950 likes | 1.15k Views
Disaster Recovery B usiness C ontinuity P lanning to reduce your organization’s IT Risk Profile “ prepare, organize, execute” Best Practices Presented By Tim Woodcock. Covered Topics. Statistics, Definitions and Dangerous Excuses
E N D
Disaster RecoveryBusiness Continuity Planningto reduce your organization’sIT Risk Profile“prepare, organize, execute”Best PracticesPresented ByTim Woodcock
Covered Topics • Statistics, Definitions and Dangerous Excuses • 5 Phases of Business Continuity Planning “BCP” (also referred to as Disaster Recovery Planning “DRP”) • IT Risks & Counter measures (follow the BCP) (group participation) • Key Considerations in Disaster Planning & Management • Tips for Preventative Maintenance • Q&A
Areas of Risk Hackers – hurricanes – fires – flooding – power outages – denial of service attacks – telecommunication outages – loss of internet access – hardware failures – application failures – employee error – virus attacks – sabotage – terrorism Can you think of other areas of risk?
Statistics • 75% of all incidences are caused by system & hardware malfunctions (MTBF)… and human error. “Did I just format my hard drive?” • 78% of businesses have data backup systems, but very few have a plan to access that data if and when a disaster occurs… “what do you mean, there is nothing on the tape?”
Statistics • 80% of all businesses do not have a Disaster Recovery Plan (Business Continuity Plan) in place. • 50% of companies that experience a computer outage lasting more that 10 days go out of business within five years and that most never fully recover financially. (Gartner Group)
Since 911 Disaster Recovery Planning(DRP) Is now referred to as: Business Continuity Planning(BCP)
DRII Certification Changes www.drii.org Certified Disaster Recovery Planner(CDRP) Certified Business Continuity Professional(CDRP) formally
What is Business Continuity Planning (BCP)? Planning ahead to avoid problems (plan for the worst; hope for the best) and Being prepared in the event of a problem. (some every day examples) • Spare tire in the trunk of the car • Yearly flu shot • Emergency exit signs • 911 Emergency support services • Business Continuance Insurance
BCP Focuses on: • Realizing what processes are needed to keep the organization running. • Realizing and prioritizing the risks, if the processes are disrupted. • Implementing solutions designed to minimize the risks and keep the organization functioning…
BCP Goals • Protect Your • People • Data • vital communications • Assets • brand and reputation. • Minimize threats, impacts and downtime. • Mitigate any losses. • To ensure your organization continues to operate and to do it in a cost-effective way.
Dangerous Excuses for not implementing a BCP • It costs too much money to implement. • Not enough time or resources. • It will never happen to our company. • Why bother? We have good data backups. • We “plan” on implementing one next year. • Fill in your lousy excuse here ___________
The BCP is a catalog of countermeasures for your business, in order of occurrence probability. Most important processes addressed FIRST Least important Processes addressed LAST
The Starting Point Everyone must participate for BCP to succeed • Executive management must be onboard. • Assign a Business Continuity Planner” to head up discovery & implementation. • Assemble an Emergency Management Team (cross-functional team must represent all departments) • Management • IT / telecommunications • facilities and power • accounting • customer service • human resources • public relations • membership
The 5 Phases of the Business Continuity Planning Process Risk Evaluation Monitor - Test and Adjust Business Impact Analysis (BIA) Develop Document Implement BCP Alternative Strategies & Recommendations
Risk Evaluation Risk Evaluation Identify Key Risks Return Monitor Test Adjust Business Impact Analysis Prioritize Probable Threats Develop Document Implement BCP Alternative Strategies & Recommendations Vulnerability Analysis
Identify Key IT Risks(Risk Evaluation) • Data Loss / Corrupt • Security Breach • Loss of Key personnel • Virus – SPAM - Spyware Attacks • File Server / Network Down • Power Outage • Loss of Phones / Fax • Loss of Internet Other IT Risks?
Risk Evaluation Risk Evaluation Identify Key Risks Return Monitor Test Adjust Business Impact Analysis Vulnerability Analysis Develop Document Implement BCP Alternative Strategies & Recommendations Prioritize Probable Threats
Vulnerability Analysis(Risk Evaluation) “inventory & review everything”(hardware-software-policies-procedures-responsibilities, etc.) • Data Loss / Corrupt -(backup procedures) • Security Breach -(internal / external security risk analysis) • Virus Attack-(software-updates-verification) • SPAM Attack-(filter process-updates) • File Server / Network Down -(PM-MTBF) • Power Outage -(UPS – power generator – location- seasonal) • Loss of Phones / Fax -(Telco – spares - SLA) • Loss of Internet –(ISP - data line – equipment)
Risk EvaluationAlways ask ‘what if?’ Risk Evaluation Identify Key Risks Return Monitor Test Adjust Business Impact Analysis Vulnerability Analysis Develop Document Implement BCP Alternative Strategies & Recommendations Prioritize Probable Threats There are various ways to Prioritize. One of the most effective ways is the 1-2-3 (tic-tack-toe) method
Prioritize Probable Threats(Risk Evaluation) (Probability of occurrence) 1=low, 2=medium, 3=high • 3 • 3 • 1 • 2 • 3 • 2 • 2 • 3 • Data Loss / Corrupt • Security Breach • Virus Attack • Loss of key personnel • File Server / Network Down • Power Outage • Loss of Phones / Fax • Loss of Internet
Business Impact Analysis (BIA) Prioritize Critical Bus. Functions Establish Recovery Times Risk Evaluation Determine Dollar Value Exposure Monitor Test Adjust Return Business Impact Analysis Profitability Analysis Develop Document Implement BCP Alternative Strategies & Recommendations Evaluate Security & Controls Prioritize Risk X Impact Cost Benefit Analysis Personnel, Workplace, Customer Service, Billing, IT infrastructure, etc.
Business Impact Analysis (BIA) Establish Recovery Times Prioritize Critical Bus. Functions Risk Evaluation Determine Dollar Value Exposure Monitor Test Adjust Return Business Impact Analysis Profitability Analysis Develop Document Implement BCP Alternative Strategies & Recommendations Evaluate Security & Controls Prioritize Risk X Impact Cost Benefit Analysis Immediate, up to 4 hours, Same day, 24-48-72 hours, or greater
Business Impact Analysis (BIA) Establish Recovery Times Prioritize Critical Bus. Functions Risk Evaluation Determine Dollar Value Exposure Monitor Test Adjust Return Business Impact Analysis Profitability Analysis Develop Document Implement BCP Alternative Strategies & Recommendations Evaluate Security & Controls Prioritize Risk X Impact Cost Benefit Analysis Play the ‘what if’ game Explore cost of downtime/hr for each area of concern. $28- >$350 per man-hour
Cost of Exposure A monetary value must be place on all key processes. This will help determine the importance of restoring that process
Business Impact Analysis (BIA) Establish Recovery Times Prioritize Critical Bus. Functions Risk Evaluation Determine Dollar Value Exposure Monitor Test Adjust Return Business Impact Analysis Profitability Analysis Develop Document Implement BCP Alternative Strategies & Recommendations Evaluate Security & Controls Prioritize Risk X Impact • Each dept. is a business unit • Analyze all aspects of the unit • Determine its profitability • Determine necessities for operational status Cost Benefit Analysis
Business Impact Analysis (BIA) Establish Recovery Times Prioritize Critical Bus. Functions Risk Evaluation Determine Dollar Value Exposure Monitor Test Adjust Return Business Impact Analysis Profitability Analysis Develop Document Implement BCP Evaluate Security & Controls Alternative Strategies & Recommendations Prioritize Risk X Impact Cost Benefit Analysis Very important phase in Risk Reduction Perform a security risk analysis
Evaluate Security and Controls • Perform a Security Risk Analysis • Performed by: • Experienced internal IT staff • Outside professional firm • Review all potential risk exposures • Network vulnerabilities • Router & firewall vulnerabilities • Current password and data access policies • Remote access to network • Virus / SPAM protection & E-mail policies • Operating system security patches and updates • Other security Risks? _________________
The Benefits • Expose existing system and policy vulnerabilities. • Strengthen existing security policies & procedures. • Creation of non-existing policies & procedures. • Thereby mitigating your risk.
Business Impact Analysis (BIA) Establish Recovery Times Prioritize Critical Bus. Functions Risk Evaluation Determine Dollar Value Exposure Monitor Test Adjust Return Business Impact Analysis Profitability Analysis Develop Document Implement BCP Alternative Strategies & Recommendations Cost Benefit Analysis Evaluate Security & Controls Helps justify need for implementing solutions, to lower exposed risks. i.e. Tape backup hdwr/sftwr or secondary archiving/HA solution Prioritize Risk X Impact
Business Impact Analysis (BIA) Establish Recovery Times Prioritize Critical Bus. Functions Risk Evaluation Determine Dollar Value Exposure Monitor Test Adjust Return Business Impact Analysis Profitability Analysis Develop Document Implement BCP Alternative Strategies & Recommendations Prioritize Risk X Impact Evaluate Security & Controls Values assigned to each risk & process Prioritized according to importance Helps determine order of restoration Cost Benefit Analysis
Prioritize Risk X Impact(BIA)Impact on Business (Cost and Impact on business) 1=low, 2=medium, 3=high • Data Loss / Corrupt • Security Breach • Absent Producers • SPAM Attack • File Server / Network Down • Power Outage • Loss of Phones / Fax • Loss of Internet • 3 • 3 • 1 • 1 • 3 • 3 • 3 • 3 • 3
Determine the order of Risk Avoidance & Mitigation Risk evaluation= Server down=3 BIA Impact on Business= Server down=3 Smart planners keep a coin handy to resolve equal-number risks…
Develop Alternative Strategies Risk Evaluation Identify Strategy Needs Reduce Risk Profile Monitor Test Adjust Return Business Impact Analysis Focus on Quick Recovery Develop Document Implement BCP Alternative Strategies & Recommendations Focus on Mitigating Damages BIA info used to determine necessary changes Example: tape archive too long, multiple tapes, dip into production time… new solution needs to be implemented Business Interruption Insurance Alternate Sites & Storage
Develop Alternative Strategies Risk Evaluation Identify Strategy Needs Reduce Risk Profile Monitor Test Adjust Return Business Impact Analysis Focus on Quick Recovery Develop Document Implement BCP Alternative Strategies & Recommendations Focus on Mitigating Damages New vs. upgrade equipment (mtbf) Employee training program, Increased security & awareness Think ‘out of box’, minimum down-time Business Interruption Insurance Alternate Sites & Storage
Develop Alternative Strategies Risk Evaluation Identify Strategy Needs Reduce Risk Profile Monitor Test Adjust Return Business Impact Analysis Focus on Quick Recovery Develop Document Implement BCP Alternative Strategies & Recommendations Focus on Mitigating Damages Cross training of employees Software, hardware, vendor services availability All possible scenarios should be considered and prepared for Business Interruption Insurance Alternate Sites & Storage
Develop Alternative Strategies Risk Evaluation Identify Strategy Needs Reduce Risk Profile Monitor Test Adjust Return Business Impact Analysis Focus on Quick Recovery Develop Document Implement BCP Alternative Strategies & Recommendations Focus on Mitigating Damages Preventative maintenance Cross training personnel Test data restore & system fail-over programs regularly Continued Awareness meetings Business Interruption Insurance Alternate Sites & Storage
Develop Alternative Strategies Risk Evaluation Identify Strategy Needs Reduce Risk Profile Monitor Test Adjust Return Business Impact Analysis Focus on Quick Recovery Develop Document Implement BCP Alternative Strategies & Recommendations Focus on Mitigating Damages Business Interruption Insurance Alternate Sites & Storage multiple storage & HA technologies (replicate server, multiple site utilization, SAN, Online, etc.)
Develop Alternative Strategies Risk Evaluation Identify Strategy Needs Reduce Risk Profile Monitor Test Adjust Return Business Impact Analysis Focus on Quick Recovery Develop Document Implement BCP Alternative Strategies & Recommendations Focus on Mitigating Damages Business continuance insurance, based on total risk discovered during the BIA phase. Helps mitigate costs incurred to rebuild and continue business immediately following a disaster Business Interruption Insurance Alternate Sites & Storage
Develop, Document & Implement BCP People Risk Evaluation Processes Monitor Test Adjust Business Impact Analysis Return Data Develop Document Implement BCP Alternative Strategies & Recommendations Create with confidence your BCP, protecting your people first Establish responsibilities & emergency workflows for each risk scenario Ensure communication & availability of key personnel (and cross-train) List & hand out cell phone, home phone, contact info, hot site location, etc
Develop, Document & Implement BCP People Risk Evaluation Processes Monitor Test Adjust Business Impact Analysis Return Data Develop Document Implement BCP Alternative Strategies & Recommendations Document the who-where-how for all possible scenarios (Examples: Who is responsible for ensuring the tape backups are working & available? Who is the ‘alternate person’, and how will they have access to the tapes? Who is in charge of a replacement server & correct backup device
Develop, Document & Implement BCP People Risk Evaluation Processes Monitor Test Adjust Business Impact Analysis Return Data Develop Document Implement BCP Alternative Strategies & Recommendations Both Preventative & Emergency procedures must be documented and agreed to by all parties responsible for ensuring the security & expedient restoration of company data ‘PM’ is less expensive than the aftermath of an unnecessary disaster (i.e. test restores, off-site backup, SAN, High Availability solutions)
Monitor Test & Adjust Train Initial training Annual training Cross-training Risk Evaluation Return Implement Testing Program Monitor Test Adjust Business Impact Analysis Design Document Implement BCP Alternative Strategies & Recommendations Audit & Adjust
Monitor Test & Adjust Train • Initial testing • Annual testing • Find weaknesses Risk Evaluation Return Implement Testing Program Monitor Test Adjust Business Impact Analysis Sftw-Hrdw changes Vendor & utilities External changes New personnel Policy changes Design Document Implement BCP Alternative Strategies & Recommendations Audit & Adjust
Monitor Test & Adjust Train • Find weaknesses • Formulate solutions • Regularly reviewed • Continued positive effect Risk Evaluation Return Implement Testing Program Monitor Test Adjust Business Impact Analysis Design Document Implement BCP Alternative Strategies & Recommendations Audit & Adjust
Key Considerations in Disaster Planning & Management For Independent Agencies & Brokerage Firms An Agents Council for Technology Report March 15, 2005