Title: Disaster Recovery Larry Pedrazoli
1Business Continuance
Disaster Recovery
2MISSION
IM
POSSIBLE
IM
3Learning Objectives
- Benefits of Planning
- Distinguish between Business Continuance and
Disaster Recovery - Disaster Recovery Overview
- Where do We Start
- Things to Remember
- Critical Success Factors
- Final Thought
3
44
4
5Benefits
- Prioritizes applications/systems
- Establishes definitive recovery time frames for
all business functions - Decreases potential exposures
- Eliminates confusion and errors
- Minimizes decision-making during a disastrous
event - Reduces reliance on certain key individuals
- Proves the reliability of standby/backup systems
- Provides training materials for new employees
- Allows you to maintain service levels consistent
with established expectations of you
organizations customers
5
6Key Question
OK, so which is it? Business Continuance
or Disaster Recovery?
6
7Business Continuance
- Ensure that the applications and information that
are necessary to run the business are always
available and accessible - Available
- Systems are physically available
- Application performance is acceptable and
consistent - Relates to planned and unplanned outages
7
8Disaster Recovery
- A consistent copy of critical data offsite that
can be recovered after an unplanned outage - Disaster Recovery Includes
- Business Resumption
- Application Recovery
- Data Recovery
8
9Disaster Recovery
A Disaster is
Any unplanned interruption of critical business
processes for an unacceptable period of time.
9
10Disaster Recovery Planning
A Matter of Business Survival...
- Business Interruptions Result In
- Loss of Revenue
- Erosion of Customer Confidence
- Loss of Market Share
- Short and Long Term Negative Image
10
11Disaster Recovery Planning
To Survive a Disaster You Need
- A Place to GO
- Vital Data
- A Plan to Follow
- Well Trained People
12Disaster Recovery Planning
Key Phases
- Prevention
- Response
- Resumption
- Recovery
- Restoration
13Prevention
- Prevention
- Response
- Resumption
- Recovery
- Restoration
Measures and activities that will lessen the
possibility or impact of an adverse incident
occurring. Protect assets and helps manage risk.
14Response
- Prevention
- Response
- Resumption
- Recovery
- Restoration
Reaction to an incident or emergency to assess
damage or impact and to ascertain the level of
containment and control activity
required. Addresses the policies, procedures and
actions to be followed in the event of an
emergency
15Resumption
- Prevention
- Response
- Resumption
- Recovery
- Restoration
Process of planning for and/or implementing the
resumption of only the most time-sensitive
business operations immediately following a
disaster.
16Recovery
- Prevention
- Response
- Resumption
- Recovery
- Restoration
Process of planning for and/or implementing
expanded operations to address less
time-sensitive business operations immediately
following an interruption or disaster.
17Restoration
- Prevention
- Response
- Resumption
- Recovery
- Restoration
Process of planning for and/or implementing
procedures for the repair or relocation of the
primary site and its contents, and for normal
operations at the primary site.
18Disaster Recovery Planning
Where Do We Start?
19Disaster Recovery Planning
- Self-AssessmentWhich are you?
20Disaster Recovery Planning
Phase 1 Executive Buy-In
- Management understanding and support at the
executive business level - Executive Sponsorship
21Disaster Recovery Planning
Phase 2 Education and Awareness
Executive Buy-in Executive Sponsor
Establish a Business Continuity Council
- Accounting
- Compliance
- Customer Service
- Marketing
- Facilities Management
- Administration
- Clinicians
- Contracting and Provider Relations
Provide Training
22Disaster Recovery Planning
Phase 3 Build the Plan
- Define Scope
- Perform Risk Analysis
- Perform Impact Analysis
- Determine/Approve Strategies
- Build Teams
23Disaster Recovery Planning
Phase 4 Develop and Test the Plan
- Organize and document a plan
- Develop testing criteria
- Test plan
- Evaluate test results
- Update/Revise as necessary
- Management approval of plan
24Disaster Recovery Planning
Phase 5 Maintain and Test Plan
- Make modifications for
- Changes in software/hardware
- Updating production applications and functions
- Operating Procedures
- Personnel and organizational changes
- Other events impacting the recovery plan
- Ongoing Training and Testing
25Disaster Recovery Planning
Risk Analysis
26Risk Analysis
The process of identifying the most probable
threats to an organization and analyzing the
related vulnerabilities of an organization to
these threats.
Major Risk Factors
- Key personnel loss
- ASP failure
- Toxic contamination
- Aircraft crash
- Gas leak
- High winds
- Snowstorm
- Utility failures
- Network failure
- Fire
- Flood
- Tornado
- Hurricane
- Bomb Threat
27Risk Analysis
28Risk Analysis
THE EQUATION Probability Impact Cost Risk
Rating
- The PROBABILITY of occurrence for a particular
event - The potential IMPACT to your organization if the
event occurred - The estimated COST of implementing a solution
29Risk Analysis
THE EQUATION Probability Impact Cost Risk
Rating
30Disaster Recovery Planning
Business Impact Analysis(BIA)
31Business Impact Analysis
The process of analyzing all core business
functions and establishing an optimized timetable
for recovery.
- Maps data flow
- Identify maximum tolerance for downtime.
- Identify interdependencies.
- Determine the recovery priorities of the
organization.
- Provides baseline for
- Justification for costs associated with recovery.
- Developing recovery strategies.
- Developing Support Level Agreements
32Business Impact Analysis
33Conceptual Recovery Time Lime
34Recovery Strategies
35Recovery Strategies
HOT SITE Facility containing computers and
necessary peripheral equipment that may be
occupied by a subscriber immediately after a
disaster declaration to restore its own systems,
applications and data. WARM SITE Facility
partially equipped with hardware, communications
interfaces, power sources, and environmental
conditioning. COLD SITE Facility with
computer-ready space held in reserve for the
users own systems.
36Disaster Recovery Planning
37Things to Remember
- Cant physically get there
- Martial law
- Airports closed
- Bridges and tunnels closed
- Recover from tapes stored across the river?
- Forget it!
- Thousands of people working from home
- Email is mission critical!
38Things to Remember
- Family first, then business
- Vendor support personnel and capabilities are
extremely important - Include in formulating and testing recovery plans
- Disperse your Disaster Recovery support teams
- DR staff in one place is vulnerable
39Disaster Recovery Planning
Critical Success Factors
- Management understanding and support at the
executive business level - Alignment of disaster recovery objectives with
business objectives - Maintain cradle to grave process
- Ruthless prioritization
- Appropriate resource allocation
- Using technology as the enabler
40Final Thought
41Disaster Recovery Planning
Business Impact Analysis(BIA)
42Business Impact Analysis
The process of analyzing all core business
functions and establishing an optimized timetable
for recovery.
- Maps data flow
- Identify maximum tolerance for downtime.
- Identify interdependencies.
- Determine the recovery priorities of the
organization.
- Provides baseline for
- Justification for costs associated with recovery.
- Developing recovery strategies.
- Developing Support Level Agreements
43Business Impact Analysis
End-User Questionnaire Highlights
- Department Overview
- Workflow Interdependencies
- Computer Resources
- Application Impact Analysis
44Department Overview
- Department Overview
- Workflow Interdependencies
- Computer Resources
- Application Impact Analysis
- Identify department, location, and at least two
representatives from each department. - Develop a comprehensive list of applications used
in the department. - Describe the business function(s) of the
department. - Gather information about the departments daily
business hours, revenues generated, transaction
volume, and any peak or high demand periods.
45Workflow Interdependencies
- Department Overview
- Workflow Interdependencies
- Computer Resources
- Application Impact Analysis
- Identify the departments and organizations that
send work to the department. - Determine what routes or channels of
communication are used to send that incoming work
and estimate the percentage that comes via each
route or channel. - Gather the same information in 1 and 2 for work
sent by the department.
46Computer Resources
- Department Overview
- Workflow Interdependencies
- Computer Resources
- Application Impact Analysis
- Gather information on the computing equipment in
the department and how it is used. - Begin exploring the reliance that the department
has on the computing equipment, e.g., What data
entry backlog would there be if it was
unavailable for one day?
47Application Impact Analysis
- Department Overview
- Workflow Interdependencies
- Computer Resources
- Application Impact Analysis
- Basic description of each application, including
what it does, what business functions it
supports, if it handles PHI, and who the
department contacts are for the application. - Estimate the level of departmental business
interruption associated with the application
being unavailable through various time
thresholds. - Estimate the associated data entry backlog that
would result and how many staff hours it would
take to eliminate the backlog.
48Application Impact Analysis
- Department Overview
- Workflow Interdependencies
- Computer Resources
- Application Impact Analysis
- Evaluate the downtime procedures associated with
the application, asking questions like have the
procedures been used before?, how did they work?,
and how long can the department function using
them? - Evaluate any regulatory, legal, financial,
customer service, and public image problems that
could arise as a direct or indirect result of the
application being unavailable through various
time thresholds.
49Business Impact Analysis
Other Questionnaires and Interviews
- Executive and Administrative Staff
- IS Staff supporting
- Major Clinical Applications
- Interfaces
- Network Configuration
- Hardware/Servers
- Facility Operations
50Gundersen Lutheran Inventory
- Initial Y2K inventory had 700 items
- Updates for current environment resulted in 170
applications - Interviews identified 122 server based
applications and their associated runtime
environments - Analysis identified 64 applications as mission
critical
51Application and System Criticality
- Critical - Applications or resources impacting
patient care. (No downtime is acceptable). - Essential - Applications or resources with
patient health information, patient care data,
billing, payroll and physical security.
(Limited downtime). - Necessary - Department-level applications and
systems. (Some downtime is acceptable). - Desirable - Applications and resources that can
tolerate a significant loss of availability.
(Recover when normal operations is
re-established).
52(No Transcript)
53(No Transcript)
54(No Transcript)
55(No Transcript)
56(No Transcript)
57(No Transcript)
58Top 10 Components
- DataWarehaus
- Clinical Workstation
- Softlab
- SMS
- PP / Cycare
- Lawson
- Wellsoft
- Orsos
- Pharmacy
- Internet/Intranet/Email
59Critical Component Analysis
Critical
Recovery Time Objective
Essential
Necessary
Desirable
60Risks and RecommendationsCurrent Strengths
- Knowledgeable staff.
- Limited backup and restore strategies for most IT
components are in place. - Telecom and pager systems meet current business
needs. - Establishment of a second (backup) ISP is nearly
complete so as to ensure Internet availability. - The Data Warehouse is housed on a high
availability system. - IS is upgrading to a Netware release that
enhances server security and availability.
61Risks and Recommendations Current Opportunities
- Migrate appropriate desktop-based applications to
a server environment. - Assess and consolidate server environment.
- Cluster servers to improve availability.
- Expand the use of proactive monitoring of
applications, systems and interfaces. - Implement standardized backup and recovery
procedures across all systems.
62Risks and Recommendations Current Weaknesses
- The Data Warehouse is the greatest risk area
across Gundersen Lutherans IT environment due to
no offsite redundant environment. - Interface availability and related data
integrity. - Critical applications have no offsite redundancy
and limited internal failover capability. - Need to build business continuance and disaster
recovery into the life cycle of every IT
component.
63Business Impact Analysis Project Moving Forward
Next Steps
- Business Impact Analysis - Phase 2 Objectives
- Complete the comprehensive IT component audit.
- Provide detailed input for determination of
service level objectives. - Complete strategies for decreasing risk related
to critical applications and IT components. - Additional Issues
- Identify critical desktop applications and local
databases. - Include critical standalone systems in the BIA.
- Consolidate the IS BC/DR plan with departmental
plans.
64The End