IT- Disaster Recovery for a Business Continuity
IT disaster recovery consists of developing step-by-step procedures for a full recovery, disaster avoidance and business continuity.
When many think about DR, they usually think about Backup, while it is only one piece in BC-DR puzzle and inefficient for a continuity of business operations in an event of a disaster.
Backup is not disaster recovery (DR) based on following points:
- Failure of backup software
- Service Levels: backups typically happen twice per day which means that a RTO will be significantly higher and RPO could be ~12 hours data loss which is not acceptable for critical applications in DR concept.
- Reverse Replication: in an event of an outage, once an application has been made available on a target site, you must extend that application’s protection to include new data being created. A backup solution can not start taking backups and ship them back to a production site, yet a DR solution will ensure that an application is still protected by replicating back to a source site.
- Application Impact: backups occur at night because, making a copy of an application and its data load a CPU on a server and impacts significantly end-user productivity.
Every institution large or small should have both a backup mechanism and disaster recovery solution in place; they are complementary pieces to a same puzzle.
Mitigation Measures for Some IT- Hazards
POSSIBLE RISK
|
MITIGATION MEASURE
|
DOWNTIME
• Hardware
• Software
|
• Redundancy
• Maintenance and upgrade of software
|
NETWORK
• Unreliable network
• Loss of connectivity
• Traffic
• Misconfiguration
|
• Design and monitor a network for a maximum reliability
• Physical protection, Redundancy or diverse paths
• Network segmentation
• Installation of firewalls to ensure security
• Load balancing (Intelligent direction to backup site)
• Use automation to deploy changes, test all configurations in a lab environment before making changes on your production devices.
|
DATA AND APPLICATION
• File corruption
• Application downtime
• Malicious software
|
• Data backup
• Mirroring of application, load balancing and replication
• Security management and installation of antivirus
|
EQUIPMENT FAILURES
• Server failure
• Server Overload
• Other Hardware
• Old equipment
|
• Redundant disks, Backups, SAN / NAS
• Load balancer/Monitoring/virtualization
• Regular maintenance
• Planning for upgrades and replacing out-of-date equipment.
|
POWER
• Power Outage
• Equipment failure
|
• Redundancy and backup power supply (UPS and Generators)
• Monitoring and performing preventative maintenance regularly.
|
ATTACKS
• DDoS
• Viruses
• Hackers
• Other attacks
|
• Managed security services/anti-DDoS
• Installation of antivirus
• Firewall and other security features
• Access control system
|
HUMAN ERROR
• File deletion
• Unskilled people
• Fire
|
• Regular backup
• Access management
• Training / Staff certification requirements
• Fire detection system, fire extinguisher and fire hydrant
|