linking threshold to specific consumer/market harm
Mapping stops at first-tier dependenciesThird-party risk function operates separately from OR teamMandate nth-party mapping for critical services; include sub-contractors and cloud providers
Scenario testing is superficialTests designed to pass rather than to stressUse PRA’s severe-but-plausible standard; increment severity until breach; test combined failure modes
Board receives tolerances but does not own themTolerance-setting delegated to operational teamsName a board member as sponsor for each IBS; include tolerance status in board risk dashboard
No recalibration triggerTolerances set once and forgottenDefine triggers: material incident, regulatory feedback, business change, annual review cycle

The impact tolerance discipline is maturing fast. BCI research shows that over 70% of organisations now run formal operational resilience programmes, up from under 40% five years ago, and tolerance-setting is at the heart of that growth.

Practitioners working across operational risk management and GRC frameworks should track three developments.

First, regulators will scrutinise rationale quality. The FCA’s 2025 observations explicitly called out weak rationale.

Expect supervisory deep-dives into how firms derived their numbers, with firms that simply benchmarked peers facing challenge. The data-driven, harm-anchored approach in this guide is the direction of travel.

Second, dynamic tolerances will emerge. Static, annual-review tolerances will give way to tolerances that flex based on real-time service health data, seasonal demand patterns, and threat intelligence feeds.

Firms investing in KRI automation and continuous monitoring will lead this shift.

Third, cross-border convergence will accelerate. DORA, the UK regime, MAS guidelines, and Basel BCBS principles are converging on similar expectations.

Multinational firms that build a single tolerance methodology adaptable across jurisdictions will avoid duplicative work and inconsistent standards. Staying aligned with the three lines model ensures governance consistency across geographies.

Ready to set your impact tolerances? Download templates, calibration tools, and consulting support at riskpublishing.com. Need a guided workshop for your board or executive team? Contact us to discuss your programme.

References

1. PRA PS6/21: Operational Resilience — Impact Tolerances for Important Business Services — PRA policy statement on impact tolerances.

2. FCA PS21/3: Building Operational Resilience — FCA final rules on operational resilience.

3. FCA Operational Resilience: Insights and Observations — FCA supervisory findings on firm readiness.

4. EU Digital Operational Resilience Act (DORA) — EU regulation on digital operational resilience.

5. Sidley Austin: UK Operational Resilience Rules — Are You Ready for 31 March 2025? — Legal analysis of compliance deadline.

6. The Investment Association: Impact Tolerances — Appetite for Disruption — Sector guidance on tolerance calibration.

7. WTW: How Are You Determining Your Impact Tolerances? — Practitioner guidance on tolerance methodology.

8. Sunando Roy: Impact Tolerance Metrics and Operational Resilience — Academic perspective on multi-metric tolerances.

9. Everbridge: Impact Tolerance in Operational Resilience — Industry guide on tolerance setting.

10. BCI: Growing Global Momentum Behind Operational Resilience — 70%+ OR programme adoption data.

11. CMORG: Guidance for Firm Operational Resilience v3 (April 2025) — Capital markets sector guidance.

12. Addleshaw Goddard: Operational Resilience Deadline — Legal briefing on March 2025 compliance.

13. Beyond Blue: Impact Tolerances — Beyond Time-Based Metrics — Multi-dimensional tolerance approach.

14. ISO 22301:2019 Business Continuity Management Systems — International BCM standard.