Sei sulla pagina 1di 37

Information Security

Disaster Recovery Plan Template


[Department Name]
[Version:]

PURPOSE: One of the objectives of Queen's University's information security is to


establish IT Disaster Recovery Plans across campus IT units. This Disaster Recovery
Plan Template document was created to assist Queens University departments in
developing consistent and cohesive IT Disaster Recovery Plans.
INSTRUCTIONS: Please use the temporary instructions (written in red) and the
examples (Appendices and List of Tables) as a guide and remove them as you
complete your Disaster Recovery Plan (DRP). Alternatively, you may create a new
document. Use WORDs draft view for completing extra-wide templates and split
columns as required for printing. In order to ensure the integrity of information, it is
not recommended that department recovery plans be created from completed DRPs
belonging to another department!

The information in this template was developed by the Queens Security Community of
Practice: Disaster Recovery Focus Group to assist others on campus to more easily create
their own plans for IT Disaster Recovery.

Information Security Disaster Recovery Plan Template


[Please complete the document control table below, including the document
authorities and the names of individuals in your department (and their roles) who
should receive a copy of this document.]

Document Control
Authorities
Author

Role

[Name]

[Disaster Recovery Coordinator]

Approved by

Role & Approval


Responsibility

Approval Form
Signed and Dated
on:

Distribution list
Name

Organization/Role

Revision History
Date

Versio
n

2011-12-07341310314

Author

Page 2 of 37

Notes

Information Security Disaster Recovery Plan Template

In All Cases of Emergency


You Must First

Call the Campus


Emergency
Response Centre

36111
613-533-6111
This includes calls for ambulance, police and fire.

2011-12-07341310314

Page 3 of 37

Information Security Disaster Recovery Plan Template

Table of Contents
Table of Contents.............................................................................................4
SAFETY FIRST...................................................................................................5
1.0 Introduction...............................................................................................6
1.1 What Constitutes a Disaster?.................................................................6
1.2 What to do First in a Disaster?............................................................6
2.0 Communication Strategy...........................................................................7
2.1 Contact Lists...........................................................................................7
Staff Contact Information Template..............................................................8
Vendor Contact Information Template..........................................................9
3.0 Business Impact / IT Risk Assessment.....................................................10
Type of Disaster Table Template.................................................................10
Business Impact Analysis Template............................................................12
3.1 Detailed System Information................................................................12
Systems Inventory Table Template.............................................................14
Critical Systems Ranking Template.............................................................15
Criticality definition Examples.................................................................15
Security Information Table Template...........................................................16
Backup Strategy Table Template.................................................................17
Ideal Backup Strategy Table Template........................................................17
Documentation Information Table Template...............................................18
3.2 Disaster Recovery Strategy..................................................................18
Disaster Recover Strategy Table Template..............................................19
Disaster Recovery Test Schedule Template.............................................20
List of Tables Examples...............................................................................21
Table 1 - Example Disaster Recovery Plan Flow chart Example..................21
Table 2- Example Decision Points for Disaster Recovery Process...............22
Appendix A Example Disaster Definitions...................................................23
Summary of Threat Analysis.......................................................................23
Appendix B Example Type of Disaster Table................................................24
Appendix C Example Systems Inventory Table...........................................27
Appendix D Example Security Information Table.........................................29
Appendix E Example Backup Strategy Table...............................................31
Appendix F Example Documentation Information Table..............................32
Example Check list for Disaster Recovery Bin Storage...............................32
Appendix G Example Recovery Strategy Table............................................33

2011-12-07341310314

Page 4 of 37

Information Security Disaster Recovery Plan Template

SAFETY FIRST

Always PROTECT life and limb before proceeding with any of the emergency
procedures outlined in this handbook.
risk.

NEVER place yourself or others at physical

Leave all physically dangerous aspects of any emergency response to

experienced professionals, e.g. Fire-fighters, Emergency Medical Staff, Police,


Campus Security, Environmental Health and Safety Specialists, and Structural and
Electrical experts.
Following an emergency, DO NOT enter any dangerous area without authorization
from the proper authority, and then only after employing all necessary safety
precautions

2011-12-07341310314

Page 5 of 37

Information Security Disaster Recovery Plan Template

1.0 Introduction
[Define the purpose of an IT disaster recovery plan for your specific department.]

1.1 What Constitutes a Disaster?


[Define what would constitute a disaster in your department .]

1.2 What to do First in a Disaster?


Assess the Risk
Is personal safety at risk? Safety is first priority.
If the emergency is a threat to life, immediately call the Queens Emergency Report
Centre at (external 613-533-6111 internal 36111).

2011-12-07341310314

Page 6 of 37

Information Security Disaster Recovery Plan Template

2.0 Communication Strategy


[Outline your communication strategy and identify the person who will serve as the
Disaster Recovery Co-ordinator (DRC). The Disaster Recovery Co-ordinator will work
together with members of your disaster recovery team and is the person
responsible for developing, maintaining and distributing the details associated with
disaster recovery planning and communication, including this disaster recovery plan
and alternate media, such as a card with contact information for critical staff.
Your communication strategy should also include: 1) First point of contact, 2)
Escalation procedures, 3) Call list order with names and phone numbers .
See Table 1 and 2 in the List of Tables for an example of incident escalation flow
and the decision point for disaster recovery process and back to normal status .]

2.1 Contact Lists


[On the next two pages are two templates to complete for Staff Contact Information
and for Vendor Contact Information. Please remove the red example text as
appropriate and insert your department information in the tables. ]

2011-12-07341310314

Page 7 of 37

Information Security Disaster Recovery Plan Template

Staff Contact Information Template

2011-12-07341310314

Page 8 of 37

Information Security Disaster Recovery Plan Template


Updated:

Staff Contact Information


Name

Work
Phone
Numbe
r

Cell Phone
Number

Email
Addres
s

Other
Informati
on

613-53336111

N/A

First
point of
contact

911

911

N/A

36075

613-5336075

N/A

Roles

Responsibilities

First point of contact


for all emergencies
Will be called by ERC.
To be called only if
contact can't be made
to ERC
Will be called by ERC.
Describe
circumstances to ERC

Main emergency
contact
Contact when
Queens ERC
unavailable

Emergency Contacts
36111
Emergency Report
Center
Kingston Police

Physical Plant
Services
"Your Departmental"
DR Leads

"Your Departmental"
Secondary IT DR
Team

Main "Your
Departmental" Area
Leads

External and other


business contacts

2011-12-07341310314

Page 9 of 37

Contact for
infrastructure
problems

Information Security Disaster Recovery Plan Template

Vendor Contact Information Template


Updated:

Vendor Contact Information


Vendor
Contact
Dell
Servers

Primary
Staff
Contact

Alternate
Staff
Contact

Phone
Number

Dell
Customer
Care
Dell
Service
Parts
Sales
Dell
Technical
Support
Senior
Sales

2011-12-07341310314

Vendor

Vendor

Vendor

Vendor

Email Address
vendor@vendor
.com

Web Address
www.vendor.c
om

UserId

Password

Info

See
maintenance
coverage in
Inventory tab
of DR
detailed
system
information
spreadsheet
for
hardware.
Full
replacement
could be
between 10 15 working
days.
for order
status
information

for spare
parts and
components

Page 10 of 37

Information Security Disaster Recovery Plan Template

2011-12-07341310314

Page 11 of 37

Information Security Disaster Recovery Plan Template

3.0 Business Impact / IT Risk Assessment


It is important to identify the riskiest potential threats to any system, and ensure that these risks
are properly handled with detective and preventive measures. Individual risk scenarios will help
in the type of recovery required, and whether the recovery will be a full or partial scenario.
See Appendix A for a description of disaster definitions and Appendix B for how those
definitions are categorized on a comprehensive table using a rating scale. It also has human,
business, and property impact information.]

Type of Disaster Table Template


[Refer to Definitions of Disaster in Appendix A to help you complete this table. See
an example of a completed table in Appendix B]

Type of
Disaster

Impact

Huma
n

Syste
m

Hum
an
Impa
ct
(Subt
otal)

Proper
ty
Impact

Busine
ss
Impact

H+
S/2

5 High Impact 0 No Impact


Natural and Environmental
Fire/Smoke
Floods/Wat
er Damage
Tornados
Earthquake
Electrical
storms
Severe
Winter
storms
Pandemics
e.g. H1N1,
SARS
Drought
Human
Espionage/T
errorism
War
Explosion/B

2011-12-07341310314

Page 12 of 37

Probabil
ity

Tot
al

Curren
t
Contro
ls

Probabil
ity w/
Controls

Information Security Disaster Recovery Plan Template


omb
Theft/Sabot
age/Vandali
sm
Labour
Disputes/St
rike/Work
Stoppage
Misuses/Ab
use
Mismanage
ment/Waste
Workplace
violence
Fraud
Chemical/Bi
ological
Incident

Infrastructure
Building
specific
failures
Non IT
equipment,
system
failures
Power
Disruption
Communica
tion Loss
Heating/coo
ling, power
failures
Oil,
petroleum
disruption
Food and/or
water
contaminati
on
Regulatory,
legal
changes

2011-12-07341310314

Page 13 of 37

Information Security Disaster Recovery Plan Template


IT-specific
Cyber
Threats/Hac
king/Social
Engineering
Malicious
Code
Hardware/E
quipment
Failure
User
Errors/Omis
sions
Browsing/Di
sclosure
Eavesdropp
ing/Intercep
tion
Data
Integrity
Loss
Program
Errors/Soft
ware
Failure
Incorrect
Shutdown

Business Impact Analysis Template


Updated:

Business Impact Analysis


Critical System

Server Name

2011-12-07341310314

Business Impact Analysis


Document Location
Hyper link to Business Impact
Analysis document

Page 14 of 37

Information Security Disaster Recovery Plan Template

3.1 Detailed System Information


Several template tables below can be worked through in the event of a disaster. Each provides
detailed descriptions that will aid in the full or partial recovery of the affected systems. These
tables include: 1) System Inventory table, 2) Critical Systems Ranking table, 3) Security
Information table 4) Backup and Ideal Backup Strategy tables, and 5) Documentation Information
table.

System Inventory Table


The systems inventory table on the next page is a complete inventory of all infrastructures
(networks, servers and applications and hardware equipment). It has all detailed information
about every server such as network address, manufacturer details, maintenance, and software
dependencies. All the applications on the server are also included.

2011-12-07341310314

Page 15 of 37

Information Security Disaster Recovery Plan Template

Systems Inventory Table Template


[View Appendix C to see an example of how this table may be completed.]
NOTE: Use Draft view to edit all of the columns in this extra-wide table; split columns after completion as appropriate for printing.

Infra
struc
ture
Type

IP
Add
res
s

Ser
ver
Na
me

Ser
ver
De
scri
pti
on

Lo
ca
ti
on

Man
ufac
ture
r

M
o
d
el

Se
rvi
ce
Ta
g

Mai
nte
nan
ce
Exp
irati
on

Physical Servers
Build
ing
nam
e

VMWARE Building name

Servers Hosted
in VM
Building
name

Building
name

2011-12-07341310314

Page 16 of 37

Mai
nte
nan
ce
Cov
era
ge
(Ser
vice
Lev
el
Agre
eme
nt)

Su
pp
or
t
P
ho
ne
N
u
m
be
r

#
of

#
o
f
C
P
U
s

C
P
U
M
o
d
el

C
P
U
S
p
e
e
d

In
te
rn
al
Dr
iv
R es
A

H
B
A
Pow
er
Req
uire
men
ts

SA
Ns
Co
nn
ect
ion

C
a
r
d
s

Ba
se
Op
er
ati
ng
Sy
st
e
m

Sof
tw
are
Inv
ent
ory

Cri
tic
ali
ty

Dep
end
enc
y
(Faci
litie
s,
Peo
ple,
Serv
ices,
Func
tion
s)

Ke
y
Pe
rs
on
ne
l
(Ro
le,
Per
so
n)

T
y
p
e

S
er
vi
c
e

Information Security Disaster Recovery Plan Template

Building
name VMware
Server

Storage,
Networking and
Power

2011-12-07341310314

Page 17 of 37

Information Security Disaster Recovery Plan Template

Critical Systems Ranking Template


This table ranks all servers based on a 1 to 4 ranking. This makes it easy to see what order
servers fall under to restore should more than one server be affected. This table also outlines
storage policies, data retention, and high level backup information, as well as, recovery point
objective (RPO) and recovery time objectives (RTO), details for each server.

RPO Recovery Point Objective extent of data loss that can be tolerated by your
critical business systems
RTO Recovery Time Objective time available to recover disrupted systems and
resources.

Updated:

Critical Systems Ranking

Server/Functio
n
Most Critical
Server

Rank

RPO

Least Critical

Criticality definition Examples

1
2
3
4

=
=
=
=

Critical
24 hours
Essential 72 hours
Necessary 7 days
Desirable more than 7 days

2011-12-07341310314

Page 18 of 37

Image

Data

Hardware
Replacement

RTO

RTO

RTO

Information Security Disaster Recovery Plan Template

2011-12-07341310314

Page 19 of 37

Information Security Disaster Recovery Plan Template

Security Information Table Template


When this table is completed it will have a column for each critical system, application, and/or function, and devoted columns for
physical security, backup systems, data security, and data encryption. The final three columns have links for business impact
assessment (BIA), risk assessment, and links to your additional document locations.
[See Appendix D to view an example of a completed Security Information Table]
NOTE: Use Draft view to edit all of the columns in this extra-wide table; split columns after completion as appropriate for printing.

Updated:

Security Information
Critical
System/Application/F
unction

Physical Security

Building Name
Server name
Server name

Building Name

Building Name

2011-12-07341310314

Page 20 of 37

Backup Systems

Data Security
(Logical
Access)

Data
Encrypti
on

Business Impact
Analysis
Document
Location

Information Security Disaster Recovery Plan Template

Backup Strategy Table Template


This table when completed will include your storage policies, data retention, and backup policies as well as schedule descriptions
for these policies.
NOTE: Use Draft view to edit all of the columns in this extra-wide table; split columns after completion as appropriate for printing.

Updated:

Backup
Strategy

Server/
Function

Current
Strateg
y

Space
(VMDK
Size)

SubCli
ent 1

Storage
Policy

SubCli
ent 2

Storag
e
Policy

Sched
ule
Name

SubCli
ent 2

Stora
ge
Polic
y

Sched
ule
Name

Ideal Backup Strategy Table Template


The completed Ideal Backup Strategy table below will allow your department to provide the ideal recovery point objective (RPO) /
recovery time objective (RTO) times for business resumption. The table below can be completed in order of priority with target
times.

Rebuild Data
Server/Function

2011-12-07341310314

RPO
24
hrs
24
hrs

Hardware
replace

RTO

RTO

24 hrs

24 hrs

48 hrs

48 hrs

Page 21 of 37

Information Security Disaster Recovery Plan Template

Documentation Information Table Template


[See Appendix F for an example of how this table may be completed and suggested
checklist]
This table outlines in summary where all the documentation is located and relative links to the
documentation.
Updated:

Document Name

Document
Type

Person
Responsible

Date
Changed

Additional
Information

3.2 Disaster Recovery Strategy


Your disaster recovery strategy takes into account how the IT Team will recover all IT services
required in order for you to run your business/work and continue functioning in the event of a
disaster, taking into account the risk assessments done and all agreed upon RTO and RPO
requirements.
In addition to completing the Disaster Recovery Strategy and Disaster Recovery Test Schedule
tables below, your strategy may also include:

An agreed upon meeting place


Communication plan and team
IT DR team
Business contacts
Offsite location
Mobilization of team to move offsite
Detailed disaster recovery documents for each server/application
Backup requirements offsite while at DR site
DRP testing strategy and schedule (exercises, such as table top and simulations)
List of vital records
Scheduled review of disaster recovery documentation and frequency of updates

2011-12-07341310314

Page 22 of 37

Information Security Disaster Recovery Plan Template

Disaster Recover Strategy Table Template


[See Appendix G for an example of how to complete this table]

Recovery Strategy
Server/Function

2011-12-07341310314

Rebuild ( VM
Image )

Rebuild ( Data
Only )

Page 23 of 37

Rebuild (Full with


Hardware Replacement)

Information Security Disaster Recovery Plan Template

Disaster Recovery Test Schedule Template


Updated:

Recovery Test Schedule


Server/Function

Server name

2011-12-07341310314

Page 24 of 37

Information Security Disaster Recovery Plan Template

List of Tables Examples


Table 1 - Example Disaster Recovery Plan Flow chart Example

Source: the Queens Security Community of Practice: Disaster Recovery Focus Group for the
Queens advancement Disaster Recovery Plan.

2011-12-07341310314

Page 25 of 37

Information Security Disaster Recovery Plan Template

Table 2- Example Decision Points for Disaster Recovery Process

Source: the Queens Security Community of Practice: Disaster Recovery Focus Group for the
Queens advancement Disaster Recovery Plan.

2011-12-07341310314

Page 26 of 37

Information Security Disaster Recovery Plan Template

Appendix A Example Disaster Definitions


Summary of Threat Analysis
This is a summary of possible threats that could affect our systems or infrastructure. The threats
are categorized into four distinct groups.
Natural and Environmental
Human
Infrastructure
IT-Specific
Each threat or type of disaster is weighted with a number in the columns and a final number
representing the total, gives you the threats significance.
Human Impact, property impact, business impact, and probability are the factors used to access
the threats and come up with the totals.

Objective:

It is important to identify the riskiest potential threats to the system, and ensure that these
threats are properly accounted for in the creation of the DRP procedures specific to this system.

Procedure:

For each identified threat, an assessment of the impact and probability of it occurring was made
by assigning a numerical value from High Impact (5) to No Impact (0) and High Probability (5) to
Zero Probability (0).
From these assessments, a Total Risk Score was compiled for each potential threat, which allows
for the ranking of the probability and impact of the various potential threats identified. Threats
with the highest Total Risk Scores should be given primary attention and resources.
In addition, existing controls/preventative measures have been identified which may reduce the
probability of a potential threat occurring, lowering the Total Risk Score accordingly.

Note:

It should also be noted that the city of Kingstons Emergency Plan considers the following risks to
be the most prevalent and we should use as a guide when outlining our threats:
The City of Kingston has completed the Hazard Identification Risk Assessment (HIRA) developed
by Emergency Management Ontario. The potential community hazards within the City of
Kingston are listed below.
Human Health Emergencies
Critical Infrastructure/Power Failures
Rail Transportation Accident or other Hazardous Materials Incident
Severe Weather Conditions
Major Structural / Wild land Fires

Source: Security Community of Practice: Disaster Recovery Focus Group.

2011-12-07341310314

Page 27 of 37

Information Security Disaster Recovery Plan Template

Appendix B Example Type of Disaster Table


Type of
Disaster

Impact

Huma
n

Syste
m

Human
Impact
(Subto
tal)

Proper
ty
Impac
t

Busine
ss
Impact

Probabil
ity

Tot
al

Current
Controls

Probabil
ity w/
Controls

14

Extinguis
her at
Door

Located
3rd Floor

H+S/2

5 High Impact 0 No Impact


Natural and Environmental
Fire/Smok
e
Floods/Wa
ter
Damage
Tornados
Earthquak
e
Electrical
storms
Severe
Winter
storms
Pandemic
s e.g.
H1N1,
SARS
Drought

3.5

3.5

12.
5
12.
5

12

10

2.5

8.5

4
2

1
1

2.5
1.5

0
0

2
1

2
0

6.5
2.5

1
0

Human
Espionage
/Terrorism
4

3.5

4.5

12.
5
12.
5

12

War
Explosion/
Bomb
Theft/Sab
otage/Van
dalism
Labour
Disputes/
Strike/Wor
k
Stoppage

2.5

11.
5

10

2011-12-07341310314

Page 28 of 37

1
1
UPS

Fire door
(Steel),
Alarmed
(Motion)

1
1
1

Fire door
(Steel),
Alarmed
(Motion)

Information Security Disaster Recovery Plan Template


Misuses/A
buse
1

1.5

8.5

Change
Manage
ment,
ACL

Central
Procedur
es in
Place

Mismanag
ement/Wa
ste
Workplace
violence
Fraud
Chemical/
Biological
Incident

2.5

9.5

2.5

7.5

UPS
Controlle
d
Centrally
(ITS)
Temp
Alarm in
Room

Infrastructure
Building
specific
failures
Non IT
equipmen
t, system
failures
Power
Disruption
2
Communic
ation Loss
2
Heating/c
ooling,
power
failures
Oil,
petroleum
disruption
Food
and/or
water
contamina
tion
Regulator
y, legal
changes

2011-12-07341310314

Page 29 of 37

Information Security Disaster Recovery Plan Template


IT-specific
Cyber
Threats/H
acking/So
cial
Engineeri
ng
Malicious
Code

Hardware/
Equipmen
t Failure
User
Errors/Om
issions
Browsing/
Disclosure
Eavesdrop
ping/Inter
ception
Data
Integrity
Loss
Program
Errors/Sof
tware
Failure
Incorrect
Shutdown

12

12

Firewall,
ACL,
ClamAV,
Nessus
Change
manage
ment,
Virus
Scan

2.5

11.
5

RAID 5,
Backups
Change
Manage
ment

Firewall,
ACL,
ClamAV

Source: Security Community of Practice: Disaster Recovery Focus Group.

2011-12-07341310314

Page 30 of 37

Information Security Disaster Recovery Plan Template

Appendix C Example Systems Inventory Table


NOTE: Use Draft view in WORD 2010 to read this extra-wide table.

Infrastruct
ure
Type

IP
Address

Server Name

Server
Descripti
on

Locati
on

Manufact
urer

???,
Server
Room

Dell

Model

Service
Tag

PowerEd
ge 2950

CP93SC
1

PowerEd
ge 2950

DR0QZC
5

Maintena
nce
Expiration

Maintena
nce
Coverage
(Service
Level
Agreemen
t)

# of
Support
Phone
Number

CPU
s

Physical Servers
Building
name

Physical
Server

xxx.xx.xx
x.xx

servername.queen
su.ca

Examples

8-Feb-11

Silver, 4
Hour on
Site

1-800945-3355

VMWARE - Building name

Physical
Server

esxhost.queensu.c
a

2011-12-07341310314

Virtual
Center
Server for
VMware

Page 31 of 37

???,
Server
Room

Dell

8-Feb-14

Silver, 4
Hour on
Site

1-800945-3355

Information Security Disaster Recovery Plan Template


Servers Hosted in VM
Building name
Virtual
Server

xxx.xx.xx
x.xx

Oracle DB

Virtual
Server

xxx.xx.xx
x.xx

Oracle DB2

Productio
n Oracle
Server

???,
Server
Room

N/A

N/A

N/A

N/A

N/A

N/A

N/A

N/A

N/A

N/A

N/A

N/A

N/A

Building name
Virtual
Server

backups.queensu.c
a

Main
Backup
Server

N/A

N/A

N/A

N/A

N/A

backups2.queensu.
ca

Secondar
y Backup
Server

Dell

PowerEd
ge 2850

DF0QZC
4

26/01/2014

Next Day
Business

Dell

MD3000i

2014/02/11

4 Hr, OnSite Gold

Building name VMware Server


Virtual
Server

Storage, Networking and Power

SANs

MD3000i

MD3000i

???,
Server
Room

Source: Security Community of Practice: Disaster Recovery Focus Group.

2011-12-07341310314

Page 32 of 37

1-800945-3355

Information Security Disaster Recovery Plan Template

Appendix D Example Security Information Table


Updated: March 3,
2010

Security Information
Critical
System/Application/F
unction

Physical Security

Building Name
Server name

Server name
Building is locked and
has alarm after working
hours and actual server
room is also locked and
alarmed 24 hours a day.

Building Name

2011-12-07341310314

Page 33 of 37

Backup Systems

Rsync application
used to backup
files nightly to
backup server
located in???.
Rsync application
used to backup
files nightly to
backup server
located in???.

Data Security
(Logical
Access)

Data
Encryptio
n

Business Impact
Analysis
Document
Location

URL to individual
business impact
documents
Server requires
login Id and
password to
access
information,
along with IP
Authentication

Information Security Disaster Recovery Plan Template


Server name
Building is locked and
has alarm after working
hours. Closet key
accessible to
Infrastructure staff only

Server requires
login Id and
password to
access
information,
along with IP
Authentication

Building Name
Server name

Hosted on VM Server
that is housed in??? that
is alarmed 24 x 7 and
requires entry only by
operations personnel in
Central ITS or
temporary code also
controlled by central ITS

2011-12-07341310314

Page 34 of 37

Server requires
login Id and
password to
access
information,
along with VPN
authentication
and IP
Authentication

URL to individual
business impact
documents

Information Security Disaster Recovery Plan Template


Source: Security Community of Practice: Disaster Recovery Focus Group.

Appendix E Example Backup Strategy Table


Updated:
April 20,
2011

Backup
Strategy

Server/
Function
Network
Switch
Console
Server
Name
Server
Name

Current
Strateg
y

Space
(VMDK
Size)

Rsync
Client
VCB
Client

SubCli
ent 1

Storage
Policy

SubCli
ent 2

7 Day - 1
Cycle
7 Day - 2
Cycle

archive
log
Monthl
y Copy

Source: Security Community of Practice: Disaster Recovery Focus Group.

2011-12-07341310314

Page 35 of 37

Storag
e
Policy

Sched
ule
Name

SubCli
ent 2

Stora
ge
Polic
y

Sched
ule
Name

Information Security Disaster Recovery Plan Template

Appendix F Example Documentation Information Table


Updated: April 20,
2011

Document Name

Document
Type

Disaster Recovery
Overview

Word

Infrastructure

Excel

Flowchart

PDF

00-Restore

Word

Person
Responsible
Bill Smith

Date
Changed

Additional
Information

2011/04/
20
2010/10/
25

2010/10/
25

Source: Security Community of Practice: Disaster Recovery Focus Group.

Example Check list for Disaster Recovery Bin Storage


1. Hard copy of all documents in three ring binder
2. Encrypted Memory stick with all relevant docs on it and possibly passwords and door
codes?
3. Keys to any lock up of facilities
4. Laminated contact card
5. CDs and or software DVDs
6. Hardware manuals
7. Rescue disks where required

2011-12-07341310314

Page 36 of 37

Information Security Disaster Recovery Plan Template

Appendix G Example Recovery Strategy Table


Recovery Strategy
Rebuild ( VM
Image )

Server/Function
Console
Server Switch

Hyperlink to
Server Data
Rebuild

Server name
Virtual Server Generic

Rebuild ( Data
Only )

Rebuild (Full with


Hardware Replacement)

Hyperlink to actual Server


Full Rebuild

Hyperlink to VM
Image Server
Rebuild

Source: Security Community of Practice: Disaster Recovery Focus Group.

2011-12-07341310314

Page 37 of 37

Potrebbero piacerti anche