(A) Area
This DR plan is designed for the worst case scenario. that is to say the complete loss of the site - fires, water damage (flooding), earthquake.
Here are the key areas you need to focus on:
* Crisis Management Procedures
* Safety procedures held by the security building
* List emergency contact names held by the management.
* Backup / restore procedures
* Inventory (s) (as required / can be slaughtered)
* Business Continuity Plans
* Test DR , test BCP (which can be provided by DR Managed Service)
(B) the Invocation procedures
This is an important and often ignored section of the plan that should be given great attention. It is also imperative that the procedures defined here are included in the test program plans invariably flounder at this early stage because of the lack of familiarity with how to set in motion the recovery process. It should contain details of who is authorized to invoke the plan, and how this should be done.
purpose
in a disaster situation people will need to take special responsibility to perform data recovery.
These responsibilities must be clearly defined, and assignments can be made by personal pool available at the time. Provisional allocations were made, but they will be confirmed at the time with the staff available.
Records must be kept of personnel to specific teams so that the recovery process is checked on a regular basis and a personal record does not actively involved in the site is maintained (this can be used, if necessary call the extra resource as / when needed).
The telephone numbers are one of the most important factors that contribute to successful disaster recovery of data. Imagine that during an emergency, you can not contact the technical personnel responsible for a specific system, as you do the / his number!
At the disaster recovery site, check the following are available:
* Server Room File
* standard build documentation
* Restore Application Procedures
* technical Manuals
* copy Disaster Recovery Plan
* Contact number of its personnel
* Contacts Number of Disaster Recovery Service (your DR designated supplier)
remote backup help in the backup process, the backup center offsite. Remote backup can be done via the lines of communication, such as wide area network, or Private Line location (we recommend encrypted line).
Inventory
Following the loss of hardware and software, you need to set insurance claims
transformation in motion. To facilitate this process of hardware and software inventories it should be maintained.
hardware and software inventory (this includes IT, for example, PCs, servers, and even non-IT asset such as furniture and furnishings, telephones, important documents, etc.
test plan
end of
and 'imperative that detailed test plans are produced to support the Disaster Recovery document. the plan is a working document until it has been fully tested and tried using the software disaster recovery.
Here's an example of disaster recovery shape data that you can use:
Please enter details of all attempts whether successful or unsuccessful
Recovery of the country Data Center
in. the event of disaster (eg fire, flood - flooding) in the company with a total loss of servers and networks, which will bring critical servers at this location
(C) Recovery In-House
* Action: Recover backup tapes off-site from the center
* Action: 2 hours - Can Recovery of a data month . backup tape offsite is 1 month old data.
Disaster Recovery Site TEAM data
Once the decision to bring this plan to the disaster data recovery plan, we recommend the following checklists:
* Locate / Install DR server (s) - disaster
recovery server* contact third-party vendors for additional equipment (if necessary)
* equipment available at the site DR Install and test equipment disaster recovery and connectivity
* Connect up Switches and Server
* test all network points
* Install / test stations
* DR site established restore application (s)
* Retrieve latest copies of the system and data backup
* restore operating system environment
* restore
applications* restore data files
* Notify user management of availability and status
* complete hands Restoration of
* gain user acceptance
* leave contact details for support.
0 Komentar