Business Continuity and Disaster Recovery Planning

1 / 35
About This Presentation
Title:

Business Continuity and Disaster Recovery Planning

Description:

Ignored the potential for wide-spread disaster including disruption of multiple sites ... Analyze the risk of disaster in specific areas of the business. ... – PowerPoint PPT presentation

Number of Views:528
Avg rating:3.0/5.0

less

Transcript and Presenter's Notes

Title: Business Continuity and Disaster Recovery Planning


1
Business Continuity and Disaster Recovery
Planning
MFA Panel
May 11, 2004 NYC
www.aisgrp.com
2
Panel Participant
CTO co-founder of Alternative Investment
Solutions, LLC Founder of eSpoc, a financial
technology firm Head of infrastructure at
Lehman Brothers
Author of 5 US patents, referenced in 70 follow
up patents Author of Mission Critical Systems
Management, Prentice Hall, 1997
With foreword by Kevin McGilloway,
2
CIO of Lehman Brothers
3
Agenda
Compelling events
Recovery metrics and cost balancing
Contingency plan evolution Disaster Recovery
Planning Data Center
www.aisgrp.com
3
4
Compelling Events
Regulation
- NFA Rule 2-38 (Paragraph 5152), Self-Exam 2003
- NYSE Rule 446
- NASD 3510, 3520
Growing dependency chains Wear and tear
Sabotage and terrorism
www.aisgrp.com
4
5
Regulation SEC 17a-4
Scope
- Member, broker, or dealer
- All trade data, accounting data, and emails
Availability term
- All-time availability
Recovery deadlines
- Immediate
Special instructions
- Preserve the records in a non-rewriteable,
non-erasable format (WORM) - Automatic quality
verification
Results of automated quality verification
available for audit at all times for 3 years
- Time-date indices, downloadable to any media -
Separate storage
www.aisgrp.com
5
6
Growing Dependency Chain
Money manager
Executing broker
Data
Application
Electronic execution
Server
Prime broker
Network
Facility
Custodian
Business process Personnel
Accounting Technology
  • General Ledger
  • Portfolio System
  • Risk Management

www.aisgrp.com
6
7
Lessons of September 11
Ignored the potential for wide-spread
disaster including disruption of multiple sites
Business concentrations intensified the
impact of disruptions
- Geographic
- Critical market functions, e.g., clearing and
settlement of funds, securities, and contracts
- Telecommunications vulnerabilities
Interdependence among financial-system
participants
- Some customers were affected by actions of
institutions with which they did not even do
business, e.g., funds or securities could not be
delivered because of operational problems of
other institutions
- Liquidity bottlenecks became so severe that
the Federal Reserve needed to lend substantial
amounts directly to institutions through the
discount window
www.aisgrp.com
7
8
Agenda
Compelling events
Recovery metrics and cost balancing
Contingency plan evolution
Disaster Recovery Planning Data Center
www.aisgrp.com
8
9
Steps for Financial Institutions
Tactical steps
- Enhance security, update communications plans,
improve real-time data backup
Strategic steps
- Migrate from traditional active-backup site
pair to split-operations model
- Diversify telecommunications methods and
vendors - Respond to client expectation for
consistent,
coordinated, and transparent business
continuity planning
www.aisgrp.com
9
10
Recovery Cost Balancing
How long can you afford the system to be down?
Cost
Cost of Disruption
Cost to recover
Time
www.aisgrp.com
10
11
Disaster Recovery Metrics
MTTR - Mean time to recover ADL - Allowable
data loss
Retention - How long backups are stored
www.aisgrp.com
11
12
DR Levels
Static Data
Dynamic Data
MMTR
ADL
Retention
Entry
Email
None
1 Day
1 Day
Days or
Weeks
Documents
Mid
Application
Databases
Minutes
Minutes
Months or
Servers
or Hours
or Hours
Years
Enterprise
Any
Any
zero
zero
Unlimited
(WORM)
www.aisgrp.com
12
13
Agenda
Compelling events
Recovery metrics and cost balancing
Contingency plan evolution Disaster Recovery
Planning Data Center
www.aisgrp.com
13
14
Contingency Plan Evolution
Primary
Backup
Split
Split
Business
Business
Business
Business
Operations
Operations
Operations
Operations
Primary
Backup
Split
Split
Data Center
Data Center
Data Center
Data Center
Only the primary site is active
All sites are active performing
Requires identical copies of
some of the functions
technology and up-to-date data
More expensive
Relies on relocating staff
www.aisgrp.com
14
15
Distributed Data Centers
Trade Capture
Risk System
Distributed
Tra
de Capture
Risk System
Data Center
Partial
Trader Workstation
Functionality
Points of
Multiple
GL
CRM
Failure
Dependencies
Multiple
Bac
Sal
GL
CRM
Wo
Wo
Work
Location
Back Office
Salesperson
Location
dependent
Workstation
Workstation
Redundancy
Complex
Excel
Expensive
Excel
Reporting
Data Transfer
Analyst Workstation
www.aisgrp.com
15
16
Centralized Data Center
Distributed
Centralized
Trade Capture
Risk System
Data Center
Partial
Complete
Functionality
GL
CRM
Points of
Multiple
Single
Excel
Failure
Reporting
Data Transfer
Dependencies
Multiple
Few
Terminal Server
Work
Location
Generic
Generic Workstations
Location
dependent
Redundancy
Complex
Simple
Expensive
Inexpensive
www.aisgrp.com
16
17
Agenda
Compelling events
Recovery metrics and cost balancing
Contingency plan evolution Disaster Recovery
Planning Data Center
www.aisgrp.com
17
18
IT Contingency Planning
Develop contingency planning policy Conduct
business impact/downtime tolerance analysis
Identify preventive controls Develop recovery
strategies Test and train
Maintain
www.aisgrp.com
18
19
Types of Contingency Plans
Plan
Purpose
Scope
Business Continuity
Sustaining business operations while
Addresses business processes IT
recovering from disruption
addressed only on its support for business
Business Process Recovery
Procedures for recovering operations
As above
immediately following a disaster
Continuity of Operations
Procedures and capabilities to sustain
The most mission-critical subset of
essential strategic functions at an alternate
organization not IT focused
site for up to 30 days
Continuity of Support/IT Contingency
Procedures and capabilities for recovering a
Addresses IT systems disruptions, not
major application or general support system
business process focused
Crisis Communications
Procedures for disseminating status reports
Communications with personnel not IT
Cyber Incident Response
Procedures to detect, respond to, and limit
Focused on information security and
consequences of malicious cyber incident
responses to incidents affecting systems
Disaster Recovery
Procedures to facilitate recovery of
IT-focused, limited to major disruptions
capabilities at an alternate site
with long-term effects
Occupant Emergency
Procedures to minimize loss of life or injury
Focuses on personnel and property, not
and protect property damage in response to
business or IT
physical threat
www.aisgrp.com
19
20
Disaster Recovery Security Plan
Security assessment
  • External Penetration Testing,
  • Internal Security Assessment,
  • Operational Analysis

Business impact analysis
  • Analyze the risk of disaster in specific areas
    of the business. Include natural disasters, the
    risk of sabotage, physical violence, and cyber
    crime.
  • Define the impact of potential disasters on
    your organization.

Documentation
- Detailed network diagrams, including operating
systems, equipment functionality,
applications/users supported, and vendors
utilized.
- Enumerate applications, including information
about installation, licensing, security, and
passwords.
- Identify services, including cable, DSL,
satellite, phones, outsourcing, etc.
Detailed planning
www.aisgrp.com
20
21
Detailed Disaster Recovery Plan
1. Prioritization list to order pieces of the
network (hardware) and applications and services
must be restored first in the event of a
disaster.
2. Define hot/cold site requirements.
  • Key contact and organizational chart. Include
    vendors, consultants, media, insurance, and other
    stakeholders.
  • Organize recovery teams. Divide the recovery
    process into various objectives and create teams
    who will be responsible for meeting these
    objectives.

www.aisgrp.com
21
22
Offsite Storage Facility Selection
Geography - distance and the likelihood to be
affected by the same disaster
Accessibility -operating hours and the time to
retrieve the data
Security - capabilities and employee
confidentiality Environment - structural and
environmental conditions
(humidity, fire-prevention, temperature, power
management)
Cost - cost of shipping, operational fees,
disaster response services
www.aisgrp.com
22
23
Alternate Site
Cold
  • Adequate space and infrastructure
  • No IT or office automation equipment

Warm
- Often used for another function, which is
displaced temporarily to accommodate the
disrupted system
Hot
- Configured with all system hardware,
infrastructure, and support personnel
Mirrored
- Fully redundant infrastructure, systems, and
data
www.aisgrp.com
23
24
Selecting Right Team
Leaders and knowledge
- Caveat too many leaders can spoil the best a
plan.
Calming yet responsive people
Discipline will they stick to the plan and
know not to interfere? Decision makers
  • Can they be decisive given the facts not the
    fiction?
  • Can they be relied upon to speak up when
    adjustments are needed?

Team players
- Will they go into crisis mode to get the job
done?
Strong administrators
- Who will support you without getting under
your feet or second-guessing and who will record
every detail so it can be counted as legal
evidence?
www.aisgrp.com
24
25
Sample Call Tree
Contingency Planning Coordinator
Alternate Contingency
Planning Coordinator
Network Recovery Team Leader
Database Recovery Team Leader
Telecommunications Team Leader
Server Recovery Team Leader
Network OS Admin
DBA
WAN engineer
email
Desktop Support Technician
DBA
Telecom Technician
Servers
Help Desk Technician
Applications
www.aisgrp.com
25
26
External Penetration Testing
Discovery gathering relevant information
- Sources include whois databases, search
engines, and other publicly available sites.
- Details collected include domain names, host
names, and network boundaries, i.e., firewalls,
routers, and intrusion detection systems.
Enumeration extract information about each
component.
- Use netcat, banners, and anonymous
connections.
Vulnerability mapping map system attributes
against vulnerabilities Exploitation
perform a controlled attack to verify results by
exploiting the vulnerabilities identified in the
mapping phase
www.aisgrp.com
26
27
Scheduled Vulnerability Scans
Regularly scheduled network vulnerability
scans can detect these new vulnerabilities so you
can take corrective action before an attack
occurs.
Automated scans on a predetermined schedule.
- Commercial and Open Source scanning tools
Reporting
  • Pro-active alerts when a vulnerability is
    detected
  • Next business day delivery of an alert report.
  • Monthly or Quarterly reports

date and time of tests,
vulnerabilities detected, configuration
changes, and corrective actions required
www.aisgrp.com
27
28
Internal Security Assessment
Determine vulnerabilities that may result from
- poor configuration,
- gaps in security,
- out-dated service patches
Identify performance issues due to poor
configuration
www.aisgrp.com
28
29
Disaster Recovery Plan
Operational Analysis
Policies, practices, procedures Physical
security
Network practices Critical services
Help desk
Passwords/usernames and account policies
Internet use
e-mail and anti-virus deployment
Connectivity issues
Backup data storage File storage
Equipment/system documentation review
www.aisgrp.com
29
30
Server Contingency Solutions
Availability
Virtualization
Load Balancing
Disk Replication
Electronic Vaulting
Redundant Arrays of
Remote Journaling
Independent Disks
Cost
System Backups
www.aisgrp.com
30
31
Agenda
Compelling events
Recovery metrics and cost balancing
Contingency plan evolution Disaster Recovery
Planning
Data Center
www.aisgrp.com
31
32
Data Center

The data center facility 35,000 Square Feet

Disaster recovery is facilitated by two
redundant secondary sites

Comprehensive backups are performed
nightly to both sites

The data center is built upon multiple
dedicated OC192 back bone

Redundant power and network architecture

Sophisticated and multi-faceted security
systems

High-tech fire suppression

Highly trained staff is available on site 24x7
www.aisgrp.com
32
33
Amenities and Network Architecture
Amenities
Network Architecture
Reinforced concrete masonry with
Multiple OC 192s, 48s going to
brick
various cities
State of the art 19" 23" Wright line
Redundant paths into the building
cabinets
allow for fail over
Each cabinet is equipped with 2-110v,
MFN owns 1 AS number thus
20-amp redundant circuits along with 2
international transit is not seen as a
power strips containing 8 receptacles
network hop
each
10/100 FE line of GigE line as needed
www.aisgrp.com
33
34
Fire Suppression and Power Supply
Fire Suppression
VESDA system detects and dry action piping
Pre action water system (no water in pipes)
Zoned sprinkler heads work independently Air
sampler system for smoke monitoring upon
smoke detection, water will begin flowing through
the pipes.
Once the heat melts the specific sprinkler tip
(165 degrees) the water will be dispersed
Power Supply
Multiple Diesel Generators
Inertial Flywheel during change to backup power
www.aisgrp.com
34
35
Security Systems

24/7 Security on site
CCTV cameras used to monitor internal and
external activities
Data Center activity is stored on tape
All persons entering must show
government issued picture ID. Picture and name
cross checked with access list
On-site key control system to manage access
to customer cabinets

www.aisgrp.com
35
Write a Comment
User Comments (0)