SlideShare a Scribd company logo
1 of 32
Download to read offline
Presents	
  
Discovery (Steps 1-5)

1.  Build your team
          Select the people who understand your system best to help create
     a DR plan and execute when disaster strikes
2.  Analyze what DR technology is already in place
         You are probably already backing up, but what else?
3.  Do a business impact analysis
          What does downtime cost?
4.  Prioritize operations
          ID critical apps and data, what needs recovering first
5.  Set goals for recovery
          How long should recovery take
Action Steps (6-10)	
  
6.  Identify and fill gaps in technology
              Are any of your goals impossible with your current infrastructure
     	
   	
  Implement	
  technology	
  or	
  processes	
  to	
  meet	
  recovery	
  goals
7.  Design Recovery or Failover Environment
              Alternate location facilities, hypervisor, bare-bones machines, etc
8. Create Recovery Manual and Disaster Response Protocol
              Design the actual steps taken to recover downed systems
              Should employees BYOD? Use cell phones? Relax?
9. Document important information
              Have at important information at the ready in your DR plan
10. Implement, Test, and Revise
              Distribute the plan and make sure everyone know their duties
             Test to make sure there are no holes in your plan, revise to make sure your
              plan stays up to dates
•    Spearheaded	
  by	
  an	
  execu/ve	
  
      –  Leadership	
  
      –  Decision	
  making	
  
      –  Access	
  to	
  necessary	
  resources	
  
      –  Make	
  sure	
  project	
  receives	
  necessary	
  a<en=on	
  
•    Designate	
  a	
  DR	
  Coordinator	
  
      –  In=mate	
  knowledge	
  of	
  IT	
  system	
  
      –  Creates	
  and	
  updates	
  DR	
  plan	
  
      –  Leads	
  recovery	
  during	
  disaster	
  
      –  Makes	
  execu=ve	
  decisions	
  during	
  disaster	
  
•    DR	
  Team	
  
      –  Employees	
  from	
  a	
  variety	
  of	
  departments	
  
      –  Help	
  DR	
  coordinator	
  execute	
  recovery	
  
      –  Predetermined	
  responsibili=es	
  for	
  recovery	
  
Stake	
  Holders	
                       C-­‐Level	
  



     DR	
                                 IT	
  
 Coordinator	
                          manager	
  



   DR	
  Team	
        IT   	
  	
     Opera=ons	
       Facili=es	
  
•      Analyze	
  the	
  DR	
  technology	
  that	
  you	
  currently	
  have	
  in	
  place	
  
        –  Data	
  backup?	
  
        –  Skeleton	
  Servers?	
  
        –  Cloud	
  Services?	
  
        –  Virtualized	
  Machines?	
  
        –  Ac=ve/Ac=ve	
  geographically	
  diverse	
  systems?	
  
        –  Uninterrupted	
  Power	
  Supply	
  	
  
        –  SoPware	
  as	
  a	
  Service	
  Applica=ons	
  (SaaS)	
  
        –  Desktop	
  as	
  a	
  Service	
  (DaaS)	
  
•      Understand	
  the	
  capabili=es	
  and	
  restric=ons	
  of	
  each	
  

	
  
Start by conducting a Business Impact Analysis

  Availability requirements, such as maximum allowable systems
        downtime, for an organization form the basis for risk
       mitigation and recovery strategies, developed to drive a
                   higher level of business resiliency.
	
  
A BIA assesses the risks of various types of threats to determine
the potential direct and indirect impacts. These include:
•  Financial
•  Regulatory
•  Operational
•  Competitive
•  Reputation

	
  
•  Halt	
  opera=ons	
  for	
  extended	
  =me	
  
    –  Extended	
  systems	
  down=me	
  could	
  mean	
  the	
  same	
  for	
  your	
  business	
  
•  Permanently	
  set	
  the	
  company	
  back	
  
    –  Lost	
  data	
  could	
  undo	
  months	
  of	
  your	
  work	
  
•  Bankruptcy	
  
    –  A	
  significant	
  number	
  of	
  companies	
  that	
  experience	
  a	
  major	
  data	
  loss,	
  
       will	
  close	
  their	
  doors	
  within	
  6	
  months	
  
•  Regulatory	
  risk	
  of	
  not	
  being	
  in	
  compliance	
  (PCI,	
  SSAE	
  16,	
  SOX,	
  HIPAA)	
  
•  Your	
  company	
  could	
  face	
  fines	
  and	
  other	
  penal=es	
  if	
  you	
  
    –  Lose	
  client	
  data	
  
    –  Have	
  a	
  breach	
  of	
  security	
  in	
  regards	
  to	
  client	
  data	
  
    –  Lose	
  access	
  to	
  client	
  data	
  
    –  Do	
  not	
  no=fy	
  clients	
  of	
  such	
  events	
  	
  
	
  
After completing the BIA, it should be clear which processes are
most important to your business, thus which should be
recovered first after a disaster.
	
  
       Restore	
  Emergency	
  Level	
  of	
  Service	
  

            Restore	
  Key	
  Business	
  Processes	
  

                 Restore	
  to	
  Business	
  as	
  Usual	
  
Understand	
  the	
  IT	
  dependencies	
  for	
  each	
  business	
  process,	
  and	
  what	
  level	
  of	
  
                                  IT	
  service	
  is	
  required	
  for	
  that	
  process.	
  
                                                             	
  
      Priori=ze	
  recovery	
  for	
  IT	
  systems	
  and	
  services.	
  Understand	
  what	
  can	
  be	
  
       recovered	
  as	
  a	
  stand	
  alone	
  service,	
  and	
  what	
  required	
  greater	
  underlying	
  
                                                   network	
  support.	
  
	
  
•  Recovery	
  Time	
  Objec/ve	
  (RTO)	
  
       –  How	
  long	
  aPer	
  a	
  disaster	
  does	
  a	
  business	
  process	
  need	
  to	
  be	
  opera=onal,	
  or	
  
          what	
  is	
  the	
  acceptable	
  down=me?	
  
•  Recovery	
  Point	
  Objec/ve	
  (RPO)	
  
       –  What	
  point	
  back	
  in	
  =me	
  would	
  you	
  like	
  to	
  recover	
  to?	
  10	
  minutes?	
  1	
  hour?	
  1	
  
          day	
  before	
  the	
  disaster?	
  This	
  is	
  determined	
  by	
  how	
  oPen	
  you	
  perform	
  
          backups.	
  
•  Recovery	
  Level	
  Objec/ve	
  (RLO)	
  
       –  Recovering	
  from	
  a	
  disaster	
  does	
  not	
  happen	
  all	
  at	
  once.	
  You	
  should	
  set	
  
          different	
  recovery	
  =mes	
  for	
  each	
  level	
  of	
  recovery.	
  And	
  possibly	
  a	
  different	
  
          recovery	
  point	
  for	
  various	
  systems.	
  
	
  
Do	
  you	
  have	
  all	
  the	
  proper	
  technologies	
  in	
  place	
  to	
  successfully	
  recover?	
  
Is	
  it	
  possible	
  to	
  recover	
  in	
  a	
  manner	
  that	
  sa=sfies	
  your	
  objec=ves?	
  
There	
  are	
  a	
  mul=tude	
  of	
  hardware,	
  soPware,	
  and	
  services	
  you	
  can	
  use	
  to	
  meet	
  
recovery	
  objec=ves.	
  
	
  
Example:	
  
If	
  your	
  RPO	
  is	
  under	
  15	
  minutes,	
  you	
  must	
  be	
  performing	
  backups	
  every	
  15	
  minutes	
  
Configure	
  and	
  Schedule	
  Your	
  Backups	
  
Compare recovery goals with the DR technology you are currently utilizing.

Using your goals as a baseline, look at each of your business processes, and analyze
the feasibility of restarting the respective IT dependencies within the objective time.




 Don't	
  just	
  throw	
  money	
  at	
  Disaster	
  Recovery,	
  does	
  not	
  need	
  to	
  be	
  expensive	
  
•    Daily onsite and remote backups
•    Bare-metal backups
•    Cloud based software (SaaS)
      –  Gmail, Salesforce , Office 365
•    Redundant and replicated systems
•    Virtualized networks, servers, and desktops
•    Bare-bones machines
•    Diverse network service providers
•    Desktop as a Service
Where do you intend on recovering vital computing resources to?

What if your system would take too long to recover on itself?

What if you don’t have access to your facilities?

What if your facilities have been destroyed?

What if a server fails and it takes weeks to get a similar one?

What if you need to recover a single email or a single mailbox, but you only have
image based backups?

Can you recover on new or old machines?
Simple	
  
Affordable	
  


                                           File	
  and	
     Employees	
  recover	
  
                                            folder	
          data	
  to	
  personal	
  
                                                                  devices	
  
                                                                                                  Employees	
  work	
  
                                                                                                 from	
  own	
  devices	
  
                                           backups	
  
                                                             Easily	
  recover	
  data	
  
                                         Bare-­‐Metal	
      and	
  all	
  system	
  and	
  
                                                             user	
  configura=ons	
  
                                                                                                 Employees	
  work	
  
                                                                                                   from	
  where	
  
                                          Recovery	
          on	
  same	
  or	
  new	
  
                                                                    hardware	
  
                                                                                                 network	
  is	
  rebuilt	
  
                 Comprehensive	
  	
  




                                           Cloud	
            Easy	
  and	
  Instant	
  
                                                             Failover	
  to	
  iden=cal	
  
                                                                                                   Employee	
  work	
  
                                                                                                from	
  anywhere	
  with	
  
                                         Replica=on	
        machines	
  and	
  data	
             internet	
  access	
  
Costly	
  




                                                                                                  Personnel	
  simply	
  
                                                             Replicate	
  backups	
                moves	
  to	
  new	
  
                                          Hot	
  Sites	
     at	
  an	
  alternate	
  and	
  
                                                              remote	
  work	
  site	
  
                                                                                                    worksite	
  and	
  
                                                                                                   resumes	
  work	
  
•    Call centers
•    Call rerouting
•    Soft phones
•    Virtual Desktop Environment
•    Virtual Servers
•    Collocation
•    Rented Space in a datacenter
•    Starbucks


Either	
  have	
  a	
  recovery	
  environment	
  or	
  be	
  prepared	
  to	
  work	
  from	
  home	
  
	
  	
  
Too	
  Expensive	
  




Too	
  Long	
  
Create a recovery manual
•  Include a well documented response procedure for restoring mission critical
   systems as efficiently as possible.
•  Define triggers to launch the disaster recovery process.
•  Define the scope of your DR processes.

Instructions for Recovery
•  Document where resources will recover to
•  Document which order to recover resources
•  Document how to recover resources
•  Document how to get users on new system
•  Document how to reroute phone numbers
	
  
Instructions to rebuild/repair:
•  Rebuild Network
•  Remedy crashed servers
•  Purchase correct replacement parts
•  Include estimates of how long it will take to reboot system
•  Instructions to handle work load in the interim
	
  
In the appendix of your DR plan you should include a repository of critical
Systems information.

•      Make, model, and specifications of all hardware
•      Diagram of network
•      List of applications used by each and license keys
•      Location of backups for each machine
•      Admin handles and passwords
•      Database owners
•      Warranty information
•      Vendor information
•      IP addresses
•      VPN information
•      Setting and Configurations
•      Special Instructions
	
  
•    Do	
  your	
  employees	
  know	
  how	
  to	
  respond	
  to	
  a	
  disaster?	
  
      –  Based	
  on	
  your	
  recovery	
  environment	
  and	
  recovery	
  objec=ves	
  
      –  Develop	
  a	
  plan	
  for	
  each	
  department	
  to	
  resume	
  opera=ons,	
  star=ng	
  with	
  the	
  
            most	
  crucial	
  
      –  Create	
  a	
  wri<en	
  plan	
  that	
  your	
  employees	
  can	
  use	
  to	
  help	
  them	
  get	
  back	
  to	
  
            work	
  as	
  fast	
  as	
  possible	
  
In	
  your	
  plan	
  for	
  employees	
  
        –  Address	
  of	
  alternate	
  work	
  sites	
  
        –  Instruc=ons	
  to	
  recover	
  data	
  
        –  Instruc=ons	
  to	
  login	
  to	
  cloud	
  based	
  DR	
  recovery	
  environments	
  
        –  Calling	
  trees	
  
        –  Important	
  contact	
  informa=on	
  
        –  Amended	
  responsibili=es	
  
Once you have constructed your DR plan you must distribute the plan
                among employees and start work with your DR team.

            Your DR plan will not be effective if nobody knows about it.
	
  
•      Make	
  sure	
  your	
  DR	
  plan	
  has	
  full	
  support	
  
        –  Execu=ve	
  and	
  C-­‐level	
  support	
  
        –  IT	
  support	
  
•      Send	
  an	
  email	
  or	
  memo	
  to	
  all	
  employees	
  with	
  the	
  informa=on	
  they	
  need	
  to	
  know	
  
•      Distribute	
  hard	
  copies	
  and	
  instruc=ons	
  to	
  access	
  an	
  electronic	
  version	
  
•      Run	
  a	
  drill	
  and	
  test	
  
•      Spend	
  =me	
  to	
  educate	
  your	
  workforce.	
  A	
  tech	
  savvy	
  workforce	
  with	
  well	
  
       understood	
  best	
  prac=ces	
  can	
  be	
  your	
  best	
  weapon	
  against	
  disasters.	
  
	
  
•      Test	
  oPen	
  (Every	
  6	
  months)	
  
•      Only	
  through	
  tes=ng	
  will	
  you	
  uncover	
  everything	
  that	
  is	
  missing	
  from	
  your	
  plan	
  
•      Revise	
  aPer	
  tes=ng	
  
•      Part	
  of	
  your	
  plan	
  will	
  become	
  stale	
  every	
  =me	
  you	
  test	
  it,	
  make	
  sure	
  all	
  the	
  
       informa=on	
  is	
  up	
  to	
  date	
  
•      Record	
  difficul=es	
  during	
  tes=ng	
  so	
  updates	
  can	
  be	
  made	
  
	
  
For	
  help	
  filling	
  out	
  your	
  free	
  disaster	
  recovery	
  planning	
  
template	
  contact	
  your	
  First	
  Communica=ons	
  client	
  rela=ons	
  
manager.	
  
	
  
If	
  you	
  don't	
  know	
  who	
  your	
  client	
  rela=ons	
  manager	
  is	
  
	
  
Call:	
  
	
  
Dawn	
  Dimick	
  
330.835.2491	
  
	
  
www.Slideshare.net/Firstcomm	
  

More Related Content

What's hot

BSM201.pdf
BSM201.pdfBSM201.pdf
BSM201.pdf
Novell
 

What's hot (17)

Novell Support Revealed! An Insider's Peek and Feedback Opportunity
Novell Support Revealed! An Insider's Peek and Feedback OpportunityNovell Support Revealed! An Insider's Peek and Feedback Opportunity
Novell Support Revealed! An Insider's Peek and Feedback Opportunity
 
Over the last 25 years what have I done with my life.
Over the last 25 years what have I done with my life.Over the last 25 years what have I done with my life.
Over the last 25 years what have I done with my life.
 
StruxureWare DCIM
StruxureWare DCIMStruxureWare DCIM
StruxureWare DCIM
 
Upgrading to new Dell OptiPlex desktops
Upgrading to new Dell OptiPlex desktopsUpgrading to new Dell OptiPlex desktops
Upgrading to new Dell OptiPlex desktops
 
Data center Technologies
Data center TechnologiesData center Technologies
Data center Technologies
 
Data Center Infrastructure Management
Data Center Infrastructure ManagementData Center Infrastructure Management
Data Center Infrastructure Management
 
Novell Success Stories: Endpoint Management in Retail and Manufacturing
Novell Success Stories: Endpoint Management in Retail and ManufacturingNovell Success Stories: Endpoint Management in Retail and Manufacturing
Novell Success Stories: Endpoint Management in Retail and Manufacturing
 
Unified Recovery Management
Unified Recovery ManagementUnified Recovery Management
Unified Recovery Management
 
IBM Smart Business Desktop Cloud - How to optimise the ROI from your desktop ...
IBM Smart Business Desktop Cloud - How to optimise the ROI from your desktop ...IBM Smart Business Desktop Cloud - How to optimise the ROI from your desktop ...
IBM Smart Business Desktop Cloud - How to optimise the ROI from your desktop ...
 
Storage Migration Made Simple
Storage Migration Made SimpleStorage Migration Made Simple
Storage Migration Made Simple
 
Allow me to show you what I have done over the last 25 years.
Allow me to show you what I have done over the last 25 years.Allow me to show you what I have done over the last 25 years.
Allow me to show you what I have done over the last 25 years.
 
Turnkey Cloud Solution with GaleForce Software
Turnkey Cloud Solution with GaleForce SoftwareTurnkey Cloud Solution with GaleForce Software
Turnkey Cloud Solution with GaleForce Software
 
Novell Success Stories: Collaboration in Education
Novell Success Stories: Collaboration in EducationNovell Success Stories: Collaboration in Education
Novell Success Stories: Collaboration in Education
 
Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage Management
 
Credium case study en
Credium case study enCredium case study en
Credium case study en
 
IDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudIDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The Cloud
 
BSM201.pdf
BSM201.pdfBSM201.pdf
BSM201.pdf
 

Similar to Firstcomm construction of a DR plan

Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery Plan
Rishu Mehra
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery Plan
Rishu Mehra
 
SafePeak - Poria hospital case study
SafePeak - Poria hospital case studySafePeak - Poria hospital case study
SafePeak - Poria hospital case study
Vladi Vexler
 
FACT SHEET - DRaaS
FACT SHEET - DRaaS FACT SHEET - DRaaS
FACT SHEET - DRaaS
Scott Wagner
 
Backing up your virtual environment best practices
Backing up your virtual environment   best practicesBacking up your virtual environment   best practices
Backing up your virtual environment best practices
Interop
 

Similar to Firstcomm construction of a DR plan (20)

Construction of a Disaster Recovery Plan with Business Only Broadband
Construction of a Disaster Recovery Plan with Business Only BroadbandConstruction of a Disaster Recovery Plan with Business Only Broadband
Construction of a Disaster Recovery Plan with Business Only Broadband
 
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseNovember 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
 
Disaster Recovery - Business & Technology
Disaster Recovery - Business & Technology Disaster Recovery - Business & Technology
Disaster Recovery - Business & Technology
 
HADRFINAL13112016
HADRFINAL13112016HADRFINAL13112016
HADRFINAL13112016
 
AITP July 2012 Presentation - Disaster Recovery - Business + Technology
AITP July 2012 Presentation - Disaster Recovery - Business + TechnologyAITP July 2012 Presentation - Disaster Recovery - Business + Technology
AITP July 2012 Presentation - Disaster Recovery - Business + Technology
 
Backup Solution
Backup SolutionBackup Solution
Backup Solution
 
VMWare Forum Winnipeg - 2012
VMWare Forum Winnipeg  - 2012VMWare Forum Winnipeg  - 2012
VMWare Forum Winnipeg - 2012
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery Plan
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery Plan
 
Disaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the differenceDisaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the difference
 
SafePeak - Poria hospital case study
SafePeak - Poria hospital case studySafePeak - Poria hospital case study
SafePeak - Poria hospital case study
 
FACT SHEET - DRaaS
FACT SHEET - DRaaS FACT SHEET - DRaaS
FACT SHEET - DRaaS
 
Backing up your virtual environment best practices
Backing up your virtual environment   best practicesBacking up your virtual environment   best practices
Backing up your virtual environment best practices
 
Plate Spin Disaster Recovery Solution
Plate Spin Disaster Recovery SolutionPlate Spin Disaster Recovery Solution
Plate Spin Disaster Recovery Solution
 
Ahmed Jassat South African Oracle User Group Presentation 2012
Ahmed Jassat South African Oracle User Group Presentation 2012Ahmed Jassat South African Oracle User Group Presentation 2012
Ahmed Jassat South African Oracle User Group Presentation 2012
 
Journey Through the AWS Cloud; Disaster Recovery
 Journey Through the AWS Cloud; Disaster Recovery Journey Through the AWS Cloud; Disaster Recovery
Journey Through the AWS Cloud; Disaster Recovery
 
Kenneth Ugwu
Kenneth UgwuKenneth Ugwu
Kenneth Ugwu
 
Workload Optimisation
Workload OptimisationWorkload Optimisation
Workload Optimisation
 
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best PracticesThe Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
 
Aws disaster recovery
Aws disaster recoveryAws disaster recovery
Aws disaster recovery
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Firstcomm construction of a DR plan

  • 2. Discovery (Steps 1-5) 1.  Build your team Select the people who understand your system best to help create a DR plan and execute when disaster strikes 2.  Analyze what DR technology is already in place You are probably already backing up, but what else? 3.  Do a business impact analysis What does downtime cost? 4.  Prioritize operations ID critical apps and data, what needs recovering first 5.  Set goals for recovery How long should recovery take
  • 3. Action Steps (6-10)   6.  Identify and fill gaps in technology Are any of your goals impossible with your current infrastructure    Implement  technology  or  processes  to  meet  recovery  goals 7.  Design Recovery or Failover Environment Alternate location facilities, hypervisor, bare-bones machines, etc 8. Create Recovery Manual and Disaster Response Protocol Design the actual steps taken to recover downed systems Should employees BYOD? Use cell phones? Relax? 9. Document important information Have at important information at the ready in your DR plan 10. Implement, Test, and Revise Distribute the plan and make sure everyone know their duties Test to make sure there are no holes in your plan, revise to make sure your plan stays up to dates
  • 4. •  Spearheaded  by  an  execu/ve   –  Leadership   –  Decision  making   –  Access  to  necessary  resources   –  Make  sure  project  receives  necessary  a<en=on   •  Designate  a  DR  Coordinator   –  In=mate  knowledge  of  IT  system   –  Creates  and  updates  DR  plan   –  Leads  recovery  during  disaster   –  Makes  execu=ve  decisions  during  disaster   •  DR  Team   –  Employees  from  a  variety  of  departments   –  Help  DR  coordinator  execute  recovery   –  Predetermined  responsibili=es  for  recovery  
  • 5. Stake  Holders   C-­‐Level   DR   IT   Coordinator   manager   DR  Team   IT     Opera=ons   Facili=es  
  • 6. •  Analyze  the  DR  technology  that  you  currently  have  in  place   –  Data  backup?   –  Skeleton  Servers?   –  Cloud  Services?   –  Virtualized  Machines?   –  Ac=ve/Ac=ve  geographically  diverse  systems?   –  Uninterrupted  Power  Supply     –  SoPware  as  a  Service  Applica=ons  (SaaS)   –  Desktop  as  a  Service  (DaaS)   •  Understand  the  capabili=es  and  restric=ons  of  each    
  • 7. Start by conducting a Business Impact Analysis Availability requirements, such as maximum allowable systems downtime, for an organization form the basis for risk mitigation and recovery strategies, developed to drive a higher level of business resiliency.  
  • 8. A BIA assesses the risks of various types of threats to determine the potential direct and indirect impacts. These include: •  Financial •  Regulatory •  Operational •  Competitive •  Reputation  
  • 9. •  Halt  opera=ons  for  extended  =me   –  Extended  systems  down=me  could  mean  the  same  for  your  business   •  Permanently  set  the  company  back   –  Lost  data  could  undo  months  of  your  work   •  Bankruptcy   –  A  significant  number  of  companies  that  experience  a  major  data  loss,   will  close  their  doors  within  6  months   •  Regulatory  risk  of  not  being  in  compliance  (PCI,  SSAE  16,  SOX,  HIPAA)   •  Your  company  could  face  fines  and  other  penal=es  if  you   –  Lose  client  data   –  Have  a  breach  of  security  in  regards  to  client  data   –  Lose  access  to  client  data   –  Do  not  no=fy  clients  of  such  events      
  • 10.
  • 11. After completing the BIA, it should be clear which processes are most important to your business, thus which should be recovered first after a disaster.   Restore  Emergency  Level  of  Service   Restore  Key  Business  Processes   Restore  to  Business  as  Usual  
  • 12. Understand  the  IT  dependencies  for  each  business  process,  and  what  level  of   IT  service  is  required  for  that  process.     Priori=ze  recovery  for  IT  systems  and  services.  Understand  what  can  be   recovered  as  a  stand  alone  service,  and  what  required  greater  underlying   network  support.    
  • 13. •  Recovery  Time  Objec/ve  (RTO)   –  How  long  aPer  a  disaster  does  a  business  process  need  to  be  opera=onal,  or   what  is  the  acceptable  down=me?   •  Recovery  Point  Objec/ve  (RPO)   –  What  point  back  in  =me  would  you  like  to  recover  to?  10  minutes?  1  hour?  1   day  before  the  disaster?  This  is  determined  by  how  oPen  you  perform   backups.   •  Recovery  Level  Objec/ve  (RLO)   –  Recovering  from  a  disaster  does  not  happen  all  at  once.  You  should  set   different  recovery  =mes  for  each  level  of  recovery.  And  possibly  a  different   recovery  point  for  various  systems.    
  • 14.
  • 15. Do  you  have  all  the  proper  technologies  in  place  to  successfully  recover?   Is  it  possible  to  recover  in  a  manner  that  sa=sfies  your  objec=ves?   There  are  a  mul=tude  of  hardware,  soPware,  and  services  you  can  use  to  meet   recovery  objec=ves.     Example:   If  your  RPO  is  under  15  minutes,  you  must  be  performing  backups  every  15  minutes  
  • 16. Configure  and  Schedule  Your  Backups  
  • 17. Compare recovery goals with the DR technology you are currently utilizing. Using your goals as a baseline, look at each of your business processes, and analyze the feasibility of restarting the respective IT dependencies within the objective time. Don't  just  throw  money  at  Disaster  Recovery,  does  not  need  to  be  expensive  
  • 18. •  Daily onsite and remote backups •  Bare-metal backups •  Cloud based software (SaaS) –  Gmail, Salesforce , Office 365 •  Redundant and replicated systems •  Virtualized networks, servers, and desktops •  Bare-bones machines •  Diverse network service providers •  Desktop as a Service
  • 19. Where do you intend on recovering vital computing resources to? What if your system would take too long to recover on itself? What if you don’t have access to your facilities? What if your facilities have been destroyed? What if a server fails and it takes weeks to get a similar one? What if you need to recover a single email or a single mailbox, but you only have image based backups? Can you recover on new or old machines?
  • 20. Simple   Affordable   File  and   Employees  recover   folder   data  to  personal   devices   Employees  work   from  own  devices   backups   Easily  recover  data   Bare-­‐Metal   and  all  system  and   user  configura=ons   Employees  work   from  where   Recovery   on  same  or  new   hardware   network  is  rebuilt   Comprehensive     Cloud   Easy  and  Instant   Failover  to  iden=cal   Employee  work   from  anywhere  with   Replica=on   machines  and  data   internet  access   Costly   Personnel  simply   Replicate  backups   moves  to  new   Hot  Sites   at  an  alternate  and   remote  work  site   worksite  and   resumes  work  
  • 21. •  Call centers •  Call rerouting •  Soft phones •  Virtual Desktop Environment •  Virtual Servers •  Collocation •  Rented Space in a datacenter •  Starbucks Either  have  a  recovery  environment  or  be  prepared  to  work  from  home      
  • 23.
  • 24. Create a recovery manual •  Include a well documented response procedure for restoring mission critical systems as efficiently as possible. •  Define triggers to launch the disaster recovery process. •  Define the scope of your DR processes. Instructions for Recovery •  Document where resources will recover to •  Document which order to recover resources •  Document how to recover resources •  Document how to get users on new system •  Document how to reroute phone numbers  
  • 25. Instructions to rebuild/repair: •  Rebuild Network •  Remedy crashed servers •  Purchase correct replacement parts •  Include estimates of how long it will take to reboot system •  Instructions to handle work load in the interim  
  • 26. In the appendix of your DR plan you should include a repository of critical Systems information. •  Make, model, and specifications of all hardware •  Diagram of network •  List of applications used by each and license keys •  Location of backups for each machine •  Admin handles and passwords •  Database owners •  Warranty information •  Vendor information •  IP addresses •  VPN information •  Setting and Configurations •  Special Instructions  
  • 27. •  Do  your  employees  know  how  to  respond  to  a  disaster?   –  Based  on  your  recovery  environment  and  recovery  objec=ves   –  Develop  a  plan  for  each  department  to  resume  opera=ons,  star=ng  with  the   most  crucial   –  Create  a  wri<en  plan  that  your  employees  can  use  to  help  them  get  back  to   work  as  fast  as  possible  
  • 28. In  your  plan  for  employees   –  Address  of  alternate  work  sites   –  Instruc=ons  to  recover  data   –  Instruc=ons  to  login  to  cloud  based  DR  recovery  environments   –  Calling  trees   –  Important  contact  informa=on   –  Amended  responsibili=es  
  • 29. Once you have constructed your DR plan you must distribute the plan among employees and start work with your DR team. Your DR plan will not be effective if nobody knows about it.  
  • 30. •  Make  sure  your  DR  plan  has  full  support   –  Execu=ve  and  C-­‐level  support   –  IT  support   •  Send  an  email  or  memo  to  all  employees  with  the  informa=on  they  need  to  know   •  Distribute  hard  copies  and  instruc=ons  to  access  an  electronic  version   •  Run  a  drill  and  test   •  Spend  =me  to  educate  your  workforce.  A  tech  savvy  workforce  with  well   understood  best  prac=ces  can  be  your  best  weapon  against  disasters.    
  • 31. •  Test  oPen  (Every  6  months)   •  Only  through  tes=ng  will  you  uncover  everything  that  is  missing  from  your  plan   •  Revise  aPer  tes=ng   •  Part  of  your  plan  will  become  stale  every  =me  you  test  it,  make  sure  all  the   informa=on  is  up  to  date   •  Record  difficul=es  during  tes=ng  so  updates  can  be  made    
  • 32. For  help  filling  out  your  free  disaster  recovery  planning   template  contact  your  First  Communica=ons  client  rela=ons   manager.     If  you  don't  know  who  your  client  rela=ons  manager  is     Call:     Dawn  Dimick   330.835.2491     www.Slideshare.net/Firstcomm