MANAGEMENT of INFORMATION SECURITY, Fifth Edition

Slides:



Advertisements
Similar presentations
IT Service Continuity Management
Advertisements

Business Continuity Training & Awareness by Sulia Toutai (ANZ)
Disaster Preparedness I Lessons Learned Don Hall Thomson Prometric 2006 Annual ConferenceAlexandria, Virginia Council on Licensure, Enforcement and Regulation.
1 Continuity Planning for transportation agencies.
Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP)
Management of Information Security Chapter 3 Planning for Contingencies Things which you do not hope happen more frequently than things which you do.
Principles of Incident Response and Disaster Recovery
Planning for Contingencies
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
Planning for Contingencies
Disaster Recovery and Business Continuity Ensuring Member Service in Times of Crisis.
Business Continuity and You! The Ohio State University Business & Finance Enterprise Continuity Program Quarterly Update October 2008Business and Finance.
Business Crisis and Continuity Management (BCCM) Class Session
Planning for Continuity
November 2009 Network Disaster Recovery October 2014.
EASTERN MICHIGAN UNIVERSITY Continuity of Operations Planning (COOP)
Continuity of Operations Planning COOP Overview for Leadership (Date)
Contingency Planning Things which you do not hope happen more frequently than things which you do hope. -- PLAUTUS. (C. 254–184 B.C.), MOSTELLARIA, ACT.
RBTC: Business Continuity 101 July 18, What is Business Continuity? Scenario Part 1 Why is BC important? What types of plans are needed? How do.
ITC358 ICT Management and Information Security
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
Planning for Contingencies
INFORMATION SECURITY PLANNING & IMPLEMENTATION Today’s Reference: Whitman & Mattord, Management of Information Security, 2 nd edition, 2008 Chapter 3.
Planning for Contingencies
ISA 562 Internet Security Theory & Practice
Rich Archer Partner, Risk Advisory Services KPMG LLP Auditing Business Continuity Plans.
Effectively Managing Transit Emergencies. Nature of Emergencies and Disasters Overview What Is an Emergency? What Is a Disaster? Differences What Is Emergency.
ADM 677 Crisis Management in Educational Settings Karen McCuiston Kentucky Center For School Safety.
Business Continuity and Disaster Recovery Planning.
Principles of Incident Response and Disaster Recovery
Continuity of Operations Planning (COOP) for Community Colleges Welcome Introductions Administration Agenda Classroom Decorum Participant-Instructor.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
Business Continuity Program Orientation (insert presentation date) (This presentation is a template that requires adjustments to meet your needs)
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
Contingency Planning.
National Archives and Records Administration, Preparing for the Unexpected ESSENTIAL ELEMENTS: ANALYSIS.
TEL2813/IS2820 Security Management
Unit 3: Identifying and Safeguarding Vital Records Unit Introduction and Overview Unit objective:  Describe the elements of an effective vital records.
NFPA 1600 Disaster/Emergency Management and Business Continuity Programs.
Lecture5 : Contingency planning Lecturer: Kawther Abas 25/12/ CS – Management of Programming Projects.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
MANAGEMENT of INFORMATION SECURITY Second Edition.
Business Continuity Disaster Planning
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
AUDITING BUSINESS CONTINUITY PROGRAMS AND PLANS What to Look For Presented by: Tommye White, CBCP, DRP Chuck Walts, CBCP, CRP.
Contingency Planning. Objectives Upon completion of this material, you should be able to: –Recognize the need for contingency planning –Describe the major.
Information Security Crisis Management Daryl Goodwin.
Business Continuity Planning 101
Disaster Response Management By: Michael Blasic COSC 481.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
Business Continuity and Disaster Recovery
THINK DIFFERENT. THINK SUCCESS.
Community Health Centers of Arkansas Hazard Vulnerability Assessment Workshop August 11, 2017 Mark Fuller.
Utilizing Your Business Continuity Plan.
Business Continuity Plan Training
Business Continuity Planning and IT Risk Management
Berry College Disaster Recovery Soft Exit
“The Link” - Continuity of Operations and Emergency Management
Audit Planning Presentation - Disaster Recovery Plan
CompTIA Security+ Study Guide (SY0-501)
MANAGEMENT of INFORMATION SECURITY Second Edition.
Boeing Business Continuity
Business Continuity Planning
IS-700.A: National Incident Management System, An Introduction
Business Impact Analysis
Disaster Recovery at UNC
Continuity of Operations Planning
Business Continuity Program Overview
The Survival Plan.
Presentation transcript:

MANAGEMENT of INFORMATION SECURITY, Fifth Edition

Disaster Recovery Management of Information Security, 5th Edition, © Cengage Learning

Management of Information Security, 5th Edition, © Cengage Learning Disaster Recovery Disaster recovery planning (DRP) entails preparation for and recovery from a disaster, whether natural or man-made In general, an incident is a disaster when: the organization is unable to contain or control the impact of an incident, or the level of damage or destruction from an incident is so severe the organization is unable to quickly recover. The key role of a DR Plan is defining how to reestablish operations at the location where the organization is usually located (primary site) Management of Information Security, 5th Edition, © Cengage Learning

Disaster Recovery As you learned earlier, the CP team creates the DR planning team (DRPT) The DRPT in turn organizes and prepares the DR response teams (DRRTs) to actually implement the DR plan in the event of a disaster These teams may have multiple responsibilities in the recovery of the primary site and the reestablishment of operations: Recover information assets that are salvageable from the primary facility after the disaster Purchase or otherwise acquire replacement information assets from appropriate sources Reestablish functional information assets at the primary site if possible or at a new primary site, if necessary Management of Information Security, 5th Edition, © Cengage Learning

Disaster Recovery Response Teams DR Management Communications Computer Recovery (Hardware) Team Systems Recovery (OS) Network Recovery Team Storage Recovery Applications Recovery Data Management Vendor Contact Damage Assessment and Salvage Business Interface Logistics Others as needed. Management of Information Security, 5th Edition, © Cengage Learning

Disaster Recovery Process The NIST methodology can be adapted for DRP: Organize the DR team Develop the DR planning policy statement Review the BIA Identify preventive controls Create DR strategies Develop the DR plan document Ensure DR Plan testing, training, and exercises Ensure DR Plan maintenance Management of Information Security, 5th Edition, © Cengage Learning

Disaster Recovery Policy The DR team, led by the manager designated as the DR team leader, begins with the development of the DR policy soon after the team is formed The policy presents an overview of the organization’s philosophy on the conduct of DR operations and serves as the guide for the development of the DR plan The DR policy itself may have been created by the organization’s CP team or the DR team may be assigned the role of developing the DR policy Management of Information Security, 5th Edition, © Cengage Learning

Disaster Recovery Policy (cont.) In either case, the DR policy contains the following key elements: Purpose Scope Roles and responsibilities Resource requirements Training requirements Exercise and testing schedules Plan maintenance schedule Special considerations Management of Information Security, 5th Edition, © Cengage Learning

Disaster Classifications A DR Plan can classify disasters in a number of ways: Natural disasters Man-made disasters By speed of development Rapid onset disasters Slow onset disasters Management of Information Security, 5th Edition, © Cengage Learning

Natural Disasters Fire Flood Earthquake Lightning Landslide or mudslide Tornado or severe windstorm Hurricane or typhoon Tsunami Electrostatic discharge (ESD) Dust contamination Management of Information Security, 5th Edition, © Cengage Learning

Management of Information Security, 5th Edition, © Cengage Learning Planning to Recover Scenario development and impact analysis are used to categorize the level of threat of each potential disaster When generating a DR scenario, start with the most important asset: people Key points in the DR plan: Clear delegation of roles and responsibilities Execution of the alert roster and notification of key personnel Clear establishment of priorities Documentation of the disaster Action steps to mitigate the impact Alternative implementations for the various systems components Management of Information Security, 5th Edition, © Cengage Learning

Simple DR Plan Elements Name of agency Date of completion or update of the plan and the date of the most recent test. Agency staff to be called in the event of a disaster Emergency services to be called (if needed) in event of a disaster Locations of in-house emergency equipment and supplies Sources of off-site equipment and supplies Salvage priority list Agency disaster recovery procedures Follow-up assessment Management of Information Security, 5th Edition, © Cengage Learning

Business Continuity Management of Information Security, 5th Edition, © Cengage Learning

Business Continuity Planning (BCP) Sometimes, disasters have such a profound effect on the organization that it cannot continue operations at its primary site until it fully completes all DR efforts, which requires business continuity (BC) strategies BCP ensures critical business functions can continue in a disaster, and is most likely managed by the CEO or COO of the organization BCP is activated and executed concurrently with the DRP when needed While BCP reestablishes critical functions at alternate site, DRP focuses on reestablishment at the primary site Management of Information Security, 5th Edition, © Cengage Learning

Business Continuity The NIST methodology can also be adapted to BC: Form the BC Team Develop the BC planning policy statement Review the BIA Identify preventive controls Create relocation strategies Develop the BC plan Ensure BC plan testing, training and exercises Ensure BC plan Maintenance Management of Information Security, 5th Edition, © Cengage Learning

Business Continuity Policy Purpose Scope Roles and responsibilities Resource requirements Training requirements Exercise and testing schedules Plan maintenance schedule Special considerations Management of Information Security, 5th Edition, © Cengage Learning

Continuity Strategies Several continuity strategies for business continuity, determining factor is usually cost Three exclusive-use options: hot sites warm sites cold sites Three shared-use options: timeshare service bureaus mutual agreements Specialized options: Rolling mobile site Externally stored (prepositioned) resources Management of Information Security, 5th Edition, © Cengage Learning

Incident Response and Disaster Recovery Management of Information Security, 5th Edition, © Cengage Learning

Disaster Recovery and Business Continuity Planning Management of Information Security, 5th Edition, © Cengage Learning

Contingency Planning Implementation Timeline Management of Information Security, 5th Edition, © Cengage Learning

Crisis Management Management of Information Security, 5th Edition, © Cengage Learning

Crisis Management Another process that many organizations plan for separately is crisis management (CM), which focuses more on the effects that a disaster has on people than its effects on information assets While some organizations include crisis management as a subset of the DR plan, the protection of human life and the organization’s image is such a high priority that it may deserve its own committee, policy, and plan Management of Information Security, 5th Edition, © Cengage Learning

Crisis Management According to Gartner Research, the crisis management team is responsible for managing the event from an enterprise perspective and performs the following roles: Supporting personnel and their loved ones during the crisis Keeping the public informed about the event and the actions being taken to ensure the recovery of personnel and the enterprise Communicating with major customers, suppliers, partners, regulatory agencies, industry organizations, the media, and other interested parties Management of Information Security, 5th Edition, © Cengage Learning

Crisis Management The crisis management planning team (CMPT) should establish a base of operations or command center near the site of the disaster as soon as possible The CMPT should include individuals from all functional areas of the organization in order to facilitate communications and cooperation The CMPT is charged with three primary responsibilities: Verifying personnel status Activating the alert roster Coordinating with emergency services Management of Information Security, 5th Edition, © Cengage Learning

Business Resumption Management of Information Security, 5th Edition, © Cengage Learning

Business Resumption Planning Because the DR and BC plans are closely related, most organizations merge the two functions into a single function called business resumption planning (BRP) Such a comprehensive plan must be able to support the reestablishment of operations at two different locations—one immediately at an alternate site and one eventually back at the primary site Management of Information Security, 5th Edition, © Cengage Learning

Contingency Plan Template Management of Information Security, 5th Edition, © Cengage Learning

Contingency Plan Template (cont.) Management of Information Security, 5th Edition, © Cengage Learning

Contingency Plan Template (cont.) Management of Information Security, 5th Edition, © Cengage Learning