SlideShare a Scribd company logo
1 of 56
Download to read offline
Information
Security
Business Continuity &
Disaster Recovery Planning
Narudom Roongsiriwong, CISSP
Objectives
 Running a business continuity and
disaster recovery planning project
 Developing business continuity
and disaster recovery plans
 Testing business continuity and
disaster recovery plans
 Training users
 Maintaining business continuity
and disaster recovery plans
Business Continuity and Disaster
Planning Basics
What Is a Disaster

Any natural or man-made event that disrupts
the operations of a business
in such a significant way that a considerable and
coordinated effort is required to achieve a
recovery.
Natural Disasters
 Geological:
earthquakes, volcanoes, tsunamis, landslides,
and sinkholes
 Meteorological: hurricanes, tornados, wind
storms, hail, ice storms, snow
storms, rainstorms, and lightning
 Other: avalanches, fires, floods, meteors and
meteorites, and solar storms
 Health: widespread illnesses, quarantines, and
pandemics
Natural Disaster in 2012
Man-made Disasters
 Labor: strikes, walkouts, and slow-downs that
disrupt services and supplies
 Social-political:
war, terrorism, sabotage, vandalism, civil
unrest, protests, demonstrations, cyber
attacks, and blockades
 Materials: fires, hazardous materials spills
 Utilities: power failures, communications
outages, water supply shortages, fuel
shortages, and radioactive fallout from power
How Disasters Affect
Businesses
 Direct damage to facilities and equipment
 Transportation infrastructure damage


Delays deliveries, supplies, customers, employees
going to work

 Communications outages
 Utilities outages
How BCP and DRP
Support Security
 Security pillars: C-I-A




Confidentiality
Integrity
Availability

 BCP and DRP directly support availability
BCP and DRP
Differences and Similarities
 BCP






Activities required to
ensure the
continuation of critical
business processes in
an organization
Alternate
personnel, equipment
, and facilities
Often includes non-IT
aspects of business

 DRP




Assessment, salvage, r
epair, and eventual
restoration of
damaged facilities and
systems
Often focuses on IT
systems
Industry Standards Supporting
BCP and DRP
 ISO 27001: Requirements for Information
Security Management Systems. Section 14
addresses business continuity management.
 ISO 27002: Code of Practice for Business
Continuity Management.
Industry Standards Supporting
BCP and DRP (cont.)
 NIST 800-34






Contingency Planning
Guide for Information
Technology Systems.
Seven step process for
BCP and DRP projects
From U.S. National
Institute for Standards
and Technology

 NFPA 1600




Standard on Disaster /
Emergency
Management and
Business Continuity
Programs
From U.S. National
Fire Protection
Association
Industry Standards Supporting
BCP and DRP (cont.)
 NFPA 1620: The Recommended Practice for
Pre-Incident Planning.
 HIPAA: Requires a documented and tested
disaster recovery plan


U.S. Health Insurance Portability and
Accountability Act
Benefits of BCP and DRP
Planning






Reduced risk
Process improvements
Improved organizational maturity
Improved availability and reliability
Marketplace advantage
The Role of Prevention
 Not prevention of the disaster itself


Prevention of surprise and
disorganized response

 Reduction in impact of a disaster






Better equipment bracing
Better fire detection and suppression
Contingency plans that provide [near]
continuous operation of critical
business processes
Prevention of extended periods of
downtime
Running a BCP / DRP Project

Phase I: Project
Initiation

Phase II:
Current State
Assessment

Phase III:
Design and
Development

Phase V:
Maintaining
BCP & DRP

Phase IV:
Implementation
Phase I: Project Initiation
Project Initiation
 Establish the organization’s continuity
planning scope and objectives criteria
 Gain and demonstrate management support
 Form the continuity planning project team
(CPPT), and define their roles and
responsibilities
 Define and obtain continuity
project resource requirements
 Understand and leverage current and
anticipated disaster avoidance preparations
Project Initiation Phase
Activities and Tasks
Activity/Task
Prepare project charter and obtain
management approval
Prepare and finalize project plan,
including work steps, deliverables, and
milestones
Prepare and finalize project budget
Management presentation and approval
to move to next phase

Deliverables
Project
charter
Project work
plan
Budget
Phase II: Current State Assessment
Survey In-scope
Business Processes
 Develop interview / intake template
 Interview a rep from each department



Identify all important processes
Identify dependencies on
systems, people, equipment

 Collate data into database or spreadsheets


Gives a big picture, all-company view
Performing a Business
Impact Assessment
 Survey critical processes
 Perform risk analyses and threat assessment
 Determine Maximum Tolerable Downtime
(MTD)
 Establish key recovery targets
Threat and Risk Analysis
 Identify threats, vulnerabilities, risks, for each
key process



Rank according to probability, impact, cost
Identify mitigating controls
Determine Maximum
Tolerable Downtime (MTD)
 For each business process
 Identify the maximum time that each business
process can be inoperative before significant
damage or long-term viability is threatened
 Probably an educated guess for many
processes
 Obtain senior management input to validate
data
 Publish into the same database / spreadsheet
listing all business processes
Develop Statements of Impact
 For each process, describe the impact
on the rest of the organization if the process is
incapacitated
 Examples




Inability to process payments
Inability to produce invoices
Inability to access customer data for support
purposes
Record Other Key Metrics
 Examples




Cost to operate the process
Cost of process downtime
Profit derived from the process

 Useful for upcoming Criticality Analysis
Ascertain Current Continuity
and Recovery Capabilities
 For each business process




Identify documented continuity capabilities
Identify documented recovery capabilities
Identify undocumented capabilities
 What if the disaster happened tomorrow
Develop Key Recovery Targets
 Recovery time objective (RTO)


Period of time from disaster onset to
resumption of business process

 Recovery point objective (RPO)




Maximum period of data loss from onset
of disaster counting backwards
Amount of work that will have to be done over

 Obtain senior management buyoff on RTO/RPO
 Publish into the same database / spreadsheet
listing all business processes
Sample Recovery Point
Objectives
RPO

Technologies required

8-14 days

New equipment, data recovery from backup

4-7 days

Cold systems, data recovery from backup

2-3 days

Warm systems, data recovery from backup

12-24 hours Warm systems, recovery from high speed
backup media
Sample Recovery
Point Objectives (cont.)
RPO

Technologies required

6-12 hours

Hot systems, recovery from high speed
backup media
Hot systems, data replication
Clustering, data replication
Clustering, near real time data replication

3-6 hours
1-3 hours
< 1 hour
Criticality Analysis
 Rank processes by criticality criteria






MTD (maximum tolerable downtime)
RTO (recovery time objective)
RPO (recovery point objective)
Cost of downtime or other metrics
Qualitative criteria
 Reputation, market share, goodwill
Improve System and
Process Resilience
 For the most critical processes (based upon
ranking in the criticality analysis)





Identify the biggest risks
Identify cost of mitigation
Can several mitigating controls be combined
Do mitigating controls follow best / common
practices
Develop Business Continuity
and Recovery Plans
Select Recovery Team
Members
 Selection criteria









Location of residence, relative to work
and other key locations
Skills and experience (determines effectiveness)
Ability and willingness to respond
Health and family (determines probability to
serve)
Identify backups
 Other team members, external resources
Emergency Response
 Personnel safety: includes first-aid, searching
for personnel, etc.
 Evacuation: evacuation procedures to prevent
any hazard to workers.
 Asset protection: includes buildings, vehicles,
and equipment.
Emergency Response (cont.)
 Damage assessment: this could involve
outside structural engineers to assess damage
to buildings and equipment.
 Emergency notification: response team
communication, and keeping management
and organization staff informed.
Damage Assessment and
Salvage
 Determine damage to
buildings, equipment, utilities



Requires inside experts
Usually requires outside experts
 Civil engineers to inspect buildings
 Government building inspectors

 Salvage




Identify working and salvageable assets
Cannibalize for parts or other uses
Notification
 Many parties need to know the condition of
the organization


Employees, suppliers, customers, regulators,
authorities, shareholders, community

 Methods of communication



Telephone call trees, web site, signage, media
Alternate means of communication must be
identified
Personnel Safety
 The number one concern in any disaster
response operation





Emergency evacuation
Accounting for all personnel
Administering first-aid
Emergency supplies
 Water, food, blankets, shelters
 On-site employees could be stranded for
several days
Communications
 Communications essential during emergency
operations
 Considerations


Avoid common infrastructure
 Don't have emergency communications through the
same wires as normal communications







Diversify mobile services
Consider two-way radios
Consider satellite phones
Consider amateur radio
Public Utilities and
Infrastructure
 Often interrupted during a disaster








Electricity: UPS (Uninterruptible Power
Supply), generator
Water: building could be closed if no
water is available for fire suppression
Natural gas: heating
Wastewater: if disabled, building could be closed
Steam heat
Logistics and Supplies










Food and drinking water
Blankets and sleeping cots
Sanitation (toilets, showers, etc.)
Tools
Spare parts
Waste bins
Information
Communications
Fire protection (extinguishers, sprinklers, smoke
alarms, fire alarms)
Business Resumption Planning
 Alternate work locations
 Alternate personnel
 Communications


Emergency, support of business processes

 Standby assets and equipment
 Access to procedures, business records
Restoration and Recovery





Repairs to facilities, equipment
Replacement equipment
Restoration of utilities
Resumption of business operations in primary
business facilities
Improving System Resilience
and Recovery
 Off-site media storage


Assurance of data recovery

 Server clusters



Improved availability
Geographic clusters: members far apart

 Data replication



Application, DMBS, OS, or Hardware
Maintains current data on multiple servers even in
remote places
Training Staff





Everyday operations
Recovery procedures
Emergency procedures
Resumption procedures
Testing Business Continuity
and Disaster Recovery Plans
Testing Business Continuity
and Disaster Recovery Plans
 Five levels of testing






Document review
Walkthrough
Simulation
Parallel test
Cutover test
Document Review
 Review of recovery, operations, resumption
plans and procedures
 Performed by individuals
 Provide feedback to document owners
Walkthrough
 Performed by teams
 Group discussion of recovery, operations,
resumption plans and procedures
 Brainstorming and discussion brings out new
issues, ideas
 Provide feedback to document owners
Simulation
 Walkthrough of recovery, operations,
resumption plans and procedures in a scripted
“case study” or “scenario”
 Performed by teams
 Places participants in a mental disaster setting
that helps them discern real issues more
easily
Parallel Test
 Full or partial workload is applied to recovery
systems
 Performed by teams
 Tests actual system readiness and accuracy of
procedures
 Production systems continue to operate and
support actual business processes
Cutover Test
 Production systems are shut down or
disconnected; recovery systems assume full
actual workload
 Risk of interrupting real business
 Gives confidence in DR (Disaster Recovery)
system if it works
Maintaining Business Continuity
and Disaster Recovery Plans
Maintaining Business Continuity
and Disaster Recovery Plans
 Events that necessitate review and
modification of DRP and BCP procedures:







Changes in business processes and procedures
Changes to IT systems and applications
Changes in IT architecture
Additions to IT applications
Changes in service providers
Changes in organizational structure
Q&A

More Related Content

What's hot

Disaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity PlanDisaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity PlanMarcelo Silva
 
Assess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAssess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAnand Subramaniam
 
What’s & Why’s of Business Continuity Planning (BCP)
What’s & Why’s of Business Continuity Planning (BCP) What’s & Why’s of Business Continuity Planning (BCP)
What’s & Why’s of Business Continuity Planning (BCP) CBIZ, Inc.
 
Business Continuity Planning Presentation Overview
Business Continuity Planning Presentation OverviewBusiness Continuity Planning Presentation Overview
Business Continuity Planning Presentation OverviewBob Winkler
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planningalanlund
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity PlanningBharath Rao
 
business-continuity-management-awareness-presentation-for-mampu2929
business-continuity-management-awareness-presentation-for-mampu2929business-continuity-management-awareness-presentation-for-mampu2929
business-continuity-management-awareness-presentation-for-mampu2929Andy Willams
 
Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery PlanningJohn Wilson
 
Disaster recovery
Disaster recoveryDisaster recovery
Disaster recoverySameeu Imad
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity PlanningDipankar Ghosh
 
Business Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery NotesBusiness Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery NotesAlan McSweeney
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recoverymadunix
 
Business Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation SlidesBusiness Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation SlidesSlideTeam
 
Business Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryBusiness Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryEC-Council
 
Business Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS ImplementationBusiness Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS ImplementationPECB
 

What's hot (20)

Disaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity PlanDisaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity Plan
 
Assess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAssess Your Business Continuity Management Process
Assess Your Business Continuity Management Process
 
What’s & Why’s of Business Continuity Planning (BCP)
What’s & Why’s of Business Continuity Planning (BCP) What’s & Why’s of Business Continuity Planning (BCP)
What’s & Why’s of Business Continuity Planning (BCP)
 
Business Continuity Planning Presentation Overview
Business Continuity Planning Presentation OverviewBusiness Continuity Planning Presentation Overview
Business Continuity Planning Presentation Overview
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
business-continuity-management-awareness-presentation-for-mampu2929
business-continuity-management-awareness-presentation-for-mampu2929business-continuity-management-awareness-presentation-for-mampu2929
business-continuity-management-awareness-presentation-for-mampu2929
 
Bcp drp
Bcp drpBcp drp
Bcp drp
 
Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery Planning
 
Business Continuity Planning Presentation
Business Continuity Planning PresentationBusiness Continuity Planning Presentation
Business Continuity Planning Presentation
 
Disaster recovery
Disaster recoveryDisaster recovery
Disaster recovery
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Business Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery NotesBusiness Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery Notes
 
BUSINESS CONTINUITY PLANNING
BUSINESS CONTINUITY PLANNINGBUSINESS CONTINUITY PLANNING
BUSINESS CONTINUITY PLANNING
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recovery
 
Business Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation SlidesBusiness Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation Slides
 
Business Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryBusiness Continuity & Disaster Recovery
Business Continuity & Disaster Recovery
 
009.itsecurity bcp v1
009.itsecurity bcp v1009.itsecurity bcp v1
009.itsecurity bcp v1
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Business Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS ImplementationBusiness Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS Implementation
 

Viewers also liked

Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IThhuihhui
 
An Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery PlanningAn Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery PlanningNEBizRecovery
 
Best Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingBest Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingAxcient
 
Disaster Recovery Presentation
Disaster Recovery PresentationDisaster Recovery Presentation
Disaster Recovery PresentationTimSchaefer
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesSpiceworks
 
Disaster management-ppt
Disaster management-pptDisaster management-ppt
Disaster management-pptVinod Kumari
 
Disaster management ppt
Disaster management pptDisaster management ppt
Disaster management pptAniket Pingale
 

Viewers also liked (8)

Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IT
 
An Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery PlanningAn Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery Planning
 
Best Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingBest Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and Testing
 
Disaster Recovery Presentation
Disaster Recovery PresentationDisaster Recovery Presentation
Disaster Recovery Presentation
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
Disaster management-ppt
Disaster management-pptDisaster management-ppt
Disaster management-ppt
 
Disaster management
Disaster managementDisaster management
Disaster management
 
Disaster management ppt
Disaster management pptDisaster management ppt
Disaster management ppt
 

Similar to Business continuity & disaster recovery planning (BCP & DRP)

TCG Svcs Pres 2011
TCG Svcs Pres 2011TCG Svcs Pres 2011
TCG Svcs Pres 2011mcourton
 
Chapter 3Business Continuity PlanningPlanning for Busi.docx
Chapter 3Business Continuity PlanningPlanning for Busi.docxChapter 3Business Continuity PlanningPlanning for Busi.docx
Chapter 3Business Continuity PlanningPlanning for Busi.docxwalterl4
 
Cyber Security and Business Continuity an Integrated Discipline
Cyber Security and Business Continuity an Integrated DisciplineCyber Security and Business Continuity an Integrated Discipline
Cyber Security and Business Continuity an Integrated DisciplineGraeme Parker
 
Oil Spill Crisis Action Team Back Up, Relief 052410
Oil Spill Crisis Action Team Back Up, Relief 052410Oil Spill Crisis Action Team Back Up, Relief 052410
Oil Spill Crisis Action Team Back Up, Relief 052410arainold
 
05 integrated management system telkom 2016 penanganan bencana - tanggap da...
05 integrated management system   telkom 2016 penanganan bencana - tanggap da...05 integrated management system   telkom 2016 penanganan bencana - tanggap da...
05 integrated management system telkom 2016 penanganan bencana - tanggap da...wisnu wardhana, i nyoman
 
Study to Identify and Rectify Potential Risks in General Engineering Services...
Study to Identify and Rectify Potential Risks in General Engineering Services...Study to Identify and Rectify Potential Risks in General Engineering Services...
Study to Identify and Rectify Potential Risks in General Engineering Services...Sheetal Singh
 
Disaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA frameworkDisaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA frameworkDavid Sweigert
 
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...BCM Institute
 
Risk mgmt key to security certifications v2
Risk mgmt key to security certifications v2Risk mgmt key to security certifications v2
Risk mgmt key to security certifications v2Jorge Sebastiao
 
Continuity Planning 101
Continuity Planning 101Continuity Planning 101
Continuity Planning 101tjrettig
 
Disaster Biz Resumpt
Disaster Biz ResumptDisaster Biz Resumpt
Disaster Biz ResumptJimGroark
 
INDUSTRIAL SAFETY
INDUSTRIAL SAFETYINDUSTRIAL SAFETY
INDUSTRIAL SAFETYshone john
 
Chapter 4 Selecting a StrategyRecovery strategyMa.docx
Chapter 4 Selecting a StrategyRecovery strategyMa.docxChapter 4 Selecting a StrategyRecovery strategyMa.docx
Chapter 4 Selecting a StrategyRecovery strategyMa.docxketurahhazelhurst
 
BCP Overview
BCP OverviewBCP Overview
BCP Overviewmcourton
 

Similar to Business continuity & disaster recovery planning (BCP & DRP) (20)

TCG Svcs Pres 2011
TCG Svcs Pres 2011TCG Svcs Pres 2011
TCG Svcs Pres 2011
 
Chapter 3Business Continuity PlanningPlanning for Busi.docx
Chapter 3Business Continuity PlanningPlanning for Busi.docxChapter 3Business Continuity PlanningPlanning for Busi.docx
Chapter 3Business Continuity PlanningPlanning for Busi.docx
 
Cyber Security and Business Continuity an Integrated Discipline
Cyber Security and Business Continuity an Integrated DisciplineCyber Security and Business Continuity an Integrated Discipline
Cyber Security and Business Continuity an Integrated Discipline
 
Business Continuation Recovery Plan
Business Continuation Recovery PlanBusiness Continuation Recovery Plan
Business Continuation Recovery Plan
 
Oil Spill Crisis Action Team Back Up, Relief 052410
Oil Spill Crisis Action Team Back Up, Relief 052410Oil Spill Crisis Action Team Back Up, Relief 052410
Oil Spill Crisis Action Team Back Up, Relief 052410
 
05 integrated management system telkom 2016 penanganan bencana - tanggap da...
05 integrated management system   telkom 2016 penanganan bencana - tanggap da...05 integrated management system   telkom 2016 penanganan bencana - tanggap da...
05 integrated management system telkom 2016 penanganan bencana - tanggap da...
 
Study to Identify and Rectify Potential Risks in General Engineering Services...
Study to Identify and Rectify Potential Risks in General Engineering Services...Study to Identify and Rectify Potential Risks in General Engineering Services...
Study to Identify and Rectify Potential Risks in General Engineering Services...
 
Disaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA frameworkDisaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA framework
 
Bcp
BcpBcp
Bcp
 
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
 
Apdip disaster mgmt
Apdip disaster mgmtApdip disaster mgmt
Apdip disaster mgmt
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
 
Risk mgmt key to security certifications v2
Risk mgmt key to security certifications v2Risk mgmt key to security certifications v2
Risk mgmt key to security certifications v2
 
Continuity Planning 101
Continuity Planning 101Continuity Planning 101
Continuity Planning 101
 
Qatar Proposal
Qatar ProposalQatar Proposal
Qatar Proposal
 
Disaster Biz Resumpt
Disaster Biz ResumptDisaster Biz Resumpt
Disaster Biz Resumpt
 
INDUSTRIAL SAFETY
INDUSTRIAL SAFETYINDUSTRIAL SAFETY
INDUSTRIAL SAFETY
 
Chapter 4 Selecting a StrategyRecovery strategyMa.docx
Chapter 4 Selecting a StrategyRecovery strategyMa.docxChapter 4 Selecting a StrategyRecovery strategyMa.docx
Chapter 4 Selecting a StrategyRecovery strategyMa.docx
 
BCP Overview
BCP OverviewBCP Overview
BCP Overview
 

More from Narudom Roongsiriwong, CISSP

How Good Security Architecture Saves Corporate Workers from COVID-19
How Good Security Architecture Saves Corporate Workers from COVID-19How Good Security Architecture Saves Corporate Workers from COVID-19
How Good Security Architecture Saves Corporate Workers from COVID-19Narudom Roongsiriwong, CISSP
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryNarudom Roongsiriwong, CISSP
 
Application Security Verification Standard Project
Application Security Verification Standard ProjectApplication Security Verification Standard Project
Application Security Verification Standard ProjectNarudom Roongsiriwong, CISSP
 
Top 10 Bad Coding Practices Lead to Security Problems
Top 10 Bad Coding Practices Lead to Security ProblemsTop 10 Bad Coding Practices Lead to Security Problems
Top 10 Bad Coding Practices Lead to Security ProblemsNarudom Roongsiriwong, CISSP
 

More from Narudom Roongsiriwong, CISSP (20)

Biometric Authentication.pdf
Biometric Authentication.pdfBiometric Authentication.pdf
Biometric Authentication.pdf
 
Security Shift Leftmost - Secure Architecture.pdf
Security Shift Leftmost - Secure Architecture.pdfSecurity Shift Leftmost - Secure Architecture.pdf
Security Shift Leftmost - Secure Architecture.pdf
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat Modeling
 
Security Patterns for Software Development
Security Patterns for Software DevelopmentSecurity Patterns for Software Development
Security Patterns for Software Development
 
How Good Security Architecture Saves Corporate Workers from COVID-19
How Good Security Architecture Saves Corporate Workers from COVID-19How Good Security Architecture Saves Corporate Workers from COVID-19
How Good Security Architecture Saves Corporate Workers from COVID-19
 
Secure Software Design for Data Privacy
Secure Software Design for Data PrivacySecure Software Design for Data Privacy
Secure Software Design for Data Privacy
 
Blockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for DummiesBlockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for Dummies
 
DevSecOps 101
DevSecOps 101DevSecOps 101
DevSecOps 101
 
National Digital ID Platform Technical Forum
National Digital ID Platform Technical ForumNational Digital ID Platform Technical Forum
National Digital ID Platform Technical Forum
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
 
Secure Your Encryption with HSM
Secure Your Encryption with HSMSecure Your Encryption with HSM
Secure Your Encryption with HSM
 
Application Security Verification Standard Project
Application Security Verification Standard ProjectApplication Security Verification Standard Project
Application Security Verification Standard Project
 
Coding Security: Code Mania 101
Coding Security: Code Mania 101Coding Security: Code Mania 101
Coding Security: Code Mania 101
 
Top 10 Bad Coding Practices Lead to Security Problems
Top 10 Bad Coding Practices Lead to Security ProblemsTop 10 Bad Coding Practices Lead to Security Problems
Top 10 Bad Coding Practices Lead to Security Problems
 
OWASP Top 10 Proactive Control 2016 (C5-C10)
OWASP Top 10 Proactive Control 2016 (C5-C10)OWASP Top 10 Proactive Control 2016 (C5-C10)
OWASP Top 10 Proactive Control 2016 (C5-C10)
 
Securing the Internet from Cyber Criminals
Securing the Internet from Cyber CriminalsSecuring the Internet from Cyber Criminals
Securing the Internet from Cyber Criminals
 
Secure Code Review 101
Secure Code Review 101Secure Code Review 101
Secure Code Review 101
 
Secure Software Development Adoption Strategy
Secure Software Development Adoption StrategySecure Software Development Adoption Strategy
Secure Software Development Adoption Strategy
 
Secure PHP Coding
Secure PHP CodingSecure PHP Coding
Secure PHP Coding
 

Recently uploaded

The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdfSherl Simon
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
Andrii Rodionov: What can go wrong in a distributed system – experience from ...
Andrii Rodionov: What can go wrong in a distributed system – experience from ...Andrii Rodionov: What can go wrong in a distributed system – experience from ...
Andrii Rodionov: What can go wrong in a distributed system – experience from ...Lviv Startup Club
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
Simplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansSimplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansNugget Global
 
Vladyslav Fliahin: Applications of Gen AI in CV (UA)
Vladyslav Fliahin: Applications of Gen AI in CV (UA)Vladyslav Fliahin: Applications of Gen AI in CV (UA)
Vladyslav Fliahin: Applications of Gen AI in CV (UA)Lviv Startup Club
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
Fundamentals Welcome and Inclusive DEIB
Fundamentals Welcome and  Inclusive DEIBFundamentals Welcome and  Inclusive DEIB
Fundamentals Welcome and Inclusive DEIBGregory DeShields
 
How to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHow to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHelp Desk Migration
 
Ivey Leveraging Information Technology MBA 2024
Ivey Leveraging Information Technology MBA 2024Ivey Leveraging Information Technology MBA 2024
Ivey Leveraging Information Technology MBA 2024Nihal Nishadul
 
Roman Kyslyi: Використання та побудова LLM агентів (UA)
Roman Kyslyi: Використання та побудова LLM агентів (UA)Roman Kyslyi: Використання та побудова LLM агентів (UA)
Roman Kyslyi: Використання та побудова LLM агентів (UA)Lviv Startup Club
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...PRnews2
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Aggregage
 
Entrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextEntrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextP&CO
 

Recently uploaded (20)

The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
Andrii Rodionov: What can go wrong in a distributed system – experience from ...
Andrii Rodionov: What can go wrong in a distributed system – experience from ...Andrii Rodionov: What can go wrong in a distributed system – experience from ...
Andrii Rodionov: What can go wrong in a distributed system – experience from ...
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
Simplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansSimplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business Loans
 
Vladyslav Fliahin: Applications of Gen AI in CV (UA)
Vladyslav Fliahin: Applications of Gen AI in CV (UA)Vladyslav Fliahin: Applications of Gen AI in CV (UA)
Vladyslav Fliahin: Applications of Gen AI in CV (UA)
 
Authentically Social - presented by Corey Perlman
Authentically Social - presented by Corey PerlmanAuthentically Social - presented by Corey Perlman
Authentically Social - presented by Corey Perlman
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
Fundamentals Welcome and Inclusive DEIB
Fundamentals Welcome and  Inclusive DEIBFundamentals Welcome and  Inclusive DEIB
Fundamentals Welcome and Inclusive DEIB
 
How to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHow to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your Business
 
Ivey Leveraging Information Technology MBA 2024
Ivey Leveraging Information Technology MBA 2024Ivey Leveraging Information Technology MBA 2024
Ivey Leveraging Information Technology MBA 2024
 
Roman Kyslyi: Використання та побудова LLM агентів (UA)
Roman Kyslyi: Використання та побудова LLM агентів (UA)Roman Kyslyi: Використання та побудова LLM агентів (UA)
Roman Kyslyi: Використання та побудова LLM агентів (UA)
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
 
Entrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextEntrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider context
 

Business continuity & disaster recovery planning (BCP & DRP)

  • 1. Information Security Business Continuity & Disaster Recovery Planning Narudom Roongsiriwong, CISSP
  • 2. Objectives  Running a business continuity and disaster recovery planning project  Developing business continuity and disaster recovery plans  Testing business continuity and disaster recovery plans  Training users  Maintaining business continuity and disaster recovery plans
  • 3. Business Continuity and Disaster Planning Basics
  • 4. What Is a Disaster Any natural or man-made event that disrupts the operations of a business in such a significant way that a considerable and coordinated effort is required to achieve a recovery.
  • 5. Natural Disasters  Geological: earthquakes, volcanoes, tsunamis, landslides, and sinkholes  Meteorological: hurricanes, tornados, wind storms, hail, ice storms, snow storms, rainstorms, and lightning  Other: avalanches, fires, floods, meteors and meteorites, and solar storms  Health: widespread illnesses, quarantines, and pandemics
  • 7. Man-made Disasters  Labor: strikes, walkouts, and slow-downs that disrupt services and supplies  Social-political: war, terrorism, sabotage, vandalism, civil unrest, protests, demonstrations, cyber attacks, and blockades  Materials: fires, hazardous materials spills  Utilities: power failures, communications outages, water supply shortages, fuel shortages, and radioactive fallout from power
  • 8. How Disasters Affect Businesses  Direct damage to facilities and equipment  Transportation infrastructure damage  Delays deliveries, supplies, customers, employees going to work  Communications outages  Utilities outages
  • 9. How BCP and DRP Support Security  Security pillars: C-I-A    Confidentiality Integrity Availability  BCP and DRP directly support availability
  • 10. BCP and DRP Differences and Similarities  BCP    Activities required to ensure the continuation of critical business processes in an organization Alternate personnel, equipment , and facilities Often includes non-IT aspects of business  DRP   Assessment, salvage, r epair, and eventual restoration of damaged facilities and systems Often focuses on IT systems
  • 11. Industry Standards Supporting BCP and DRP  ISO 27001: Requirements for Information Security Management Systems. Section 14 addresses business continuity management.  ISO 27002: Code of Practice for Business Continuity Management.
  • 12. Industry Standards Supporting BCP and DRP (cont.)  NIST 800-34    Contingency Planning Guide for Information Technology Systems. Seven step process for BCP and DRP projects From U.S. National Institute for Standards and Technology  NFPA 1600   Standard on Disaster / Emergency Management and Business Continuity Programs From U.S. National Fire Protection Association
  • 13. Industry Standards Supporting BCP and DRP (cont.)  NFPA 1620: The Recommended Practice for Pre-Incident Planning.  HIPAA: Requires a documented and tested disaster recovery plan  U.S. Health Insurance Portability and Accountability Act
  • 14. Benefits of BCP and DRP Planning      Reduced risk Process improvements Improved organizational maturity Improved availability and reliability Marketplace advantage
  • 15. The Role of Prevention  Not prevention of the disaster itself  Prevention of surprise and disorganized response  Reduction in impact of a disaster     Better equipment bracing Better fire detection and suppression Contingency plans that provide [near] continuous operation of critical business processes Prevention of extended periods of downtime
  • 16. Running a BCP / DRP Project Phase I: Project Initiation Phase II: Current State Assessment Phase III: Design and Development Phase V: Maintaining BCP & DRP Phase IV: Implementation
  • 17. Phase I: Project Initiation
  • 18. Project Initiation  Establish the organization’s continuity planning scope and objectives criteria  Gain and demonstrate management support  Form the continuity planning project team (CPPT), and define their roles and responsibilities  Define and obtain continuity project resource requirements  Understand and leverage current and anticipated disaster avoidance preparations
  • 19. Project Initiation Phase Activities and Tasks Activity/Task Prepare project charter and obtain management approval Prepare and finalize project plan, including work steps, deliverables, and milestones Prepare and finalize project budget Management presentation and approval to move to next phase Deliverables Project charter Project work plan Budget
  • 20. Phase II: Current State Assessment
  • 21. Survey In-scope Business Processes  Develop interview / intake template  Interview a rep from each department   Identify all important processes Identify dependencies on systems, people, equipment  Collate data into database or spreadsheets  Gives a big picture, all-company view
  • 22. Performing a Business Impact Assessment  Survey critical processes  Perform risk analyses and threat assessment  Determine Maximum Tolerable Downtime (MTD)  Establish key recovery targets
  • 23. Threat and Risk Analysis  Identify threats, vulnerabilities, risks, for each key process   Rank according to probability, impact, cost Identify mitigating controls
  • 24. Determine Maximum Tolerable Downtime (MTD)  For each business process  Identify the maximum time that each business process can be inoperative before significant damage or long-term viability is threatened  Probably an educated guess for many processes  Obtain senior management input to validate data  Publish into the same database / spreadsheet listing all business processes
  • 25. Develop Statements of Impact  For each process, describe the impact on the rest of the organization if the process is incapacitated  Examples    Inability to process payments Inability to produce invoices Inability to access customer data for support purposes
  • 26. Record Other Key Metrics  Examples    Cost to operate the process Cost of process downtime Profit derived from the process  Useful for upcoming Criticality Analysis
  • 27. Ascertain Current Continuity and Recovery Capabilities  For each business process    Identify documented continuity capabilities Identify documented recovery capabilities Identify undocumented capabilities  What if the disaster happened tomorrow
  • 28. Develop Key Recovery Targets  Recovery time objective (RTO)  Period of time from disaster onset to resumption of business process  Recovery point objective (RPO)   Maximum period of data loss from onset of disaster counting backwards Amount of work that will have to be done over  Obtain senior management buyoff on RTO/RPO  Publish into the same database / spreadsheet listing all business processes
  • 29. Sample Recovery Point Objectives RPO Technologies required 8-14 days New equipment, data recovery from backup 4-7 days Cold systems, data recovery from backup 2-3 days Warm systems, data recovery from backup 12-24 hours Warm systems, recovery from high speed backup media
  • 30. Sample Recovery Point Objectives (cont.) RPO Technologies required 6-12 hours Hot systems, recovery from high speed backup media Hot systems, data replication Clustering, data replication Clustering, near real time data replication 3-6 hours 1-3 hours < 1 hour
  • 31. Criticality Analysis  Rank processes by criticality criteria      MTD (maximum tolerable downtime) RTO (recovery time objective) RPO (recovery point objective) Cost of downtime or other metrics Qualitative criteria  Reputation, market share, goodwill
  • 32. Improve System and Process Resilience  For the most critical processes (based upon ranking in the criticality analysis)     Identify the biggest risks Identify cost of mitigation Can several mitigating controls be combined Do mitigating controls follow best / common practices
  • 34. Select Recovery Team Members  Selection criteria      Location of residence, relative to work and other key locations Skills and experience (determines effectiveness) Ability and willingness to respond Health and family (determines probability to serve) Identify backups  Other team members, external resources
  • 35. Emergency Response  Personnel safety: includes first-aid, searching for personnel, etc.  Evacuation: evacuation procedures to prevent any hazard to workers.  Asset protection: includes buildings, vehicles, and equipment.
  • 36. Emergency Response (cont.)  Damage assessment: this could involve outside structural engineers to assess damage to buildings and equipment.  Emergency notification: response team communication, and keeping management and organization staff informed.
  • 37. Damage Assessment and Salvage  Determine damage to buildings, equipment, utilities   Requires inside experts Usually requires outside experts  Civil engineers to inspect buildings  Government building inspectors  Salvage   Identify working and salvageable assets Cannibalize for parts or other uses
  • 38. Notification  Many parties need to know the condition of the organization  Employees, suppliers, customers, regulators, authorities, shareholders, community  Methods of communication   Telephone call trees, web site, signage, media Alternate means of communication must be identified
  • 39. Personnel Safety  The number one concern in any disaster response operation     Emergency evacuation Accounting for all personnel Administering first-aid Emergency supplies  Water, food, blankets, shelters  On-site employees could be stranded for several days
  • 40. Communications  Communications essential during emergency operations  Considerations  Avoid common infrastructure  Don't have emergency communications through the same wires as normal communications     Diversify mobile services Consider two-way radios Consider satellite phones Consider amateur radio
  • 41. Public Utilities and Infrastructure  Often interrupted during a disaster      Electricity: UPS (Uninterruptible Power Supply), generator Water: building could be closed if no water is available for fire suppression Natural gas: heating Wastewater: if disabled, building could be closed Steam heat
  • 42. Logistics and Supplies          Food and drinking water Blankets and sleeping cots Sanitation (toilets, showers, etc.) Tools Spare parts Waste bins Information Communications Fire protection (extinguishers, sprinklers, smoke alarms, fire alarms)
  • 43. Business Resumption Planning  Alternate work locations  Alternate personnel  Communications  Emergency, support of business processes  Standby assets and equipment  Access to procedures, business records
  • 44. Restoration and Recovery     Repairs to facilities, equipment Replacement equipment Restoration of utilities Resumption of business operations in primary business facilities
  • 45. Improving System Resilience and Recovery  Off-site media storage  Assurance of data recovery  Server clusters   Improved availability Geographic clusters: members far apart  Data replication   Application, DMBS, OS, or Hardware Maintains current data on multiple servers even in remote places
  • 46. Training Staff     Everyday operations Recovery procedures Emergency procedures Resumption procedures
  • 47. Testing Business Continuity and Disaster Recovery Plans
  • 48. Testing Business Continuity and Disaster Recovery Plans  Five levels of testing      Document review Walkthrough Simulation Parallel test Cutover test
  • 49. Document Review  Review of recovery, operations, resumption plans and procedures  Performed by individuals  Provide feedback to document owners
  • 50. Walkthrough  Performed by teams  Group discussion of recovery, operations, resumption plans and procedures  Brainstorming and discussion brings out new issues, ideas  Provide feedback to document owners
  • 51. Simulation  Walkthrough of recovery, operations, resumption plans and procedures in a scripted “case study” or “scenario”  Performed by teams  Places participants in a mental disaster setting that helps them discern real issues more easily
  • 52. Parallel Test  Full or partial workload is applied to recovery systems  Performed by teams  Tests actual system readiness and accuracy of procedures  Production systems continue to operate and support actual business processes
  • 53. Cutover Test  Production systems are shut down or disconnected; recovery systems assume full actual workload  Risk of interrupting real business  Gives confidence in DR (Disaster Recovery) system if it works
  • 54. Maintaining Business Continuity and Disaster Recovery Plans
  • 55. Maintaining Business Continuity and Disaster Recovery Plans  Events that necessitate review and modification of DRP and BCP procedures:       Changes in business processes and procedures Changes to IT systems and applications Changes in IT architecture Additions to IT applications Changes in service providers Changes in organizational structure
  • 56. Q&A