ESKITP6032 IT Disaster Recovery Level 2 Role



Similar documents
ESKITP6036 IT Disaster Recovery Level 5 Role

ESKITP6034 IT Disaster Recovery Level 4 Role

ESKITP6033 IT Disaster Recovery Level 3 Role

Contribute to IT architecture work

ESKITP6026 IT Security Management Level 6 Role

ESKITP Assist in the preparation of change management plans and assignments for IT enabled systems 1

ESKITP5023 Software Development Level 3 Role

ESKITP4082 IT/Technology Infrastructure Design and Planning Level 2 Role

ESKITP7072 IT/Technology Capacity Management Level 2 Role

ESKITP7102 IT/Technology Asset and Configuration Management Level 2 Role

ESKITP5064 Software Development Process Improvement Level 4 Role

ESKITP7025 IT/Technology Service Help Desk and Incident Management Level 5 Role

ESKITP7026 IT/Technology Service Help Desk and Incident Management Level 6 Role

Overview TECHIS Manage information security business resilience activities

ESKITP7022 IT/Technology Service Help Desk and Incident Management Level 2 Role

702 IT/Technology Service Help Desk and Incident Management

ESKITP7082 Change and Release Management Level 2 role

ESKITP Authorise strategy, policies and standards relating to IT service delivery performance metrics management

ESKITP7052 IT/Technology Management and Support Level 2 Role

ESKITP Design and implement change management plans for IT enabled systems 1

ESKITP Identify change management opportunities and options for IT enabled systems 1

ESKITP Implement procedures and standards relating to metrics for IT service delivery

ESKITP5065 Software Development Process Improvement Level 5 Role

ESKISP Direct security architecture development

ESKISP Direct security testing

Service Management. 702 IT/Technology Service Help Desk and Incident Management

DATA RECOVERY SOLUTIONS EXPERT DATA RECOVERY SOLUTIONS FOR ALL DATA LOSS SCENARIOS.

FINRMFS9 Facilitate Business Continuity Planning and disaster recovery for a financial services organisation

ESKITP5022 Software Development Level 2 Role

ESKISP Manage security testing

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

ESKICAS1 Computerised accounting software

ESKISP Conduct security testing, under supervision

ESKIDMS1 Database management software

ESKITP5022v2 Perform software development activities under direction

Applications and Solutions Architecture Cloud Services

FSPBA8 SQA Unit Code H5FA 04 Process the transfer of foreign currency

ESKIDMS3 Database management software

{Add company name} {Add geographical location} {Add/edit as required} Enterprise Architect. {Add local information}

B U S I N E S S C O N T I N U I T Y P L A N

ASTFM320 Disaster recovery and contingency planning

SFS SYS 7 (SQA Unit Code - H4GL 04) Audit electronic security systems

University of Ulster Policy Cover Sheet

ecogra GENERALLY ACCEPTED PRACTICES (egap) AFFILIATE PROGRAMS

INTERNAL AUDIT 2008/09 INFORMATION TECHNOLOGY (BUSINESS CONTINUITY)

ESKIPU1 Improving productivity using IT

Overview TECHIS Carry out security testing activities

ITSM Tools Operation Continuity Plan Example

Disaster Recovery Checklist Disaster Recovery Plan for <System One>

MASSIVE NETWORKS Online Backup Compliance Guidelines Sarbanes-Oxley (SOX) SOX Requirements... 2

SEMETS3-68 Performing engineering software configuration management

RECOVERY OF CA ARCSERVE DATABASE IN A CLUSTER ENVIRONMENT AFTER DISASTER RECOVERY

Online Backup Solution with Disaster Recovery

CFAS1.3 Use databases to support sales activities

Can You Recover Active Directory from a Disaster?

REDCENTRIC MANAGED SERVER SERVICE DEFINITION

ESKIBS2 Bespoke or specialist software

How To Manage A Business Continuity Strategy

ICT & Communications Services Disaster & Recovery Plan

IT Risk Identification and Disaster Recovery. Mark Fenech BSc MBA CRISC CBCI January 2014

Attachment 2 Performance Metrics

BSBCCO501B Develop business continuity strategy

FSPFCC04(SQA Unit Code-F88P 04) Ensure you comply with regulations in your financial services environment

CFASAA231 - Sqa Unit Code H4RT 04 Use IT to support your role

Attachment to Data Center Services Multisourcing Service Integrator Master Services Agreement

Domain 1 The Process of Auditing Information Systems

Virtual Infrastructure Security

Business Continuity Planning Preparing Your Organization

ESKISP Assist security testing, under supervision

University of Sunderland Business Assurance Information Security Policy

IBX Business Network Platform Information Security Controls Document Classification [Public]

Broadcloud improves competitive advantage with efficient, flexible and scalable disaster recovery services

MANDATORY PROVIDENT FUND SCHEMES AUTHORITY. IV.25 Guidelines on Electronic System for Transmission of Data on Transfer of Accrued Benefits

ESKISP Conducts vulnerability assessment under supervision

Wealthfront Brokerage Corporation

A to Z Information Services stands out from the competition with CA Recovery Management solutions

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October Document Author(s) Collette McQueen

TSM (Tivoli Storage Manager) Backup and Recovery. Richard Whybrow Hertz Australia System Network Administrator

Unit Guide to Business Continuity/Resumption Planning

Performance Indicators for Disaster Recovery

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

ULH-IM&T-ISP06. Information Governance Board

Advisory Guidelines of the Financial Supervision Authority. Requirements for Organising the Business Continuity Process of Supervised Entities

Overview TECHIS Carry out risk assessment and management activities

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

CLIENT PROFILE SUMMARIES

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)

Overview TECHIS Carry out security architecture and operations activities

Database Backup and Recovery Guide

Mike Casey Director of IT

PAPER-6 PART-5 OF 5 CA A.RAFEQ, FCA

NOVASTOR. How to provide an Exchange backup/restore process that is superior to Brick level

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction Policy Statement Purpose...

(Instructor-led; 2 Days)

Guideline for Services

Council Policy Business Continuity Management

Version 1.0. Ratified By

SEMETS3-72 Performing computer system security assessments for engineering software

Information System Audit. Arkansas Administrative Statewide Information System (AASIS) General Controls

How To Use A Court Record Electronically In Idaho

Transcription:

Overview This sub-discipline is about the competencies required in order to manage all aspect of Disaster Recovery (DR), as it applies to IT within an. ESKITP6032 1

Performance criteria You must be able to: Carry out specified IT disaster P1 P2 P3 P4 Correctly carry out specified own role and responsibilities during disaster recovery planning and real life disaster recovery scenarios Correctly follow the processes, tools and techniques relating to disaster Comply with all legislation, regulations and external standards, policies, procedures and guidelines that impact on disaster and their deliverables Comply fully with all al requirements for business continuity and all strategy, policies and standards relating to disaster recovery Document specified information relating to IT recovery You must be able to: P5 P6 Accurately capture and document all relevant information, required in order to reinstate or restore IT/technology systems, services and assets Accurately document relevant information relating to external providers involved in disaster recovery, so that it may be referenced in plans and ESKITP6032 2

Knowledge and understanding You need to know and understand: Carry out specified IT disaster K1 Identify: K1.1 own role and responsibilities in disaster recovery planning K1.2 own role and responsibilities in the event of a disaster scenario K1.3 what reporting and communications need to be made to superiors in the event of a disaster scenario K2 Use the processes, tools and techniques relating to disaster recovery K3 Use information required in order to reinstate or restore IT/technology systems, services and assets K4 Operate with: K4.1 Reference to al strategy, policies and standards in disaster K4.2 Integrity and confidentiality during disaster K5 Comply with: K5.1 Business continuity management requirements for disaster recovery K5.2 Legislation, regulations and external standards, policies, procedures and guidelines that impact on disaster and their deliverables K6 Report: K6.1 Actions taken in accordance with personal role and responsibilities during disaster recovery planning K6.2 Actions taken in accordance with personal role and responsibilities during disaster scenarios K7 Communicate: K7.1 Actions taken in accordance with personal role and responsibilities during disaster recovery planning K7.2 Actions taken in accordance with personal role and responsibilities during disaster scenarios K8 Be accountable for: K8.1 Discharging own role and responsibilities during disaster recovery planning K8.2 Discharging own role and responsibilities during disaster scenarios K9 What are the possible implications of failure to recover from a disaster associated with the IT/technology systems, services and assets on an organizations K10 The fact that: K10.1 disaster recovery plans need to be appropriate to the business needs and the potential risks faced by an K10.2 There are external providers of disaster recovery services available that can be used in disaster recovery situations K10.3 Disaster recovery situations often require active support and assistance from external providers, IT/technology product service and equipment suppliers and other partners K10.4 Disaster recovery situations are likely to impact customers of an ESKITP6032 3

K11 Why disaster recovery management are important to an K12 Who leads disaster within own area K13 The importance of: K13.1 having an effective disaster recovery plan (s) K13.2 verifying the accuracy, currency, completeness and relevance of information collected, produced, used and stored during disaster Document specified information relating to IT disaster recovery You need to know and understand: K14 Source/gather/collate K14.1 information required in order to reinstate or restore IT/technology systems, services and assets K15 Document/complete/store: K15.1 Information required in order to reinstate or restore particular IT/technology systems, services and assets K15.2 Information relating to external providers involved in disaster recovery plans and K16 The importance of documenting the deliverables from disaster recovery in a clear and understandable manner K17 The processes, tools and techniques that can be used to conduct and document disaster recovery planning and management ESKITP6032 4

Developed by e-skills UK Version number 1 Date approved September 2009 Indicative review date Validity Status Originating March 2014 Current Original e-skills UK Original URN 6032 Relevant occupations Suite Key words Information and Communication Technology; Systems Support IT and Telecoms System recovery; Backup; Disaster planning ESKITP6032 5