Board of Supervisors June 6, 2002 Page 2
|
|
|
- Christina Hunter
- 10 years ago
- Views:
Transcription
1
2 Board of Supervisors June 6, 2002 Page 2 on recommendations contained in ISD s 1999 COMDISCO Report. ISD contracted with COMDISCO, an outside consultant, to conduct an assessment of ISD s data center s suitability as the County s primary data center. In addition, we examined whether intrusion and detection systems were in place and functioning as intended. Summary of Findings/Recommendations Countywide Disaster Recovery Standards According to the Chief Administrative Officer s (CAO) Office of Emergency Management, departments are responsible for developing their own disaster recovery policies. Countywide system recovery priorities do not exist to assist departments in coordinating their disaster recovery plans. As a result, departments will need to find alternative methods of handling their tasks, which may result in a disruption of delivering critical services. Citing the difficulties of ranking their customers systems, ISD has not taken the lead to develop Countywide system recovery priorities. In addition, ISD does not maintain all County systems. Departments such as Public Social Services (DPSS), Health Services (DHS), and Sheriff are responsible for maintaining most of their own systems. The Chief Information Officer (CIO) is responsible for recommending adoption of standards for Countywide information technology subject to the approval of the Board of Supervisors. Accordingly, we have recommended that the Board of Supervisors direct the CIO to establish a task force comprised of the CAO, ISD and other affected County departments to develop Countywide Disaster Recovery Plan Standards that incorporate those components of a Business Continuity Plan that relate to data processing and telecommunications. Once these Standards have been developed and approved by the Board of Supervisors, the CIO, CAO and ISD should ensure each County department develops and maintains an internal plan for compliance with those Standards. Countywide Business Impact Analysis The Disaster Recovery Plan should not only emphasize the resumption of information systems, but also focus on the uninterrupted maintenance of critical business processes (business continuity). The first step in enabling management to move from a position of data processing recovery to business continuity is a business impact analysis (BIA). The BIA should identify those systems that, if rendered inoperable, would inhibit the County s ability to deliver mission critical services and ensure those systems are prioritized logically. Therefore, system recovery priorities should coincide with the types of services that the County considers the most important, such as public safety and health care. A Countywide BIA does not exist to guide the County. The BIA is needed to identify the key business processes, the priorities assigned to the processes, and the quantified impact of business disruptions so that resources can be devoted to recovering the most important systems.
3 Board of Supervisors June 6, 2002 Page 3 A BIA will have a higher probability of success if the Board of Supervisors instructs the CIO, CAO, ISD and other affected County departments to be involved in its development. Accordingly, we have recommended that the Board of Supervisors instruct the Disaster Recovery Standards Task Force recommended above to develop a Countywide BIA that addresses disaster recovery issues and specific recovery priorities for all departments. ISD s Disaster Recovery Plan Our review disclosed that ISD s Disaster Recovery Plan is not comprehensive and either does not address, or does not adequately address, several key areas. The following are areas where ISD needs to make improvements in the Plan to ensure the County can adequately recover from a disaster: Business Impact Analysis (BIA) - ISD and user departments have not identified critical systems, processes and functions; assessed the economic impact of incidents and disasters; or estimated the length of time business units can survive without access to their systems, services and facilities. Critical Systems - ISD and user departments have not identified and ranked critical systems from highest to lowest priority, including required recovery times. Alternate Data Storage Sites - 20% of ISD s IBM application programs and data are not maintained at an off-site location. Telecommunication Requirements - ISD s Disaster Recovery Plan does not include a discussion of telecommunication network recovery requirements, including telephone voice circuits, wide area networks, and local area networks. Communication Bandwidth Requirements - ISD has not estimated the total bandwidth required to communicate with the hot-site(s) during disaster recovery operations. Critical Systems Tests - Although critical Unisys systems have been fully tested and recovered at the remote hot-site, many critical IBM systems have not. Disaster Recovery Plan Updates Although system recovery procedures are updated regularly, ISD s Disaster Recovery Plan is not reviewed and updated on a periodic basis to reflect changing requirements. Emergency Output Services Supplies - ISD and user departments do not have sufficient emergency blank warrant stock on-hand for continuing business activity during a disaster that lasts for an extended period. In
4 Board of Supervisors June 6, 2002 Page 4 addition, ISD has not developed and included contingency plans for its computer output operations in the Disaster Recovery Plan. Any prolonged interruptions or failure to provide computer output services to user Departments could severely impact the County s operations. We also noted that ISD has relied on disaster recovery coordinators with technical knowledge to coordinate the mainframe and telecommunications disaster recovery. However, no other staff have been trained to replace these individuals in the event they are unavailable. ISD recognizes that the current Disaster Recovery Plan is not sufficient to ensure County operations can recover efficiently and effectively in the event of a disaster. As an alternative, ISD relies on test scripts, schedules, diagrams, memos and reports maintained by several individuals. Although these documents are usable to some extent, this collection of critical documents would be difficult to use during a disaster. In addition, they are difficult to update and use for training purposes. We have recommended that a new Disaster Recovery Plan be developed that incorporates existing documents as well as documentation that explains what ISD s recovery priorities are and the methodology and staffing to be used. The Plan should conform to the Countywide Disaster Recovery Standards once they are developed as recommended in this report. ISD s Plan should include ISD s mainframe and midrange systems, network infrastructure system, telecommunications and output services. In addition, ISD should ensure the Disaster Recovery Plan designates trained backup personnel for the disaster recovery coordinators. The Disaster Recovery Plan should also be reviewed and updated quarterly, or as major changes occur, to ensure that it is current and complete. Additional Issues We have also recommended that ISD investigate the feasibility of using data mirroring to backup IBM systems and programs. Data mirroring is a technique that allows data to be copied from one location to a remote storage device in real time. In the event of a disaster, use of data mirroring can significantly reduce recovery time of critical data from days to hours. In addition, we noted that the CAO, ISD and the Department of Public Works (DPW) are currently in the process of planning a new data center and estimate it will take three to five years to complete. In the interim, ISD has taken measures to upgrade their current data center by implementing the recommendations from the COMDISCO Report that are cost beneficial. These and other findings and recommendations are discussed in detail in the attached report.
5 Board of Supervisors June 6, 2002 Page 5 Review of Report We discussed the results of our review with ISD and CIO management. Their written responses (attached) indicate general agreement with our recommendations and intent to pursue their implementation. The CIO has indicated that the duties of the Disaster Recovery Standards Task Force should include Business Continuity Planning Standards for all operations not just data processing and telecommunications. We agree and have already begun an assessment of the Auditor-Controller s ability to continue all operations in the event of a disaster. We thank ISD and CIO management and staff for their cooperation and assistance during our review. If you have any questions, please contact me or your staff may contact DeWitt Roberts at (213) , or Ian Clark at (213) JTM: PTM: DR Attachment c: David E. Janssen, Chief Administrative Officer Joan Ouderkirk, Director, Internal Services Department Jon W. Fullinwider, Chief Information Officer Violet Varona-Lukens, Executive Officer Public Information Office Audit Committee
6 Internal Services Department Disaster Recovery Plan Review Comments and Recommendations Background The Internal Services Department s (ISD) Information Technology Services (ITS) Branch operates one of the largest data centers in the western United States. Over 3.9 million transactions are processed each day through more than 25,000 terminals linked by an extensive communications network. ITS utilizes a wide variety of hardware and software, including IBM and Unisys mainframes, midrange computers, and various personal computers and workstations to support the County s computing needs. In addition, ITS implements new technologies such as Internet access, electronic mail ( ), distributed computing, and optical storage. ITS provides County departments with essential information technology and communication services that are critical to the County s mission of serving the public. ITS supports diverse systems such as the Countywide Timekeeping and Payroll/Personnel System (CWTAPPS), the Adult Probation System, and other systems providing critical information for the Department of Health Services (DHS), the District Attorney s Office, the Assessor, etc. ISD also provides user departments access to the Internet, , and midrange systems. Certain systems, such as the California Law Enforcement Telecommunications System, and Automated Justice Information System, as well as others, are considered critical to County operations. If a disaster disables ISD s data center, the operation of these systems would have to be recovered within a relatively short period of time to ensure restoration of essential County services. Scope We performed a review of ISD s Disaster Recovery Plan for its mainframe and network computer operations. Our review focused on evaluating whether the Disaster Recovery Plan is comprehensive enough to ensure that business interruptions can be minimized in the event of a disaster by restoring critical systems and files, computer output services and telecommunications. Disasters that could disable computing operations include events such as earthquakes, power outages, vandalism, fires, sabotage and hackers. In addition, we reviewed the Disaster Recovery Plan to ensure it contained those components of an effective Business Continuity Plan that relate to data processing and telecommunications. The essential components of a Disaster Recovery Plan include: Identifying key decision-making personnel and maintaining their telephone numbers and addresses. Maintaining required materials for continuing normal business activities.
7 Disaster Recovery Plan Review Page 2 Organizing Teams for Emergency Action, Damage Assessment, Emergency Management, Security, Emergency Operations, Network Recovery, and User Hardware. Preparing a Business Impact Analysis (BIA) that will identify critical business functions and ranking those systems in order of importance. Identifying critical recovery time in which business processing must be resumed. Acquiring and maintaining an off-site storage facility for backup media required for the recovery process. Selecting alternate computer hardware and software sites, including a hot-site that is fully configured and ready to operate in a few hours. Ensuring adequate telecommunications exists, including telephone voice circuits, wide area networks and local area networks. Annual testing and maintenance of the Disaster Recovery Plan, which includes determining how well the Disaster Recovery Plan works or which portions of the Disaster Recovery Plan need improvement. A listing summarizing ISD s compliance with the components of an effective Disaster Recovery Plan is included in Attachment A and is more fully discussed in the body of this report. We also followed up on recommendations contained in ISD s 1999 COMDISCO Report. ISD contracted with COMDISCO, an outside consultant, to conduct an assessment of ISD s data center s suitability as the County s primary data center. In addition, we examined whether intrusion and detection systems were in place and functioning as intended. Our detailed findings and recommendations are discussed below. Development of Countywide Disaster Recovery Standards In 1999, the Board of Supervisors (Board) instructed ISD, the Chief Administrative Office (CAO) and the Chief Information Office (CIO) to acquire the services of a consultant to review and update ISD s Disaster Recovery Plan for both the IBM and Unisys systems and develop a proposal for a Countywide Disaster Recovery Plan. The purpose of creating a Countywide Disaster Recovery Plan was to develop a comprehensive Disaster Recovery Plan that encompassed localized and regional disaster, critical end-user access, critical system processing, and recovery priorities. Our review disclosed that the Disaster Recovery Plan is not comprehensive and either does not address or does not adequately address several key areas as discussed in detail later in this report. According to the CAO s Office of Emergency Management,
8 Disaster Recovery Plan Review Page 3 departments are responsible for developing their own disaster recovery policies. Countywide system recovery priorities do not exist to assist departments in coordinating their disaster recovery plans. As a result, departments will need to find alternative methods of handling their tasks, which may result in a disruption of delivering critical services. Citing the difficulties of ranking their customers systems, ISD has not taken the lead to develop Countywide system recovery priorities. In addition, ISD does not maintain all County systems. Departments such as Public Social Services (DPSS), DHS, and the Sheriff are responsible for maintaining most of their own systems. The CIO is responsible for recommending adoption of standards for Countywide information technology subject to the approval of the Board of Supervisors. Accordingly, the Board of Supervisors should direct the CIO to establish a task force comprised of the CAO, ISD and other affected departments to develop Countywide Disaster Recovery Plan Standards that incorporates those components of an effective Business Continuity Plan that relate to data processing and telecommunications. Once these Standards have been developed and approved by the Board of Supervisors, the CIO, CAO and ISD should ensure each County department develops and maintains an internal plan for compliance with those Standards. Recommendations 1. Board of Supervisors direct the CIO to establish a task force comprised of the CAO, ISD, and other affected departments to develop Countywide Disaster Recovery Plan Standards that incorporate those components of an effective Business Continuity Plan that relate to data processing and telecommunications. 2. The CIO, CAO and ISD ensure each County department develops and maintains an internal plan for compliance with those Standards once these Countywide Disaster Recover Plan Standards are developed and approved. Business Impact Analysis The Disaster Recovery Plan should not only emphasize the resumption of information systems, but also focus on the uninterrupted maintenance of critical business processes (business continuity). The first step in enabling management to move from a position of data processing recovery to business continuity is a business impact analysis (BIA). The BIA should identify those systems that, if rendered inoperable, would inhibit the County s ability to deliver mission critical services and ensure those systems are prioritized logically. Therefore, system recovery priorities should coincide with the types of services that the County considers the most important, such as public safety and health care. A Countywide BIA does not exist to guide the County. The BIA is needed to identify the key business processes, the priorities assigned to the processes, and the quantified
9 Disaster Recovery Plan Review Page 4 impact of business disruptions so that resources can be devoted to recovering the most important systems. A BIA will have a higher probability of success if the Board of Supervisors instructs the CIO, the CAO, and ISD and other affected County departments to be involved in its development. The Board of Supervisors should instruct the Disaster Recovery Standards Task Force recommended above to develop a Countywide BIA that addresses disaster recovery issues and specific recovery priorities for all departments. Recommendation 3. Board of Supervisors instruct the Disaster Recovery Standards Task Force recommended above to develop a Countywide BIA that addresses disaster recovery issues and specific recovery priorities for all departments. ISD s Disaster Recovery Plan As previously stated, we reviewed ISD s Disaster Recovery Plan for its mainframe and network computer operations. Our review focused on evaluating whether the Disaster Recovery Plan is comprehensive enough to ensure that business interruptions can be minimized in the event of a disaster by restoring critical systems and files, computer output services and telecommunications. Our review disclosed that the Disaster Recovery Plan is not comprehensive and either does not address or does not adequately address several key areas. The following are areas where improvements are needed to ensure the County can adequately recover from a disaster: Business Impact Analysis - ISD and user departments have not identified critical systems, processes and functions; assessed the economic impact of incidents and disasters; or estimated the length of time business units can survive without access to their systems, services and facilities. Critical Systems - ISD and user departments have not identified and ranked critical systems from highest to lowest priority, including required recovery times. Alternate Data Storage Sites - 20% of ISD s IBM application programs and data are not maintained at an off-site location. Telecommunication Requirements - ISD s Disaster Recovery Plan does not contain a discussion of telecommunication network recovery requirements, including telephone voice circuits, wide area networks, and local area networks. Communication Bandwidth Requirements - ISD has not estimated the total bandwidth required to communicate with the hot-site(s) during disaster recovery operations.
10 Disaster Recovery Plan Review Page 5 Critical Systems Testing - Although critical Unisys systems have been fully tested and recovered at the remote hot-site, many critical IBM systems have not. Disaster Recovery Plan Updates - Although system recovery procedures are updated regularly, ISD s Disaster Recovery Plan is not reviewed and updated on a periodic basis to reflect changing requirements. Emergency Output Services and Supplies - ISD and user departments do not have sufficient emergency blank warrant stock on-hand for continuing business activity during a disaster that lasts for an extended period of time. In addition, ISD has not developed and included contingency plans for its computer output operations in their Disaster Recovery Plan. Any prolonged interruptions or failure to provide computer output services to user Departments could severely impact the County s overall business. We also noted that the Disaster Recovery Plan states that the Disaster Recovery Plan should be reviewed and updated at least quarterly, or as major changes occur. However, the appendices to the Plan include Emergency Action Team lists that have not been updated to reflect changes in the staff assignments and contact numbers. For example, we noted one individual who was designated as a team leader had not received any training and was unaware of his assignment. We also noted ISD has relied on disaster recovery coordinators with technical knowledge to coordinate the mainframe and telecommunications disaster recovery. However, there are no other staff trained to replace these individuals in the event they are unavailable. ISD recognizes that the current Disaster Recovery Plan is not sufficient to ensure County operations can recover in the event of a disaster. As an alternative to the Disaster Recovery Plan, ISD relies on test scripts, schedules, diagrams, memos and reports maintained by several individuals. Although these documents are usable to some extent, this collection of critical documents would be difficult to use during a disaster. Also, they are difficult to update and use for training purposes. Therefore, a new Disaster Recovery Plan should be developed that incorporates these existing documents as well as documentation that explains what ISD s recovery priorities are and the methodology and staffing to be used. The plan should include ISD s mainframe and midrange systems, network infrastructure system, telecommunications and output services. In addition, ISD should ensure the Disaster Recovery Plan includes designated backup personnel for the disaster recovery coordinators. The Disaster Recovery Plan should be reviewed and updated quarterly, or as major changes occur, to ensure that it is current and complete. Also, ISD management should provide training for Emergency Action Teams to reinforce staff assignments and the actions to be taken by Team members.
11 Disaster Recovery Plan Review Page 6 Recommendations 4. ISD management develop a formal comprehensive Disaster Recovery Plan that addresses the problem areas discussed in this report. 5. ISD management review and update the Disaster Recovery Plan quarterly, or as major changes occur. 6. ISD management ensure the Disaster Recovery Plan includes designated backup personnel for the disaster recovery coordinators. 7. ISD management provide training for Emergency Action Teams to reinforce staff assignments and the actions to be taken by Team members. Hot-site Testing ISD has agreements with two vendors, COMDISCO and Sungard, to provide disaster recovery services for its IBM and Unisys based systems with separate hot-sites located in two areas outside of the State. A hot-site is a primary, fully operational, data processing facility, containing an installed computer equipment configuration that meets the user s specifications. Hot-site agreements stipulate that fully operational data processing facilities will be immediately available for use in the event of a disaster. The agreements also provide a certain number of hours allowed for testing the capabilities of the hot-sites. At the time of ISD s evaluation for disaster recovery services, the following three vendors were considered: IBM, COMDISCO, and Sungard. Of the three, Sungard was the only vendor that could support both the IBM and Unisys platforms. However, ISD management indicated that Sungard s proposal to provide for IBM platform recovery was too costly. Therefore, ISD contracted with COMDISCO for the IBM platform recovery and Sungard for the Unisys platform recovery. These two vendors have subsequently merged into one company, Sungard. However, the hot-sites have not been merged. At the time of the evaluation, ISD considered contracting disaster recovery services from a single vendor. Contracting with a single vendor for disaster recovery services offers several advantages. For example, the hot-site testing could be performed at one location rather than two, which would result in the simplification of disaster recovery efforts. Other advantages include establishing communication links and simplification of overall disaster recovery coordination. Now that ISD managers have had an opportunity to work with two separate locations, the advantages of a single location have become more apparent. Due to the advantages of a single location, ISD management should pursue with Sungard consolidating their two hot-site locations to one locality.
12 Disaster Recovery Plan Review Page 7 Recommendation 8. ISD management pursue with Sungard consolidating their two hotsite locations to one locality. Disaster Recovery Plan Testing Disaster Recovery Plan testing provides important benefits. It assists in determining if the Disaster Recovery Plan is accurate and provides reassurance that operations will continue in the event of a disaster. It also discloses weaknesses in the Disaster Recovery Plan such as the lack of availability of data and programs necessary for recovery, limitations of the computing capabilities and capacity at the hot-sites, inadequate recovery planning, and lack of awareness of the individual responsibilities of recovery staff. A good Disaster Recovery Plan requires at least annual testing. ISD has regularly tested the capabilities of the Unisys hot-site for the last six years and believes that the majority of the Unisys systems would be recovered in the event that a disaster occurs. In March 2001, we observed ISD s and the Child Support Services Department s (CSSD) test of its primary computer system, the Automated Child Support Enforcement Replacement System (ARS), which accounts for 90% of the Unisys workload. The test successfully allowed CSSD to reroute their processing and communications to the hot-site. We did note that ISD and CSSD conducted disaster recovery tests from each Department s regular workstations using documentation normally available to them. To provide a better simulation of an actual disaster and the eventual restart and recovery of the critical systems, ISD should conduct unannounced offsite testing using documentation, files and programs that are only available at the offsite locations. Recommendation 9. ISD management conduct unannounced offsite testing using documentation, files and programs that are only available at the offsite locations. Because the Unisys environment is comprised of only a few systems, it is easier to perform regular disaster recovery tests. The IBM environment is comprised of over 200 systems, making it much more difficult for ISD to perform tests on all systems in this environment. ISD has only tested three (less than 2%) IBM based systems in the last four years, for functional hot-site recovery. The selection of these systems was not based on a formally defined testing schedule. For example, the Department of Mental Health s Management Information System (MHMIS) was tested as a result of an Auditor-Controller (A-C) audit report recommendation. The other two systems, the A- C s Countywide Payroll System and the Countywide Timekeeping and Payroll/Personnel System were tested as part of the pilot to determine if ISD could recover a Countywide system.
13 Disaster Recovery Plan Review Page 8 Unless a test schedule is developed, the same three Unisys systems may continue to be tested each year. Since it would not be practical to test the recovery capabilities of every system because testing at the hot-sites is contractually limited, ISD management should work with the user departments to develop a formal hot-site testing schedule for high priority Unisys and IBM systems using the BIA (See Recommendation 3). Recommendation 10. ISD management work with the user departments to develop a formal hot-site testing schedule for high priority Unisys and IBM systems using the BIA (See Recommendation 3). Data Mirroring According to ISD, because the County s IBM environment is comprised of many smaller systems from several departments, it could not ensure that all system information is being captured and sent off-site to storage or that all critical data could be recovered timely in the event of a disaster. The current data restoration process takes several days to complete. ISD does not currently use data mirroring, a technique that allows data to be copied from one location to a remote storage device in real time. In the event of a disaster, use of data mirroring can significantly reduce recovery time of critical data. According to ISD, data mirroring would allow a complete backup of all IBM applications and reduce the recovery time from days to hours. ISD management should determine the feasibility of using data mirroring on IBM applications to significantly reduce data recovery time. Recommendation 11. ISD management determine the feasibility of using data mirroring on IBM applications to significantly reduce data recovery time. Computer Output Services ISD provides computer output services for 43 County departments. Computer output services include laser printing, microfiche, impact printing, and xerography. ISD is responsible for the production and delivery of outputs such as payroll and welfare warrants, tax bills, property assessments and various reports vital to the day-to-day operations of several County departments. Any prolonged interruptions or failure to provide computer output services to these departments could severely impact the County s overall business. The County s reliance on continuous output services requires that ISD have contingency plans in place to restore these services in the event of a disaster. Our review disclosed that ISD has not developed and included contingency plans for its computer output operations in the Department s Disaster Recovery Plan. ISD management indicated that because the data center s output configuration is highly customized and uses various data streams, implementing a backup output capability
14 Disaster Recovery Plan Review Page 9 has been extremely difficult. Previously, ISD contracted their disaster recovery for output services to three vendors that resulted in only 40% coverage of its total workload. Currently, ISD does not have a contract with any vendor that would provide output services in the event a disaster. Although ISD is in the process of reducing the risk of losing output capability by using high-speed laser printers in place of slower impact printers, streamlining data traffic, and using more network printers, completion of these projects is not expected for another five years. The risk of not completing these projects earlier adversely affects the County s ability to restore services if a disaster were to occur. Therefore, ISD management should place a higher priority in replacing impact printers with laser printers, streamlining data traffic and using more network printers. ISD management needs to ensure that computer output recovery operations are developed and coincide with the system recovery priorities and include them in the Disaster Recovery Plan. It should be noted that not all systems would be recovered in an event of a disaster. As a result, County departments will need to find alternative methods of handling their tasks, which may result in a disruption of delivering critical services. Therefore, ISD management should work closely with user departments to develop contingency plans including evaluation/feasibility of user departments using alternative methods to handle tasks if critical automated output services are inoperable for a significant period of time. Recommendations 12. ISD management place a higher priority in replacing impact printers with laser printers, streamlining data traffic and using more network printers. 13. ISD management ensure that computer output recovery operations are developed and coincide with the system recovery priorities and include them in the Disaster Recovery Plan. 14. ISD management work closely with user departments to develop contingency plans including evaluation/feasibility of user departments using alternative methods to handle tasks if critical automated output services are inoperable for a significant period of time. Telecommunications Recovery ISD s Telecommunications Branch is responsible for ensuring that County departments can maintain communication with each other, other governmental agencies, and the public. Its primary responsibility is for the continued operation and maintenance of the LAinternet (LAnet). LAnet is the County s wide area network and is connected by routers used for the transmission of data, voice and images. A router is an intelligent device that manages the flow of data between networks.
15 Disaster Recovery Plan Review Page 10 Our review disclosed that ISD only has two router locations within the County and does not have additional (backup) routers that can connect to the COMDISCO and Sungard hot-sites. The absence of additional router locations increases the vulnerability that a single event would disrupt telecommunication services for all or a major portion of ISD s customers. ISD acknowledged that, if these two locations were rendered inoperable, the County s networks would be disabled and the connection to the hot-sites would be lost. If ISD s data processing center is disabled, ISD intends to connect to the hot-sites through a primary LAnet router located outside the data center. Consequently, all of ISD s hot-site testing has been conducted with the assumption that this location will remain operable. However, damage can range from localized/minor to widespread, including disabling of the primary router location. Because of the importance of this site, alternative locations should be identified and tested to eliminate potential single points of failure. To better prepare for a disaster, ISD management should ensure the Disaster Recovery Plan includes additional router locations other than the primary LAnet router sites and determine how to connect them to the hot-site(s). Also, ISD management should conduct hot-site testing of the additional router locations to verify that they are viable and include them with the regularly scheduled testing. Recommendations 15. ISD management ensure the Disaster Recovery Plan includes additional router locations other than the primary LAnet router sites and determine how to connect them to the hot-site(s). 16. ISD management conduct hot-site testing of the additional router locations to verify that they are viable and include them with the regularly scheduled testing. In the event of a disaster, ISD intends to use dedicated telecommunication lines to handle the current data center workload capacity. However, the number of lines planned may not be sufficient to handle current workload. ISD indicated that there have been discussions regarding bandwidth (workload capacity), including requesting additional telecommunication lines or expanding bandwidth, but they have not developed a formal Disaster Recovery Plan to determine what is required to handle the current workload. ISD management should conduct an analysis to determine the bandwidth required of the telecommunication lines needed for disaster recovery purposes and include it in the Disaster Recovery Plan. In addition, ISD s disaster recovery service contracts with COMDISCO and Sungard do not contain provisions for additional lines to be made available. Also, there are no provisions in the contracts stating how quickly additional lines should be made available or any indication that the vendor would be able to make them available. Staff involved with testing indicated that acquiring additional lines would take weeks or even months in
16 Disaster Recovery Plan Review Page 11 normal situations and would likely take longer following a disaster. It is uncertain whether user departments are aware of these bandwidth issues. Modifying the existing agreements with the vendors to increase the number of telecommunication lines in the event of a disaster would allow ISD to quickly increase bandwidth. ISD management should modify the disaster recovery services contracts with COMDISCO and Sungard to include emergency or contingency provisions for adding additional telecommunication lines. Recommendations 17. ISD management conduct an analysis to determine the bandwidth required of the telecommunication lines needed for disaster recovery purposes and include it in the Disaster Recovery Plan. 18. ISD management modify the disaster recovery services contracts with COMDISCO and Sungard to include emergency or contingency provisions for adding additional telecommunication lines. Network Infrastructure System The Network Infrastructure System (NIS) is a system that supports networked computers, routers, switches and firewalls located at ISD s data center. The NIS is used as the gateway to establish a connection for users to interface with ISD s data center computing resources. County departments and vendor personnel are connected through the NIS to access Internet and services as well as applications running on the IBM and Unisys mainframes and midrange computers. Our discussions with ISD s Technology Division disclosed that for other than mainframe connectivity for County departments, the NIS is not included in ISD s Disaster Recovery Plan. Also, their agreements with Sungard and IBM do not provide a backup for the NIS. An interruption in the NIS would disable all communication capabilities to the mainframe computers for external vendors such as Affiliated Computer Systems (ACS), which provides updates to other systems for welfare payment services. It would also eliminate access to midrange computers for County departments such as the Sheriff, as well as and Internet services for County users. ISD management should determine if the individual components of the NIS could be recovered independently. This would allow connectivity to services available through the NIS to be reestablished on a priority basis. Since the NIS is necessary for users to access vital applications, ISD management should ensure that all components of the NIS are included in the Disaster Recovery Plan. Also, ISD management should determine the methodology required to recover the NIS components on a priority basis in the Disaster Recovery Plan.
17 Disaster Recovery Plan Review Page 12 Recommendations 19. ISD management determine if the individual components of the NIS could be recovered independently. 20. ISD management ensure that all components of the NIS are included in the Disaster Recovery Plan. 21. ISD management determine the methodology required to recover the NIS components on a priority basis in the Disaster Recovery Plan. Midrange Computers ISD s midrange computing resources consist of over 150 Windows NT, Internet and servers that run the Department s mission critical systems (e.g., Marshall Automated Information System) from the data center. Our review disclosed that midrange computers are not included in ISD s Disaster Recovery Plan. In addition, ISD does not have written agreements with any vendors to provide disaster recovery services, including hot-site agreements, for its midrange computers. In addition, there are no other contingencies for restoring the midrange computing resources if a disaster occurs. ISD management indicated that although data is stored offsite, they do not have a formal Disaster Recovery Plan or agreement to obtain the hardware necessary to recover data in the event of a disaster. ISD management should investigate the feasibility of obtaining an agreement with a vendor to provide hardware in the event of a disaster or determine if data should be mirrored to hardware placed at a location outside the data center. Recommendation 22. ISD management investigate the feasibility of obtaining an agreement with a vendor to provide hardware in the event of a disaster or determine if data should be mirrored to hardware placed at a location outside the data center. COMDISCO Study Driven by concerns about the viability of the ISD s data center, the Board of Supervisors approved the CAO s Asset Management Plan in November of The Asset Management Plan stated that all County data centers would be studied to determine the feasibility of consolidating them into one data center maintained by ISD. In addition, ISD s current data center was examined to determine if it was suitable for use as the County s primary data center. COMDISCO was the vendor retained to perform the feasibility study. Their report concluded that ISD s data center is not suitable for use as the County s primary data center, and does not meet the requirements of an essential facility. An essential facility, as defined by the Uniform Building Code, is one that can resist a lateral force that is 50% greater than that required of a regular office building. It also must be
18 Disaster Recovery Plan Review Page 13 provisioned to withstand the loss of utility power by employing a dual input power solution, dual generators and dual uninterruptible power supplies. The report indicates the existing data center s support structure would likely fail in the event of an earthquake, causing the facility to pancake onto the first floor, collapsing the data center and its contents. According to the feasibility study, it would be more cost effective to build a new data center rather than renovate the current data center to meet standards of an essential facility. The COMDISCO Report includes a total of 54 recommendations that identified deficiencies that warranted immediate attention. ISD reported the following recommendation status: Implemented 15 (28%), In Process 12 (22%), and No Action 27 (50%). The CAO, ISD and DPW are currently in the process of planning a new data center and estimate it will take three to five years to obtain a completed facility. In the interim, we noted ISD has taken measures to upgrade their current data center facility with those recommendations from the COMDISCO Report that are cost beneficial Recommendation Power Outages None. Additional Issues As a result of recent power outages, ISD management identified single points of failure in the power generators, uninterruptible power supply (UPS), and distribution systems. These single points of failure could cause an interruption of critical business processes. Therefore, ISD Management should conduct a cost benefit analysis to determine the feasibility of eliminating the single points of failure in the power generators, UPS, and distribution systems at its existing data center. Recommendation 23. ISD management conduct a cost benefit analysis to determine the feasibility of eliminating the single points of failure in the power generators, UPS, and distribution systems at its existing data center. Intrusion and Detection Computer hacking, virus infections and vandalism are a constant concern for the County. These incidents can result in disclosure, corruption and/or destruction of County data. Even if data are not destroyed, access to it may be denied for hours or days, impacting vital County processes. In 1999, the Los Angeles Municipal Court website was vandalized. The website was defaced and although there were no serious business disruptions reported, the incident served as an indication of the County s vulnerability to computer hacking. The risk of similar occurrences is rising due to the County s increased dependence on the Internet. There is growing concern about privacy and the protection of County information
19 Disaster Recovery Plan Review Page 14 transmitted over the Internet or maintained in databases. Consequently, intrusion detection (ID) systems are important to alert management to computer hacking. An ID system is a type of security management system that gathers and analyzes information from various areas within a computer or a network to identify possible security breaches. According to ITS Data Security, an ID system is currently not utilized in the security infrastructure. ISD primarily relies on software and passwords to protect access to mainframe computing resources. ISD management understands the importance and need for ID systems, but cites competing priorities, cost, lack of knowledge and dedicated resources as reasons that prevent the implementation of an ID system. Without an ID system, active monitoring and analyzing of both user and system activities cannot be performed and ISD is not able to detect security breaches that might be occurring. Therefore, ISD management should evaluate the feasibility of acquiring an intrusion detection system to integrate with the existing security infrastructure. Recommendation 24. ISD management evaluate the feasibility of acquiring an intrusion detection system to integrate with the existing security infrastructure.
20 Attachment A Components of an Effective Disaster Recovery Plan Included in ISD s DRP A.) Key Decision-Making Personnel Telephone directory of key decision-making personnel to be notified in the event of a disaster. Does the directory include:! Primary and emergency telephone numbers and addresses for each contact person.! Phone numbers & addresses for: Representatives of equipment & software vendors Contact persons at recovery facilities including hot-site reps Contact persons at off-site media storage facilities and the contact persons within the company who are authorized to retrieve media from off-site facility B.) Required Supplies All supplies required for continuing normal business activities should be maintained, including 1) a detailed up-to-date hardcopy procedure that can be easily followed by contract personnel who are unfamiliar with standard operations. 2) a supply of special forms such as check stock, invoice forms order forms, etc. C) Planning & Reconstruction Methodologies 1. Reconstruction A. Organization & Assignment of Responsibilities should exist which include decision-making IS & user personnel. These individuals lead teams that respond to critical functions or tasks defined in the plan. B. Emergency Action (First Response) Team ensures orderly evacuation of personnel and securing human life. C. Damage Assessment Team assesses the extent of the damage following the disaster. Yes No Yes Page 1 of 5
21 Attachment A Components of an Effective Disaster Recovery Plan Included in ISD s DRP Planning and Reconstruction (continued) D. Emergency Management Team coordinates the activities of all recovery teams & handles key decision-making. This team is the overseer and coordinates the following activities:! Retrieving critical data from off-site storage! Installing & testing systems software and applications at the hotsite! Identifying, purchasing and installing hardware at the system recovery site! Operating from the system recovery site! Rerouting network communications traffic! Reestablishing the user/system network! Transporting users to the recovery facility! Reconstructing databases! Coordinating systems use and work schedules E. Security Team assesses the systems security and communications links. F. Emergency Operations Team iindividuals oversee operations at the hot-site. G. Network Recovery Team is responsible for rerouting wide area voice and data communications traffic & reestablishing host network control and access at the recovery site. H. User Hardware Team locates and coordinates the delivery and installation of user terminals, printers, photocopiers & other necessary equipment. D) Risk Evaluation 1. Risk Ranking List of critical applications ranking from highest to lowest priority, required recovery times. The identification of critical systems usually results from a formal exercise in risk analysis coordinated by both information systems processing and end user personnel. Typical rankings are: Critical - These functions cannot be performed unless they are replaced by identical capabilities. Tolerance to interruption is very low, cost of interruption is very high. Vital - These functions can be performed manually, at tolerable costs. Sensitive - These functions can be performed manually, at tolerable costs, for an extended period of time with use of additional Page 2 of 5 Yes No
22 Attachment A Components of an Effective Disaster Recovery Plan Risk Evaluation (continued) staff to perform processes. Non-Critical - These functions can be interrupted for an extended period of time, at little or no cost and require no catching up when restored. 2. Business Impact Assessment (BIA) A BIA of all business units that are part of the business environment enables the team to: identify critical systems, processes and functions; assess the economic impact of incidents and disasters that result in a denial of access to systems and other services and facilities; and assess the pain threshold, that is, the length of time business units can survive without access to the systems, services, and facilities. The BIA is a proven method of determining the cost of risk. It can assist in developing a disaster recovery and business continuity planning process in an expeditious and cost-effective manner. Included in ISD s DRP No No E) Critical Recovery Time Period What is that window of time which business processing must be resumed before suffering significant or unrecoverable losses?! Applications to Recover in Critical Time Period! User and Data processing interrelationships! Processing Priorities F) Off-Site Facilities!! Security & Control of Off-site facilities Facility needs to be safely secure Media & Documentation Backup Periodic Backup Procedures should exist Frequency Rotation to ensure all data is captured Operation Procedures like operating system manuals System & Program Documentation A copy of the current Disaster Recovery Plan Record keeping of off-site storage G) Alternate Computer Hardware and Software Requirements! Hot-sites- fully configured and ready to go in a few hours. Contract provisions should include: Hardware Configurations Speed of Availability No Yes Yes Page 3 of 5
23 Attachment A Components of an Effective Disaster Recovery Plan Alternate Hardware and Software Requirements (continued) Usage Period Communications adequate Testing rights included Reliability of vendor & sites offered Duplicate Information Processing Facility These are dedicated, self-developed recovery sites that can backup critical applications. H) Telecommunications Network The Disaster Recovery Plan should include a telecommunications component. There should be adequate capabilities to maintain critical business processes. Telecommunications include telephone voice circuits, wide area networks and local area networks. Telecommunication continuity should include:! Redundancy - which involves providing a second cable/connection, through an alternate route, for use in the event the primary event is damaged.! Alternative Routing- is the method of routing info via an alternate medium such as copper cable or fiber optics in different networks, circuits or end points should the normal network be unavailable. Other examples include use of microwave communication.! Count- The number of records that were carried to the backup site versus the number required. Also, ensure the number of critical systems that were successfully recovered can be measured.! Accuracy- Compare accuracy of output results with those for the same period processed under normal conditions. I) Business Continuity Testing Although full-scale testing may not be feasible, there should be partial testing to determine how well the plan works or which portions of the plan need improvement. 1. Specifications Tests should include:! Key recovery team members! Include critical components! Simulate actual prime-time processing conditions! Verify the completeness and precision of the Disaster Recovery Plan information! Evaluate the performance of the personnel involved in the exercise! Evaluate the coordination between the business continuity team and external vendors! Measure the ability and capacity of the backup site to perform Included in ISD s DRP Yes No Yes Yes No No Yes for Unisys No for IBM Page 4 of 5
24 Attachment A Components of an Effective Disaster Recovery Plan Business Continuity Testing (continued) prescribed processing! Measurement of the overall performance of operational and information systems processing activities related to maintaining the business entity 2. Test Execution- The testing should include the following test phases:! Pretest- Identify the set of actions necessary to see the stage of the actual test.! Test- this is the actual test of preparedness to respond to an emergency. Operational activities are executed to test the specific objectives of the Disaster Recovery Plan.! Post-Test- Formal evaluation of the plan & implementing indicated improvements. 3. Documentation of Results- Every phase of the test should include detained documentation of observations, problems & resolutions. 4. Results Analysis- There should be ways to measure the success of the plan and test against the stated objectives. The results should include:! Time elapsed for completion of prescribed tasks! Amount of work performed at the backup facility by clerical staff and information systems processing operations.! Count- The number of records that were carried to the backup site versus the number required. Also, ensure the number of critical systems that were successfully recovered can be measured. J) Disaster Recovery Plan Maintenance Plans and strategies should be reviewed and updated on a scheduled basis to reflect continuing recognition of changing requirements. A Disaster Recovery Plan coordinator should maintain the Disaster Recovery Plan. The coordinator s responsibilities should include:! Development of a schedule for periodic review and maintenance of the plan advising all personnel of their roles and deadlines for receiving changes! Arrange and coordinate scheduled and unscheduled tests for the Disaster Recovery Plan to evaluate its adequacy! Participate in the scheduled plan tests performed at least once per year on specific dates Included in ISD s DRP Yes for Unisys No for IBM No Page 5 of 5
25
26
27
28
IT Service Management
IT Service Management Service Continuity Methods (Disaster Recovery Planning) White Paper Prepared by: Rick Leopoldi May 25, 2002 Copyright 2001. All rights reserved. Duplication of this document or extraction
Business Continuity Planning and Disaster Recovery Planning
4 Business Continuity Planning and Disaster Recovery Planning Basic Concepts 1. Business Continuity Management: Business Continuity means maintaining the uninterrupted availability of all key business
Disaster Recovery and Business Continuity Plan
Disaster Recovery and Business Continuity Plan Table of Contents 1. Introduction... 3 2. Objectives... 3 3. Risks... 3 4. Steps of Disaster Recovery Plan formulation... 3 5. Audit Procedure.... 5 Appendix
NEEDS BASED PLANNING FOR IT DISASTER RECOVERY
The Define/Align/Approve Reference Series NEEDS BASED PLANNING FOR IT DISASTER RECOVERY Disaster recovery planning is essential it s also expensive. That s why every step taken and dollar spent must be
Documentation. Disclaimer
HOME UTORprotect DOCUMENTATION AMS/ROSI SERVICES CONTACT Documentation Disaster Recovery Planning Disaster Recovery Planning Disclaimer The following project outline is provided solely as a guide. It is
The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1
Version 3.1 November 22, 2004 TABLE OF CONTENTS PART 1: DISASTER RECOVERY EXPECTATIONS... 3 OVERVIEW...3 EXPECTATIONS PRIOR TO AN INCIDENT OCCURRENCE...3 EXPECTATIONS PRIOR TO A DISASTER OCCURRENCE...4
EMERGENCY PREPAREDNESS PLAN Business Continuity Plan
EMERGENCY PREPAREDNESS PLAN Business Continuity Plan GIS Bankers Insurance Group Powered by DISASTER PREPAREDNESS Implementation Small Business Guide to Business Continuity Planning Surviving a Catastrophic
DISASTER RECOVERY PLANNING GUIDE
DISASTER RECOVERY PLANNING GUIDE AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING FOR JD EDWARDS SOFTWARE CUSTOMERS www.wts.com WTS Disaster Recovery Planning Guide Page 1 Introduction This guide will provide
IT Disaster Recovery Plan Template
HOPONE INTERNET CORP IT Disaster Recovery Plan Template Compliments of: Tim Sexton 1/1/2015 An information technology (IT) disaster recovery (DR) plan provides a structured approach for responding to unplanned
Business Continuity Plan
Business Continuity Plan October 2007 Agenda Business continuity plan definition Evolution of the business continuity plan Business continuity plan life cycle FFIEC & Business continuity plan Questions
DISASTER RECOVERY PLANNING FOR CITY COMPUTER FACILITIES
APPENDIX 1 DISASTER RECOVERY PLANNING FOR CITY COMPUTER FACILITIES March 2008 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto TABLE OF CONTENTS EXECUTIVE SUMMARY...1
<Client Name> IT Disaster Recovery Plan Template. By Paul Kirvan, CISA, CISSP, FBCI, CBCP
IT Disaster Recovery Plan Template By Paul Kirvan, CISA, CISSP, FBCI, CBCP Revision History REVISION DATE NAME DESCRIPTION Original 1.0 2 Table of Contents Information Technology Statement
Birkenhead Sixth Form College IT Disaster Recovery Plan
Author: Role: Mal Blackburne College Learning Manager Page 1 of 14 Introduction...3 Objectives/Constraints...3 Assumptions...4 Incidents Requiring Action...4 Physical Safeguards...5 Types of Computer Service
Creating a Business Continuity Plan for your Health Center
Creating a Business Continuity Plan for your Health Center 1 Page Left Intentionally Blank 2 About This Manual This tool is the result of collaboration between the Primary Care Development Corporation
SECTION 15 INFORMATION TECHNOLOGY
SECTION 15 INFORMATION TECHNOLOGY 15.1 Purpose 15.2 Authorization 15.3 Internal Controls 15.4 Computer Resources 15.5 Network/Systems Access 15.6 Disaster Recovery Plan (DRP) 15.1 PURPOSE The Navajo County
Contingency Planning Guide
Institutional and Sector Modernisation Facility ICT Standards Contingency Planning Guide Document number: ISMF-ICT/3.03 - ICT Security/MISP/SD/CP Version: 1.20 Project Funded by the European Union 1 Document
Unit Guide to Business Continuity/Resumption Planning
Unit Guide to Business Continuity/Resumption Planning (February 2009) Revised June 2011 Executive Summary... 3 Purpose and Scope for a Unit Business Continuity Plan(BCP)... 3 Resumption Planning... 4 Assumptions
Disaster Recovery Plan Review Checklist. A High-Level Internal Planning Tool to Assist State Agencies with Their Disaster Recovery Plans
Disaster Recovery Plan Review Checklist A High-Level Internal Planning Tool to Assist State Agencies with Their Disaster Recovery Plans November 2008 DISASTER RECOVERY PLAN REVIEW CHECKLIST - FOR INTERNAL
Business Continuity Planning (BCP) / Disaster Recovery (DR)
Business Continuity Planning (BCP) / Disaster Recovery (DR) Introduction Interruptions to business functions can result from major natural disasters such as earthquakes, floods, and fires, or from man-made
EXECUTIVE SUMMARY 1.1 PROJECT OBJECTIVES
1 1.1 PROJECT OBJECTIVES The main objective of the project is to develop a comprehensive IT Business Continuity/Disaster Recovery Plan for the Rochester-Genesee Regional Transportation Authority (RGRTA)
Security Architecture. Title Disaster Planning Procedures for Information Technology
Category Applicability Title Disaster Planning Procedures for Information Technology All Public Entities (See the Applicability section below.) Standard - A degree or level of requirement that all jurisdictions
Disaster Recovery Planning Process
Disaster Recovery Planning Process By Geoffrey H. Wold Part I of III This is the first of a three-part series that describes the planning process related to disaster recovery. Based on the various considerations
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine
Decision on adequate information system management. (Official Gazette 37/2010)
Decision on adequate information system management (Official Gazette 37/2010) Pursuant to Article 161, paragraph (1), item (3) of the Credit Institutions Act (Official Gazette 117/2008, 74/2009 and 153/2009)
Ohio Supercomputer Center
Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
Business Continuity and Disaster Recovery Planning from an Information Technology Perspective
Business Continuity and Disaster Recovery Planning from an Information Technology Perspective Presenter: David Bird, Director of Sales, Business Technology Consultant phone: 215-672-7100 email: [email protected]
Technology Recovery Plan Instructions
State of California California Information Security Office Technology Recovery Plan Instructions SIMM 5325-A (Formerly SIMM 65A) September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF
SAMPLE IT CONTINGENCY PLAN FORMAT
SAMPLE IT CONTINGENCY PLAN FORMAT This sample format provides a template for preparing an information technology (IT) contingency plan. The template is intended to be used as a guide, and the Contingency
Business Continuity Planning in IT
Introduction: Business Continuity Planning in IT The more your business relies on its IT systems, the more you need to consider how unexpected disruptions might affect your business. These disruptions
CISM Certified Information Security Manager
CISM Certified Information Security Manager Firebrand Custom Designed Courseware Chapter 4 Information Security Incident Management Exam Relevance Ensure that the CISM candidate Establish an effective
OKHAHLAMBA LOCAL MUNICIPALITY
OKHAHLAMBA LOCAL MUNICIPALITY I.T DISASTER RECOVERY PLAN 2012/2013 TABLE OF CONTENTS 1. INTRODUCTION 1 1.1 PURPOSE 2 1.2 OBJECTIVES 2 1.3 SCOPE 2 1.4 DISASTER RECOVERY STRATEGY 2 1.5 DISASTER DEFINITION
Toronto Public Library Disaster Recovery recommended safeguards and controls
BCE Security Solutions Restricted Attachment 1 Toronto Public Library Disaster Recovery recommended safeguards and controls Final Prepared by: Bell Security Solutions Inc. Professional Services 333 Preston
Success or Failure? Your Keys to Business Continuity Planning. An Ingenuity Whitepaper
Success or Failure? Your Keys to Business Continuity Planning An Ingenuity Whitepaper May 2006 Overview With the level of uncertainty in our world regarding events that can disrupt the operation of an
UNIVERSITY INFORMATION TECHNOLOGY SERVICES (UITS) & INFORMATION WAREHOUSE FUNCTIONAL ANNEX 13
UNIVERSITY INFORMATION TECHNOLOGY SERVICES (UITS) & INFORMATION WAREHOUSE FUNCTIONAL ANNEX 13 Revision: December 19, 2012 Supersedes: June 9, 2009 Effective Date: January 30, 2012 OBJECTIVES The primary
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Disaster Recovery Plan Documentation for Agencies Instructions
California Office of Information Security Disaster Recovery Plan Documentation for Agencies Instructions () November 2009 SCOPE AND PURPOSE The requirements included in this document are applicable to
Comprehensive Emergency Management Plan (CEMP) Annex V CONTINUITY OF OPERATIONS PLAN (COOP)
Annex V CONTINUITY OF OPERATIONS PLAN (COOP) Milwaukee County Office of the Sheriff (MCSO) Division of Emergency Management Milwaukee County, ANNEX V CONTINUITY OF OPERATIONS PLAN (COOP) TABLE OF CONTENTS
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Four
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Four Data Handling in University Business Impact Analysis ( BIA ) Agenda Overview Terminologies Performing
Q uick Guide to Disaster Recovery Planning An ITtoolkit.com White Paper
This quick reference guide provides an introductory overview of the key principles and issues involved in IT related disaster recovery planning, including needs evaluation, goals, objectives and related
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
Information Systems Security Assessment
Physical Security Information Systems Security Assessment 1. Is the server protected from environmental damage (fire, water, etc.)? Ideal Answer: YES. All servers must be housed in such a way as to protect
Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP).
Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP). Ed Fortin President Fortin Consulting Paul Godden Consultant & Quotation Author Friday 24 th February 2012 Business Continuity Planning
Interactive-Network Disaster Recovery
Interactive-Network Disaster Recovery BACKGROUND IT systems are vulnerable to a variety of disruptions, ranging from mild (e.g., short-term power outage, disk drive failure) to severe (e.g., terrorism,
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
PAPER-6 PART-3 OF 5 CA A.RAFEQ, FCA
Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-3 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand
Data Center Assistance Group, Inc. DCAG Contact: Tom Bronack Phone: (718) 591-5553 Email: [email protected] Fax: (718) 380-7322
Business Continuity and Disaster Recovery Job Descriptions Table of Contents Business Continuity Services Organization Chart... 2 Director Business Continuity Services Group... 3 Manager of Business Recovery
WHAT IS DISASTER RECOVERY
WHAT IS DISASTER RECOVERY The definition of Disaster Recovery' tends to vary widely from company to company and is a difficult term to define because it changes and is so varied in each situation. And
Information System Audit Report Office Of The State Comptroller
STATE OF CONNECTICUT Information System Audit Report Office Of The State Comptroller AUDITORS OF PUBLIC ACCOUNTS KEVIN P. JOHNSTON ROBERT G. JAEKLE TABLE OF CONTENTS EXECUTIVE SUMMARY...1 AUDIT OBJECTIVES,
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
The Weill Cornell Medical College and Graduate School of Medical Sciences. Responsible Department: Information Technologies and Services (ITS)
Information Technology Disaster Recovery Policy Policy Statement This policy defines acceptable methods for disaster recovery planning, preparedness, management and mitigation of IT systems and services
APPENDIX 7. ICT Disaster Recovery Plan
APPENDIX 7 ICT Disaster Recovery Plan This policy was approved and ratified by the Governing Body of Cox Green School on 20 th October 2015 Signed: Chair of Governors Date: Version Authorisation Approval
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Business Continuity Planning and Disaster Recovery Planning. Ed Crowley IAM/IEM
Business Continuity Planning and Disaster Recovery Planning Ed Crowley IAM/IEM 1 Goals Compare and contrast aspects of business continuity Execute disaster recovery plans and procedures 2 Topics Business
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN
BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN FEBRUARY 2011 TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 INTRODUCTION... 4 SECTION 1: IT Security Policy... 5 SECTION 2: Risk Management
Clinic Business Continuity Plan Guidelines
Clinic Business Continuity Plan Guidelines Published: January 2015 Table of Contents Emergency Notification Contacts Primary... 2 Emergency Notification Contacts Backups (in case primary is unavailable)...
Disaster Recovery Planning Procedures and Guidelines
Disaster Recovery Planning Procedures and Guidelines A Mandatory Reference for ADS Chapter 545 New Reference: 06/01/2006 Responsible Office: M/DCIO File Name: 545mal_060106_cd44 Information System Security
IBM Global Technology Services March 2008. Virtualization for disaster recovery: areas of focus and consideration.
IBM Global Technology Services March 2008 Virtualization for disaster recovery: Page 2 Contents 2 Introduction 3 Understanding the virtualization approach 4 A properly constructed virtualization strategy
Business Continuity Glossary
Developed In Conjuction with Business Continuity Glossary ACTIVATION: The implementation of business continuity capabilities, procedures, activities, and plans in response to an emergency or disaster declaration;
PPSADOPTED: OCT. 2012 BACKGROUND POLICY STATEMENT PHYSICAL FACILITIES. PROFESSIONAL PRACTICE STATEMENT Developing a Business Continuity Plan
PROFESSIONAL PRACTICE STATEMENT Developing a Business Continuity Plan OCT. 2012 PPSADOPTED: What is a professional practice statement? Professional Practice developed by the Association Forum of Chicagoland
Hanh Do, Director, Information System Audit Division, GAA. SUBJECT: Review of HUD s Information Technology Contingency Planning and Preparedness
Issue Date: August 31, 2006 Audit Report Number 2006-DP-0005 TO: Lisa Schlosser, Chief Information Officer, A FROM: Hanh Do, Director, Information System Audit Division, GAA SUBJECT: Review of HUD s Information
Application / Hardware - Business Impact Analysis Template. MARC Configuration Requirements. Business Impact Analysis
Application / Hardware - Business Impact Analysis Template The single most important thing we can do is help you understand the criticality of each application, supporting hardware/server/pc and the required
BUSINESS CONTINUITY PROGRAM (BCP) HANDBOOK FOR DEPARTMENT BCP TEAMS
BUSINESS CONTINUITY PROGRAM (BCP) HANDBOOK FOR DEPARTMENT BCP TEAMS Version 1.0 9/4/2004 Introduction This handbook gives an overview of Business Continuity Program (BCP) planning for county departments.
Clovis Municipal School District Information Technology (IT) Disaster Recovery Plan
Clovis Municipal School District Information Technology (IT) Disaster Recovery Plan Revision History REVISION DATE NAME DESCRIPTION Draft 1.0 Eric Wimbish IT Backup Disaster Table of Contents Information
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
Continuity of Operations Planning. A step by step guide for business
What is a COOP? Continuity of Operations Planning A step by step guide for business A Continuity Of Operations Plan (COOP) is a MANAGEMENT APPROVED set of agreed-to preparations and sufficient procedures
Offsite Disaster Recovery Plan
1 Offsite Disaster Recovery Plan Offsite Disaster Recovery Plan Presented By: Natan Verkhovsky President Disty Portal Inc. 2 Offsite Disaster Recovery Plan Introduction This document is a comprehensive
APPENDIX 7. ICT Disaster Recovery Plan
APPENDIX 7 ICT Disaster Recovery Plan This policy was approved and ratified by the Governing Body of Cox Green School on 15 th October 2013 Signed: Chair of Governors Date: Ratified: Oct 2013 Review: Sep
PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA
1 Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand
Protecting Your Business
Protecting Your Business Business Continuity/Disaster Recovery Planning Robert Haberman Senior Product Manager BCP/DRP TELUS BUSINESS SOLUTIONS Business Continuity/Disaster Recovery Planning 1 Agenda:
Information Technology Mission Statement. Information Technology Goals
Ionia County Information Technology Strategic Plan 2008-2013 Table of Contents Information Technology Mission 3 Information Technology Goals 3 Current Network Overview 4-5 Information Technology Focus
DRAFT Disaster Recovery Policy Template
DRAFT Disaster Recovery Policy Template NOTE: This is a boiler plate template much information is needed from to finalizeconsider this document pre-draft FOREWARD... 3 Policy Overview...
DEPARTMENT OF LABOR AND EMPLOYMENT DISASTER RECOVERY AND BUSINESS RESUMPTION CONTINGENCY PLANNING GUIDELINES
COLORADO DEPARTMENT OF LABOR AND EMPLOYMENT 1515 Arapahoe Street Denver, Colorado 80202-2117 SUPPORTING DOCUMENTATION Title: Disaster Recovery Plan Related Document: Disaster Recovery Plan Development
Federal Financial Institutions Examination Council FFIEC. Business Continuity Planning BCP MARCH 2003 MARCH 2008 IT EXAMINATION
Federal Financial Institutions Examination Council FFIEC Business Continuity Planning MARCH 2003 MARCH 2008 BCP IT EXAMINATION H ANDBOOK TABLE OF CONTENTS INTRODUCTION... 1 BOARD AND SENIOR MANAGEMENT
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
DISASTER RECOVERY PLAN
DISASTER RECOVERY PLAN Section 1. Goals of a Disaster Recovery Plan The major goals of a disaster recovery plan are: To minimize interruptions to normal operations. To limit the extent of disruption and
Post-Class Quiz: Business Continuity & Disaster Recovery Planning Domain
1. What is the most common planned performance duration for a continuity of operations plan (COOP)? A. 30 days B. 60 days C. 90 days D. It depends on the severity of a disaster. 2. What is the business
Business Continuity and Disaster Recovery Planning
Business Continuity and Disaster Recovery Planning Jennifer Brandt, CISA A p r i l 16, 2015 HISTORY OF STINNETT & ASSOCIATES Stinnett & Associates (Stinnett) is a professional advisory firm offering services
Business Continuity Planning (BCP) / Disaster Recovery (DR)
Business Continuity Planning (BCP) / Disaster Recovery (DR) Introduction Interruptions to business functions can result from major natural disasters such as earthquakes, floods, and fires, or from man-made
General Computer Controls
1 General Computer Controls Governmental Unit: University of Mississippi Financial Statement Date: June 30, 2007 Prepared by: Robin Miller and Kathy Gates Date: 6/29/2007 Description of computer systems
COUNTY OF LOS ANGELES InternalServicesDepartment
LOS ANGELES COUNTY. --- - -. - _. -..- - :;...Iii...E -. - - Dave Lambertson Director COUNTY OF LOS ANGELES InternalServicesDepartment 1100 North Eastern Avenue Los Angeles, California 90063 To enrich
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
IT Disaster Recovery and Business Resumption Planning Standards
Information Technology Disaster Recovery and Business IT Disaster Recovery and Business Adopted by the Information Services Board (ISB) on May 28, 1992 Policy No: Also see: 500-P1, 502-G1 Supersedes No:
IT - General Controls Questionnaire
IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow
Why Should Companies Take a Closer Look at Business Continuity Planning?
whitepaper Why Should Companies Take a Closer Look at Business Continuity Planning? How Datalink s business continuity and disaster recovery solutions can help organizations lessen the impact of disasters
Boston Financial Data Services Business Continuity Executive Summary. November 2009
Boston Financial Data Services Business Continuity Executive Summary Boston Financial continues to maintain an active business continuity program that effectively supports the ability to survive a disruption
Security and Managed Services
iconnect Cloud Archive System Overview Security and Managed Services iconnect Cloud Archive (formerly known as Merge Honeycomb ) iconnect Cloud Archive offers cloud-based storage for medical images. Images
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
NHS 24 - Business Continuity Strategy
NHS 24 - Strategy Version: 0.3 Issue Date: 20/09/2005 Status: Issued for Board Approval Status: draft Page 1 of 13 Table of Contents 1 INTRODUCTION...3 2 PURPOSE...3 3 SCOPE...3 4 ASSUMPTIONS...4 5 BUSINESS
Disaster Recovery Plan
Disaster Recovery Plan Date: February 2, 2009 Revision: 9.0 EXTERNAL BUSINESS CONTINUITY PLAN PAGE 1 of 13 Federal regulation states, and internal corporate policies require, that Penson Financial Services,
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General INFORMATION TECHNOLOGY: Final Obstacles Removed To Eliminate Customs Disaster Recovery Material Weakness Office of Information Technology OIG-IT-03-01
Business Continuity Planning and Disaster Recovery Planning
Business Continuity Planning and Disaster Recovery Planning Ed Crowley IAM/IEM 1 ISC 2 Key Areas of Knowledge Understand business continuity requirements 1. Develop and document project scope and plan
Disaster Recovery Plan
Disaster Recovery Plan Date: Revision: 8.0 EXTERNAL BCP PLAN PAGE 1 OF 12 Federal regulation states, and internal corporate policies require, that Penson Financial Services, Inc. (Penson) develop Business
