Disaster Recovery Plan The Business Imperatives
Table of Contents Disaster Recovery Plan The Business Imperatives... 3 Introduction... 3 A Disaster Recovery Program The Need of the Hour... 3 Approach to Disaster Recovery... 4 Key Elements of a Disaster Recovery Program... 4 Disaster Recovery Strategies... 5 Summary... 6
Introduction 3 6 With the dependence on data growing exponentially across industries, all stakeholders, including regulators, employees, customers, and suppliers, are demanding quicker access to information than ever before. This has put the onus on businesses to have systems in place that make key information available to the right people at the right time. Given such a scenario, it has become critical for organizations to plan for unexpected business interruptions due to events like natural disasters, sabotage, and technology failures. A sound business continuity strategy is imperative in today s business environment because of the significant financial consequences and potential loss of brand credibility of such unexpected interruptions. While the likelihood of disasters occurring is low, organizations need to have a robust disaster recovery plan in place to protect against losses and minimize the impact on their customers without surrendering market share. Most often organizations tend to create mirror image of the server and restore the image on the Disaster site, which unfortunately takes a long time to complete. This is definitely not a best practice given that it is a time consuming and cumbersome process. For instance, organizations creating mirror image of the server tend to take an image every quarter and restore the same. This means they do not have a point in time image of the server on the disaster site which in turn suggests if there was any new functionality added after that quarter it would not be available for use on the disaster site. A Disaster Recovery Program The Need of the Hour Disasters and interruptions often come unannounced and uninvited. And in an age where customers, employees, suppliers, and regulators have diminishing patience when it comes to accessing information, organizations will be best served by a robust Disaster Recovery program that ensures data is always accessible within reasonable timeframes. To serve customers with a simple, cost-efficient, and high impact solution, KPIT has developed an innovative tool Business Continuity Solution (BCS) specially designed for EnterpriseOne 9.1, which significantly reduces the downtime for switching over to a disaster site. With BCS, systems can be up and running within 20 minutes at a disaster site. This process is accomplished by taking advantage of CNAME record or Canonical Name record within the customers Domain Name System (DNS)*. BCS provides a point in time image of the system, which means that users will not lose any new functionality, which was created and deployed on the primary server at the time of disaster. Additionally, the solution eliminates the need to create and restore images of the server, and reduces the time taken to switch over to a disaster site significantly. *Please contact KPIT SYTIME for the detailed solution 3 17
Approach to Disaster Recovery 4 6 Before any disaster recovery solution is implemented, a Disaster Recovery program needs to be in place. It has to go beyond the recovery of an organization s IT system to include the restoration of key business processes that will enable the enterprise to resume product manufacturing, customer service, bill payments, and revenue collection. The scope of a Disaster Recovery plan must include an organization s entire value chain and a networking plan that covers recoverability, redundancy, and diversity. The process of creating a Disaster Recovery plan begins with determining the probability of the occurrence of an unexpected disaster. The next step involves estimating the business consequences and financial loss, and, at the same time, estimating the cost of preventing, preparing for, and controlling the disaster. At this stage, it is also important to quantify, as accurately as possible, the harm done to the business reputation and brand. Having done this, it is important to determine important Disaster Recovery metrics such as the Recovery Point Objective (RPO), the Recovery Time Objective (RTO), and minimum level of IT and business process capability required to resume mission-critical operations. Further, the creation of the Disaster Recovery plan involves determining the method of securing an organization s key data and evaluating whether on-site redundancy is enough or remote backups are required. It is important to note that while primary locations can be secured to a great extent, they cannot be protected against natural disasters and certain unexpected incidents. A remote disaster recovery center gives organizations safety in instances where their infrastructure and facilities are damaged. In the sections that follow, we will take a closer look at key components of a thorough Disaster Recovery program. Key Elements of a Disaster Recovery Program Gaining Consensus Having recognized the importance of putting a Disaster Recovery program in place, it is important to get a buy-in from key stakeholders on the objectives, scope, and policies of the program. With financial and human resources requiring to be committed to a Disaster Recovery program, the management has to find the right balance between the potential business loss as a result of a disaster and the cost of creating, implementing, and maintaining such a program. Assessing Risk This involves pinpointing and examining potential threats and vulnerabilities. Typically, an organization faces risk on account of natural disasters, acts of sabotage or large-scale mishaps, and technology failures. Each threat must then be analyzed to understand the probability of it occurring and the magnitude of risk it poses to the organization. This analysis provides a good indication of how risks should be prioritized and tackled. After identifying the threats to business continuity, organizations need to plan for risk prevention and control. This includes reviewing existing physical, infrastructural, and IT security vulnerabilities as well as robust reviews and testing of applications and communication networks. Analyzing the Impact on Business In a Disaster Recovery program, it is important to understand and quantify the impact of the loss of various business functions. It is also important to understand the requirements for recovery. This exercise enables the business to prioritize the recovery procedure in case of a disaster. Business functions can be categorized into one of the following: Critical: Interruptions to these functions will bring business to a stop and inflict heavy losses on the organization Essential: Interruptions to these functions would significantly hamper the organization s operations and capacity to function beyond a certain point Necessary: Interruptions to these functions would still allow the organization to function but without the required level of business impact Desirable: Interruptions to these functions wouldn t significantly hinder the organization s ability to conduct business
5 6 Once business functions have been prioritized, it becomes possible to set recovery benchmarks in terms of Recovery Time Objectives, Recovery Point Objectives, etc. It is critical to involve key stakeholders from each business function during this process because the impact analysis plays an important role in establishing recovery objectives and recovery resource requirements. Moreover, inputs from each business function help in estimating costs more accurately, which is critical in decision making for a Disaster Recovery program. Disaster Recovery Strategies A good Disaster Recovery program must include detailed plans on prevention, response, resumption, recovery, and restoration. Prevention: This includes measures to deter and prevent threats becoming interruptions. Investing in these deterrent and preventive controls has been found to be more prudent than attempting to recover after an interruption. Ideally, an effective Disaster Recovery program should focus on tackling as much of the risk as possible through deterrence and prevention while deploying a recovery strategy to tackle the less likely residual risk. Response: This deals with an organization s immediate reaction in the event of a disaster. If the interruption is unexpected, the first reaction would be to alert the concerned persons about the problem. If it is expected, then alerts can be issued prior to the occurrence. Timely alerts are crucial in such situations because they can minimize the damage to operations. That s why creating a well-documented and drilled alert procedure, which clearly specifies the chain of communication and the resulting action to be taken, is important. Having notified key stakeholders, the organization must assess the cause of the disruption, the scope of damage caused, the scope for damage control, the persons/services/systems affected, etc. With these inputs, the company can then start evaluating the severity of the disaster, the immediate impact of the event, the time it will take to get operations going again, and how and where to initiate remedial action. Resumption: A key step in a Disaster Recovery scenario is to establish an alternative control center different from the primary operating premises. Once this has been done, the organization must ascertain if it can resume mission-critical operations at the primary site or if they must be moved temporarily to the alternative center. Depending on the severity of the interruption, critical services are restored by creating/maintaining an infrastructure capable of supporting these critical business activities. Recovery: While the business and IT operations are restored based on their priority in the Disaster Recovery program, data is recovered from backup sources and rebuilt to a predetermined point to maintain the integrity of the data. After data has been recovered to a stable state, operations can resume while other supporting business functions also become operational. Restoration: Efforts to restore full functionality to the organization s primary operating infrastructure are undertaken while the recovery team operates concurrently from the alternative site. This restoration process needs to cover the physical infrastructure, IT infrastructure and systems, and applications and networks. Operational data must then be reloaded to the primary systems and tested for stability. Once a stable state has been achieved, the alternative site can gradually be scaled down while business operations are restored at the primary site. Importantly, the management must define a clear plan and schedule the implementation of the complete transition back to business as usual.
Summary 46 6 During our analysis of Disaster Recovery Plans, we have found that any organization can insure itself against any kind of disaster with a solid disaster recovery approach built on thorough assessment of key elements of disaster recovery program. To sum up, a successful Disaster Recovery plan requires inputs and contributions from the entire organization, from top to bottom, its technology partner, and even suppliers, vendors, and distributors. After all, it is only when technology processes, and people are tightly Integrated, that an organization can truly thrive. Copyright 2013, KPIT. All rights reserved. This document is provided for information purposes only and the contents hereof are subject to change without notice. This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission.