Вы находитесь на странице: 1из 2

TECH UPDATE

i i An inside look at technologies and standards

Steps to disaster-recovery planning


BY BRUCE BEAMAN AND BECKY ALBIN port (and fund) contingency policies.

U
npredictability is a fact of life. Whether from terrorist attacks, cata- Step 6 - Develop a BCDR contingency plan.
clysmic weather or just a backhoe severing a power cable, enter- Flowing directly out of contingency policies,
the contingency plan details the roles and
prises never know when their operations may be threatened. responsibilities of departments and individu-
als in keeping technology systems available,as
Mitigating the consequences of disasters, WAN topology to keep a single threat from well as the procedures for restoring IT systems
however, need not be a matter of worry and bringing a business to a standstill. during an emergency Other key elements of
guesswork. Here are seven steps to effective contingency planning include resource re-
busines&continuity and disaster-recovery (BC- Step 4 - Inventory the organization's IT quirements, training needs, the frequency of
DR) planning that will provide some guidance. assets. Once an organization has sketched out training exercises and testing, maintenance
the topology of its BCDR infrastructure, the schedules, and data-backup schedules.
Step 1 - Admit the possibility of disaster. Just next step is to develop an accurate inventory The phases of a contingency plan include
as the first step to personal recovery is to of IT assets. This enables the organization to the initial notification and activation when the
admit one has a problem, so the first step in understand the resources and business emergency strikes, restoration and recovery
BCDR planning is to admit the organization processes that need to be protected. once emergency teams have been mobilized,
faces tangible threats that could jeopardize its A range of enterprise-management tools are and finally a return to normal operation or
prosperity or its survival. Until senior lead-
ership takes this first step, go no further.
The world may be too complex for organizations to protect
Step 2 - List and categorize possible threats against every disaster contingency, but with the right tech-
to the organization. The nature of the busi- nologies, clear service-level expectations, practical recovery
ness and its physical and social environment
will influence the types of threats an organi- policies . . . organizations can minimize the business conse-
zation might face. Once listed, the threats quences when the unexpected happens.
should be categorized according to their
probable impact on various systems.The cost
of the response should be balanced against available to help organizations develop and a decision to remain on backup resources if
the business' tolerance for system downtime maintain accurate inventories of FT resources. primary resources must be replaced or rebuilt
the less downtime can be tolerated, the Vendors offer modules that use software agents over a significant period of time.
more it will cost to create an appropriate to scour the IT infrastructure, storing details
response. Some systems must be functioning about hardware and software assets and their Step 7 - Test the BCDR contingency plan.
again within minutes or seconds, while oth- configuration parameters in configuration Disaster-recovery experts say one of the most
ers can be down a few hours and still oth- management databases (CMDB). important yet frequently overlooked aspects
ers can be down for a few days without seri- of disaster-recovery planning comes after for-
ous consequences. Step 5 - Set service-level expectations and mal policies and procedures are delineated.
define contingency policies. CMDBs store Plans must be tested initially for their com-
Step 3 - Outline the organization's BCDR not only the details about the organization's pleteness and effectiveness, then retested on
technology infrastructure. The key technology software and hardware assets, but also infor- an ongoing basis to make sure that any subse-
elements of a BCDR infrastructure are a prima- mation about service-level agreements (SLA) quent changes to IT infrastructure and busi-
ry data center, a remote site that duplicates the that define those assets' uptime and recovery ness processes haven't created a need for pol-
resources in that primary location, and high- parameters. Recalling Step 2, it is important icy modifications.
bandwidth network connections. The best that senior management buy into service- In addition, organizations should create test
BCDR strategies follow a "redundant every- level expectations, because these will deter- beds that accurately reflect day-to-day, busi-
thing" philosophy throughout the data center. mine whether a particular asset must be up ness conditions, so that drills simulate real-
Multiple mainframes and servers should run in and running within 5 minutes or 5 hours of world conditions.
the production and backup data facilities. an outage. This determination directly influ- The world may be too complex for organi-
Then, if a component in the production system ences the BCDR expenditures senior man- zations to protect against every disaster con-
encounters problems, it immediately fails over agement later will be asked to support. tingency but with the right technologies, clear
to the local backup as a first line of defense. Based on a clear knowledge of assets, config- service-level expectations, practical recovery
Fbwer supplies are one of the most critical urations and SLAs, an organization can define policies, thorough contingency plans and rig-
components in a BCDR strategy Fbwer outages contingency policies.These policies must have orous testing methodologies, organizations
rank among the leading most common and executive-level support, and therefore have to can minimize the business consequences
preventable disruptions, according to industry link IT-asset performance directly to business when the unexpected happens.
analyses. requirements. To form this important link, the
No matter how fat the network pipe may be, organization will have to perform a business- Beaman is senior director ofAdabas Product
it will be of little use if a careless construction impact analysis to flesh out the details of sys- Marketing at Software AG, andAlbin is chief IT
crew accidentally severs a fiber. Network con- tem requirements, processes and systems' inter- architect of Software AC. Contact them at
nections not only must be redundant, they relationships. Executives must understand the bruce.beaman@softwareagusa.com and beck
also must follow different paths within a wider consequences of system disruptions to sup- y. albin @softwareagusa. com.

www.networkworld.com JUNE 30-JULY 7, 2008 25

Вам также может понравиться