Title: Principles of Incident Response and Disaster Recovery
1Principles of Incident Response and Disaster
Recovery
- Chapter 7
- Disaster Recovery Preparation and Implementation
2Objectives
- Understand the ways to classify disasters, both
by speed of onset and source - Know who should form the membership of the
disaster recovery team - Understand the key functions of the disaster plan
- Explain the key concepts included in the NIST
approach to technical contingency planning - Describe the elements of a sample disaster
recovery plan
3Objectives (continued)
- Understand the need for simultaneous wide access
to the planning documents as well as the need for
securing the sensitive content of the DR plans
4Introduction
- Disaster recovery planning preparation for and
recovery from a disaster - Disaster may be an escalated incident or may be
immediately classified as a disaster - In general, a disaster is an incident that cannot
be contained or whose impact is not controllable - All business units of an organization need to be
involved in disaster recovery planning, not just
IT
5Disaster Classifications
- Disasters can be classified by cause
- Man-made war, terrorism, cyberterrorism, etc.
- Natural fire, flood, earthquake, hurricane,
lightning, tornado, etc. - Disasters can be classified by speed of
development - Rapid onset occur suddenly with little warning
- Slow onset occur over time and deteriorate the
capacity of the organization to withstand
6Disaster Classifications (continued)
7Disaster Classifications (continued)
8Forming the Disaster Recovery Team
- Disaster recovery team is assembled by the CPMT
- Should include members from IT, InfoSec, and
other departments - DR team is responsible for planning for DR and
for leading the DR process when a disaster is
declared - Must consider the organization of the DR team and
the needs for documentation and equipment
9Organization
- DR team
- Should include representatives from every major
organizational unit - Should be separate from other contingency-related
teams - May include senior management, corporate support
units, facilities, fire and safety, maintenance,
IT, InfoSec - May be advisable to divide the team up into
subteams
10Organization (continued)
- Subteams may include
- Disaster management team command and control,
responsible for planning and coordination - Communications public relations and legal
representatives to interface with senior
management and general public - Computer recovery (hardware) recovers physical
computing assets - Systems (OS) recovery recovers operating systems
- Network recovery recovers network wiring and
hardware
11Organization (continued)
- Subteams (continued)
- Storage recovery recovers storage area networks
and network attached storage - Applications recovery recovers applications and
reintegrates users back into the systems - Data management recovers and restores data
- Vendor contact works with suppliers and vendors
to replace damaged or destroyed materials,
equipment, or services - Damage assessment and salvage provides initial
assessments of damage and recovers salvageable
items
12Organization (continued)
- Subteams (continued)
- Business interface works with remainder of
organization to assist in recovery of
non-technology functions - Logistics provides supplies, space, materials,
food, services, or facilities needed at the
primary site - Other teams needed to reestablish key business
functions as needed
13Special Documentation and Equipment
- All team members
- Should have multiple copies of the DR and BC
plans at home and office for immediate use when
disaster occurs - Should have access to certain disaster recovery
materials, including software, hardware, building
blueprints, key phone numbers, emergency
supplies, etc.
14Disaster Planning Functions
- Guidelines are found in NIST Contingency Planning
Guide for Information Technology Systems - Planning process steps
- Develop the DR planning policy statement
- Review the business impact analysis (BIA)
- Identify preventive controls
- Develop recovery strategies
- Develop the DR plan document
- Test, train, and rehearse
- Plan maintenance
15Develop the DR Planning Policy Statement
- DR policy should contain these key elements
- Purpose
- Scope
- Roles and responsibilities
- Resource requirements
- Training requirements
- Exercise and testing schedules
- Plan maintenance schedules
- Special considerations
16Develop the DR Planning Policy Statement
(continued)
- Purpose
- Provide for the direction and guidance of any and
all DR operations - Must include executive vision and commitment
- Business disaster recovery policy should apply to
the entire organization - Scope
- Identifies the organizational units and groups of
employees to which the policy applies - Roles and responsibilities
- Identifies the key players and their
responsibilities
17Develop the DR Planning Policy Statement
(continued)
- Resource requirements
- Identifies any specific resources to be dedicated
to the development of the DR plan - Training requirements
- Details training related to the DR plan
- Exercise and testing schedules
- Specifies the frequency of testing of the DR plan
- Plan maintenance schedules
- Details the schedule for review and update of the
plan
18Develop the DR Planning Policy Statement
(continued)
- Special considerations
- May include issues such as information storage
and retrieval plans, off-site and on-site backup
schemes, or other issues
19Review the Business Impact Analysis
- Review the BIA within the DR context
- Ensure that the BIA is compatible with the DR
specific plans and operations - BIA is usually acceptable as it was prepared and
released by the CPMT
20Identify Preventive Controls
- This function should have already been performed
as part of ongoing information security posture - DP team should review and verify that data
storage and recovery techniques are implemented,
tested, and maintained
21Develop Recovery Strategies
- May be impossible to prepare for all diverse
contingencies, but recovery strategies should be
in place for the most likely disasters - DR strategies
- Go substantially beyond the recovery portion of
database backup and recovery - Must include the steps to fully restore the
operational status of the organization - Includes personnel, equipment, applications,
data, communications, and support services
(power, water, etc.)
22Develop Recovery Strategies (continued)
- DR strategies must include the enlistment and
retention of qualified general contractors
capable of assessing damage and rebuilding the
facility - May want to include the general contractor in the
DR training and rehearsals - If the primary site is a leased facility, include
the leasing agency
23Develop the DR Plan Document
- DR planning document should contain specific and
detailed guidelines and procedures for restoring
lost or damaged capabilities - Steps
- DR team takes the IR plan and converts incidents
to disasters - DR team adds additional disasters not in the IR
document, and creates disaster scenarios - DR team develops 3 sets of activities for each
scenario - Activities during the disaster are placed first,
then follow-up activities, and finally occasional
activities
24Develop the DR Plan Document (continued)
- Procedures during the disaster
- Procedures that must be performed during the
disaster, if any - Grouped and assigned to individuals
- May include evacuation plans, locations of
shelters, fire suppression systems, other
emergency reaction items - Must be readily available for use during a
disaster - Procedures after the disaster
- Procedures performed immediately after
- May include crisis management procedures
25Develop the DR Plan Document (continued)
- Before the disaster
- Procedures to prepare for the disaster
- May include data backup, disaster recovery
preparation, training schedules, testing plans,
copies of service agreements, business continuity
plans, etc. - DR addendums
- One for each type of anticipated disaster
- Includes the trigger, notification method,
response time
26Develop the DR Plan Document (continued)
27Develop the DR Plan Document (continued)
- Trigger point at which a management decision to
react is made - Planning for actions taken during the disaster
- Most important part is planning the actions
before phase - Should create reaction scenarios
- Planning for events occurring after the
disaster - Includes recovery operations, identification of
potential follow-on attacks, and forensics
analysis - Must conduct an action-after review (AAR)
28Develop the DR Plan Document (continued)
- Forensics analysis process of systematically
examining information assets for evidentiary
material that can provide insight into the cause - After-action review (AAR) detailed examination
of the events that occurred from detection to
final recovery - Planning for actions taken before the disaster
- Includes preventive controls, risk management,
team preparedness, stocking of critical
consumables, execution of service and support
contracts
29Plan Testing, Training, and Exercises
- Training can be used to test the validity and
effectiveness of the DR plan - Testing should be an ongoing activity, at least
semiannually at the walk-through level - Final assembly of the DR plan can take place
after testing and training
30Plan Maintenance
- Plan must be a dynamic document that is updated
regularly - Revisit the DR plan at least annually to update
plans, contracts, and agreements - Make necessary personnel and equipment
modifications - Any change in the organizations size, location,
or business focus must be incorporated into the
DR and CP plans, and the BIA should also be
reviewed
31Technical Contingency Planning Considerations
- Technical contingency planning is based on the
type of IT platforms - Desktop computers and portable systems
- Servers
- Web sites
- Local area networks
- Wide area networks
- Distributed systems
- Mainframe systems
32Technical Contingency Planning Considerations
(continued)
- For each platform type, two perspectives are
considered - Technical requirements that should be considered,
including preventive and recovery measures - Technology-based solutions that may be used
- Some contingency measures are common to all IT
systems
33Technical Contingency Planning Considerations
(continued)
- Common considerations include
- Frequency of backup and off-site storage of data,
applications, and operating systems - Redundancy of critical system components
- Documentation of system configurations and
requirements - Interoperability between system components and
between primary and alternate site equipment to
expedite system recovery - Appropriately sized and configured power
management systems and environmental controls
34Desktop Computers and Portable Systems
- Contingency considerations should emphasize data
availability, confidentiality, and integrity - Should consider these practices
- Store backups off-site
- Encourage individuals to back up data
- Provide guidance on saving data on PCs
- Standardize hardware, software, and peripherals
- Document system configuration and vendor
information - Coordinate with security policies and controls
- Use results from BIA
35Desktop Computers and Portable Systems (continued)
- Contingency strategies may include
- Document system configuration and vendor
information - Standardize hardware, software, and peripherals
- Provide guidelines on backing up data
- Ensure interoperability among components
- Coordinate with security policies and controls
- Backup applications and store off-site
- Use alternate hard drives
- Image disks and standardize images
36Desktop Computers and Portable Systems (continued)
- Contingency strategies (continued)
- Implement redundancy in critical system
components - Use uninterruptible power supplies
37Servers
- Address server vulnerabilities by considering
these practices - Store backup media and software off site
- Standardize hardware, software, and peripherals
- Document system configuration and vendor
information - Coordinate with security policies and controls
- Use results from BIA
38Servers (continued)
- Contingency strategies may include
- Document system configuration and vendor
information - Standardize hardware, software, and peripherals
- Coordinate with security policies and controls
- Ensure interoperability among components
- Backup data and store off-site
- Use uninterruptible power supplies
- Implement redundancy in critical system
components
39Servers (continued)
- Contingency strategies (continued)
- Implement fault tolerance in critical system
components - Replicate data
- Implement storage solutions
40Web Sites
- In addition to information about servers, these
practices should be considered - Document Web site
- Web site programming should use documented change
management - Web site coding should be relative, not absolute,
allowing quick reconfiguration if needed - Coordinate contingency solutions with appropriate
security policies and controls - Coordinate contingency solutions with incident
response procedures - Use results from BIA
41Web Sites (continued)
- Contingency strategies may include
- Document Web site
- Code, program, and document Web site properly
- Coordinate with security policies and controls
- Consider contingencies of supporting
infrastructure - Implement load balancing
- Coordinate with incident response procedures
42Local Area Networks
- Consider the following practices
- Physical and logical LAN should be well
documented - System configuration and vendor information
should be well documented - Coordinate with security policies and controls
- Use results from BIA
- Identify single points of failure that affect
critical systems or processes outlined in the BIA - Identify threats to the cabling system such as
cable cuts, electromagnetic and radio frequency
interference, and damage from fire, water, and
other hazards
43Local Area Networks (continued)
- Contingency strategies may include
- Document the LAN
- Coordinate with vendors
- Coordinate with security policies and controls
- Identify single points of failure
- Implement redundancy in critical components
- Monitor the LAN
- Integrate remote access and wireless area network
technology
44Wide Area Networks
- Consider the following practices
- Physical and logical LAN should be well
documented - System configuration and vendor information
should be well documented - Coordinate with security policies and controls
- Use results from BIA
45Wide Area Networks (continued)
- Contingency strategies may include
- Document the WAN
- Coordinate with vendors
- Coordinate with security policies and controls
- Identify single points of failure
- Implement redundancy in critical components
- Institute service-level agreements
46Distributed Systems
- Consider the following practices
- Standardize hardware, software, and peripherals
- Document system configuration and vendor
information - Coordinate with security policies and controls
- Use results from the BIA
47Distributed Systems (continued)
- Contingency strategies may include
- Standardize components
- Document system
- Coordinate with vendors
- Coordinate with security policies and controls
- Consider server contingency solutions
- Consider LAN contingency solution
- Consider WAN contingency solution
48Mainframe Systems
- Consider the following practices
- Store backup media off site
- Document system configurations and vendors
- Coordinate with network security policies and
system security controls - Use results from the BIA
49Mainframe Systems (continued)
- Contingency strategies may include
- Backup data and store off site
- Document system
- Coordinate with vendors
- Coordinate with security policies and controls
- Implement redundancy and fault tolerance in
critical system components - Consider hot site or reciprocal agreement
- Institute vendor service-level agreements (SLAs)
- Replicate data
- Implement storage solutions
- Use uninterruptible power supplies
50Summary of Technical Contingency Planning
Considerations
51Summary of Technical Contingency Planning
Considerations (continued)
52Sample Disaster Recovery Plans
53Sample Disaster Recovery Plans (continued)
54Sample Disaster Recovery Plans (continued)
55Sample Disaster Recovery Plans (continued)
56Sample Disaster Recovery Plans (continued)
57Sample Disaster Recovery Plans (continued)
58The Combined DR Plan/BC Plan
- Many organizations prepare DR and BC plans at the
same time and combine them into a single plan - Must be able to support reestablishment of
operations at two different locations - Immediately at an alternate site
- Eventually back at the primary site
- Execution of a combined plan requires separate
execution teams
59Final Comments on the DR Plan
- Planning process for the DR plan/BC plan should
be tied to, but distinct from, the IR plan - These 3 processes should be tightly integrated to
allow reaction teams to easily transition from
incident response to disaster recovery and
business continuity planning - Appendix B contains a sample NIST contingency
plan - Remember to keep the plan available but secure
60Summary
- DR planning is the preparation for and recovery
from a disaster - Disasters can be classified by source (natural or
man-made) or by speed of development (rapid onset
or slow onset) - CPMT assembles the DR team, consisting of
representatives from every major organizational
unit - Members of the DR team do not serve on IR or BC
team because of overlapping duties - DR team may consist of many subteams
61Summary (continued)
- All members of DR team should have multiple
copies of the DR and BC plans available to them
at home and office - DR policy is the first deliverable
- Effective preventive controls implemented for
security also facilitate recovery of information - DR plan should contain detailed procedures for
restoring lost or damaged information, in 3
phases - During the disaster
- After the disaster
- Before the disaster
62Summary (continued)
- Training in the use of the DR plan can be used to
test the validity and effectiveness of the plan - Testing of the plan is an ongoing activity, with
each scenario tested at least semiannually at the
walk-through level