1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.

Slides:



Advertisements
Similar presentations
IT Service Continuity Management
Advertisements

Disaster Recovery The People Dimension. Today’s Agenda Why bother with any Disaster Recovery/Business Continuity Planning? Importance of the People Factor.
Information Technology Disaster Recovery Awareness Program.
Disaster Recovery Plan By Chanrithy Pol ESA Regional Information System Analyst ITIL Certified / Certified Microsoft Solution Expert Share Point / Infrastructure.
Protect Your Business and Simplify IT with Symantec and VMware Presenter, Title, Company Date.
Maximizing Uptime and Your Firm's Bottom Line: Understanding risk and budget when evaluating business continuity & disaster recovery protocols Michael.
Business Continuity Section 3(chapter 8) BC:ISMDR:BEIT:VIII:chap8:Madhu N PIIT1.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
DISASTER CENTER Study Case DEMIRBANK ROMANIA “Piata Financiara” ConferenceJanuary 29, 2002 C 2002.
1 Disaster Recovery “Protecting City Data” Ron Bergman First Deputy Commissioner Gregory Neuhaus Assistant Commissioner THE CITY OF NEW YORK.
GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack.
© 2009 EMC Corporation. All rights reserved. Introduction to Business Continuity Module 3.1.
1 Disk Based Disaster Recovery & Data Replication Solutions Gavin Cole Storage Consultant SEE.
Disaster Recovery in IT David Irakiza CSC 585-High Availability and Performance Computing 2012.
Principles of Incident Response and Disaster Recovery
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Lesson 11 – NETWORK DISASTER RECOVERY Disaster recovery plans Network backup and restoration OVERVIEW.
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
Disaster Recovery and Business Continuity Ensuring Member Service in Times of Crisis.
Disaster Recovery Plan: Do you have one? Neal Cross, Assistant Director of Instructional Technology Shelly Brown, Director of Web Services Southwest Baptist.
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Business Crisis and Continuity Management (BCCM) Class Session
Services Tailored Around You® Business Contingency Planning Overview July 2013.
November 2009 Network Disaster Recovery October 2014.
Chapter 8.  Network Management  Organization Management  Risk Assessment & Management  Service Management  Performance Management  Problem Management.
Disaster Recovery as a Cloud Service Chao Liu SUNY Buffalo Computer Science.
Discovery Planning steps (1)
Presented By: MICHAEL HOFFMAN President & CEO - Bolt Data Systems June 16, 2010 Data Backup for the Shared Platform.
IT Business Continuity Briefing March 3,  Incident Overview  Improving the power posture of the Primary Data Center  STAGEnet Redundancy  Telephone.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
ISA 562 Internet Security Theory & Practice
Incident Management By Marc-André Léger DESS, MASc, PHD(candidate) Winter 2008.
David N. Wozei Systems Administrator, IT Auditor.
AMSI Hosting Options User Panel Discussion Presented by Brian Torney Session 107 Advantages of Self Hosting.
Business Continuity & Disaster recovery
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
 FFC backs up all of its data each day. It stores its most recent daily backup once a week at a company owned offsite location. FFC also stores the most.
NOAA WEBShop A low-cost standby system for an OAR-wide budgeting application Eugene F. Burger (NOAA/PMEL/JISAO) NOAA WebShop July Philadelphia.
Co-location Sites for Business Continuity and Disaster Recovery Peter Lesser (212) Peter Lesser (212) Kraft.
By Srosh Abdali.  Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure.
Information Availability Brett Paulson Sr. VP and Chief Information Officer Board of Trade Clearing Corporation FIA – November 7, 2002.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
PPD Computing “Business Continuity” David Kelsey 3 May 2012.
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Disaster Recovery and Business Continuity Planning.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
HalFILE 2.1 Network Protection & Disaster Recovery.
High Availability in DB2 Nishant Sinha
Disaster Recovery: Can Your Business Survive Data Loss? DR Strategies for Today and Tomorrow.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
A2 LEVEL ICT 13.6 LEGAL ASPECTS DISASTER RECOVERY.
Disaster Recovery Planning Barry Navarre Charter Business.
DISASTER RECOVERY PLAN By: Matthew Morrow. WHAT HAPPENS WHEN A DISASTER OCCURS  What happens to a business during a disaster?  What steps does a business.
SWIFT Business Continuity & Connectivity
Taking your Business Technology Further. First Communications: At A Glance Technology Provider since 1998, serving thousands of Businesses throughout.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Managed IT Services JND Consulting Group LLC
Technology and Business Continuity
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Processing Integrity and Availability Controls
Using the Cloud for Backup, Archiving & Disaster Recovery
The Survival Plan.
Presentation transcript:

1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border Backup Solutions (Tunisia, Morocco, Mauritius & Swift)

2 Objectives To make a survey to assess the current status at each AMEDA member regarding Disaster Recovery Planning (DRP) To make recommendations on DRP methodology based on international standards To find cost-effective solutions to protect each member’s data against national and regional disasters

3 DRP Methodology Risk Analysis Solution Design & Implementation Testing Maintenance and Training Ensure compliance with ISO 27000

4 Risk Analysis Business impact analysis (B.I.A) Settlement Platform Communication services (File transfer; web applications; Network facilities) Key Metrics R.P.O (Recovery Point Objective) : 1 hour R.T.O (Recovery Time Object) : 2 hours

5 Risk Analysis Threat analysis: (most important) System Outage Power Outage Fire Flood Earthquake, Tsunami Terrorism War Definition of impact scenarios

6 Solution Design and Implementation –Hot stand-by in a local site (High availability solution & SAN) – Recovery site (20 Km recommended) – Data Backup at regular interval to tape and sent off-site to disc and automatically copied to off-site disk (data replication) –Electric generator and UPS (Uninterruptible Power Supply) –Service bureau (Telecom outage) – Documentation (Responsibilities, Decision Tree, Procedures etc.)

7 Solution Design and Implementation

8 Testing/Simulation Technical swing from primary to secondary site Application test Telecom test Command team : IT Team Frequency : 2-3 times a year

9 Maintenance and Training Changes (staff, supplies, …) Technical solutions verification (patch distribution, hardware & software operability check, data backup verification) Treatment of test failures On-going training of existing and new staff

10 Cross-Border Backup of Data To find cost-effective solutions to protect each member’s data against national and regional disasters Alternative 1 - Bilateral arrangements between members Alternative 2 - Hub and spoke model whereby one or two AMEDA members set up the necessary hardware and software for storing the backup data of all AMEDA members

11 Challenges How to ensure the security of the data during transmission and storage? Only the AMEDA member which generated the backup data should have access to this data How to deal with the large size of the backup files to be transferred? Not easy to find cost-effective solutions for the remote transfer of large files

12 Possible Solution Applicable to both Alternatives 1 & 2 Each AMEDA member generates a backup file at specific times during the day Backup file is then encrypted and the key will be known only to the AMEDA member File compressed and sent to the backup server via a Virtual Private Network (VPN) over the Internet or via SWIFT The backup site must be fully secured and must meet industry standards on security and data recovery (e.g standards of the Uptime Institute) Even at the backup site, the file can be accessed only by the AMEDA member which generated the file

13 Backup site In Alternative 1 two AMEDA members can agree to act as backup sites for each other. In Alternative 2 backup site could be hosted in one or two countries which are less exposed to natural and man-made calamities Should be geographically far from high risk areas Should have sufficient capacity to store the data of all AMEDA members – Not Applicable to Alternative 1 In either case, backup service to be covered under a Standard Service Level Agreement between backup site and the other AMEDA member/s

14 Cost implications Alternative 1 is less costly since existing equipment and links could be used given less that less capacity would be required if backup is done on a bilateral basis In Alternative 2 the backup site would have to charge a reasonable service fee to the other AMEDA members to recover its investment in any additional equipment and to cover direct costs Existing hosting service providers may be used High speed Internet links or Swift connection required Detailed business case can be developed if there is interest for this solution

15 Thank You