Title: Security Meets the Real World Disaster Recovery
1Security Meets the Real World Disaster Recovery
- Dr. Steve Miksell/ITSC
- smiksell_at_itsc.org
- 10 July 2002
- Workforce Innovation 2002
2Agenda
- Security Responsibility in the Disaster Recovery
Arena - Disaster Recovery Planning
- Recent New York (Disaster Recovery) Experiences
3The Holy Grail(s) of Security
- The CIA Triad
- Protecting the Enterprise
- Reducing Risk to Acceptable Levels
4The CIA Triad
Confidentiality
Availability
Integrity
5Enterprise Protection Steps
Prevention This step consists of activities
designed to prevent security violations from
taking place.
Detection It is important to realize that
incidents will occur. Timely detection is
essential to minimize their impact.
Correction After incidents have occurred,
repairing damage, and decreasing the
vulnerabilities that allowed the security
incident to occur are required.
6The Concept of Risk
Vulnerability
Threat
Risk
7Security Risk Assessment and Risk Management
Overview
Risk Management A roadmap for change
Where we are
Risk Assessment
Where we want to be
8Risk Management Options
- Eliminate Risk Although some risks can be
virtually eliminated, this is the least likely
and most difficult option - Minimize risk Remove vulnerabilities where
possible - Offload risk Buy insurance
- Accept risk Determine that cost of risk removal
is not justified
9Risk Reduction Not Risk Elimination
- Eliminating all risk is a practical impossibility
- Risk may not be recognized (e.g., unknown
threats, unrecognized vulnerabilities) - Risk reduction impractical (There may be no
reasonable way to remove a vulnerability) - Risk reduction a fiscal impossibility (Money is
usually a limited resource) - Risk management should include recognition of the
consequences of disaster, and understanding what
is required to recover
10The Bottom Line Disasters Happen
11Security Responsibilities Should Include Disaster
Recovery Support
- Restoring availability after disasters becomes
crucial (key part of the CIA Triad) - Corrective actions must be applied quickly and
effectively (Enterprise Protection) - Risk management that ignores disasters is of
least value when it is most needed
12Agenda
- Security Responsibility in the Disaster Recovery
Arena - Disaster Recovery Planning
- Recent New York (Disaster Recovery) Experiences
13Apply Disaster Avoidance Measures Where Possible
- Y2k Contingency Planning
- Recognition
- Remediation
- Testing
- Verification
- Success!
- Contingency Plan Just in Case
14Engage in Disaster Recovery Planning Everywhere
Else
Business Continuity Plan (BCP) (Identifying Critic
al Functions)
Disaster Recovery Plan (DRP) (Getting Critical
Functions back in operation)
Disasters happen
15Disaster Recovery Plan (DRP) Development Approach
- Initiate DRP Development
- Vulnerability Assessment (Data from BCP)
- Business Impact Analysis (Data from BCP)
- DRP Requirements Specification
- Develop Plan
- Develop Testing Program
- Develop Maintenance Program
- Test and Implement (with ongoing maintenance)
16DRP Development Notes
- Project Initiation
- Establish Scope/Assure management
Support/Understand Existing Environment - Build Core Team (Key Business Areas/Information
Technology/OperationsFacilities/Development/ - Security)
- Vulnerability Assessment (from BCP)
- Review major residual weaknesses/Understand
potential disasters - Business Impact Analysis (from BCP)
- Understand critical business functions,
including short-term, intermediate-term and
long-term impacts.
17DRP Development Notes (Cont.)
- 4.Requirements
- Somewhat dependent results of
- Vulnerability Analysis
- Threats Probable/Possible/Unlikely
- Vulnerabilities Current/Residual
- Business Impact Analysis
- Identification of Critical Functions
- Timelines for Restoration
- Defines areas to be covered by DRP and what DRP
needs to accomplish
18DRP Development Notes (Cont.)
- 5.DRP Plan
- Typically will address the following areas
- Conditions and protocols for declaration of a
disaster - Key Personnel Contact and Notification
information - Staff Reporting Guidelines
- Staff Operational Responsibilities
- Facilities Issues
- Baseline and Backup Options (Hot site/Warm
Site/Cold Site) - IT Resources (Hardware, Software and Data)
- Baseline and Backup
- Specialized Supplies
- Baseline and Backup
- Disaster Period Operational Procedures
- End of Disaster Protocol and Procedures
19DRP Development Notes (Cont.)
- 6. Testing Approaches
- Checklist
- Structured walk-through
- Simulation
- Parallel
- Full-interruption
- Note Parallel and Full-interruption tests can
be very time-consuming, labor intensive and
expensive. While they provide a high level of
assurance, usually only extremely important,
mission critical applications will have the full
range of tests applied.
20DRP Development Notes (Cont.)
- 7. Maintenance Program Options
- Mandatory Activity for System Modifications
- Periodic Updates
- Combined approach
- 8. Test and Implement
- (Note Implementation of a Disaster Recovery
Plan that does not include testing is a disaster
waiting to happen.)
21Ivory Tower meets Real World
Formal Disaster Recovery Plan
22Potential DRP Problems
- The DRP doesnt work as intended
- Unrealistic or non-existent testing
- Unrealistic estimates/expectations relevant to
actual disaster - Out-of-date DRP due to lack of maintenance
- The actual disaster was not addressed by the plan
- The potential for the disaster was overlooked or
discounted - The disaster was outside the scope of the plan
23Applying Lessons Learned from Previous
Disasters Can Help
- What worked?
- What didnt?
- What else is needed?
- What would we do differently next time?
- What should we do now to be prepared for next
time?
24Lessons Learned in Oklahoma
- ALL personnel should receive mandatory training
- Employers need to be prepared to meet the needs
of personnel - Personnels skills and special training can make
a difference - Good corporate interfaces with law
enforcement/public safety organizations are
valuable
Smith, Lloyd R., Lessons from Oklahoma City
Your EmployeesTheir Needs, Their Role in
Response and Recovery, http//www.disaster-resou
rce.com/articles/96smith.htm
25Lessons Learned in Oklahoma
- Personnel accountability is a high priority
- Visitors and guests need to be considered in
emergency procedures - Issues of pay are important in times of disaster
resolve and communicate - Develop an equitable distribution of work
Smith, Lloyd R., Lessons from Oklahoma City
Your EmployeesTheir Needs, Their Role in
Response and Recovery, http//www.disaster-resou
rce.com/articles/96smith.htm
26Agenda
- Security Responsibility in the Disaster Recovery
Arena - Disaster Recovery Planning
- Recent New York (Disaster Recovery) Experiences
27Closer to Home
- Lessons Learned from the SWA environment are
particularly valuable - to other SWAs
28Dual Disaster Potential The SWA Environment
SWA resources at risk
Community resources at risk
Individuals affected by disaster requiring SWA
Services
SWA
UI/DUA/EB/EUC -- ES
29New York Experiences
- What happened from some people who were there
Charlene Huggard Core Team Tax Project
Coordinator Patricia Arcari Core Team Benefits
Project Coordinator UISM Project NYS Department
of Labor
30Resources and Contacts
31Additional DRP Resources
- The following web site has numerous articles and
guidelines to support business continuity and
disaster recovery planning http//www.infosyssec
.org/infosyssec/buscon1.htm - The site also contains multiple links to other
disaster recovery resources, including government
sites (e.g., FEMA), associations (e.g., the Red
Cross) and organizations and sites dedicated to
risk management and disaster recovery and
business continuity issues - The ITSC web site
- http//www.itsc.org
- Hot Topics ? ITSC Deliverables ? C-Series ?
Project C-6 - Contingency Planning for Disaster Recovery
Applicable to UI Call Center Operations
32ITSC Contacts
- ITSC Security Contacts
- Steve Miksell (301) 982-1116
- smiksell_at_itsc.org or
- Jane Powanda (301) 513-0143
- jpowanda _at_ itsc.org
- ITSC Management Contacts
- Henry James (301) 982-1575
- hjames_at_itsc.org
33Notes