Disaster Recovery

Download Report

Transcript Disaster Recovery

Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Disaster Recovery, Business Continuity,
and Organizational Policies
Chapter 19
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Objectives
• Describe the various ways backups are
conducted and stored.
• Explain different strategies for alternative site
processing.
• Describe the various components of a business
continuity plan.
• Explain how policies and procedures play a daily
role in addressing the security needs of an
organization.
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Key Terms
•
•
•
•
•
•
•
© 2010
Acceptable use policy (AUP)
Business continuity plan (BCP)
Business impact assessment (BIA)
Cold site
Delta backup
Differential backup
Disaster recovery plan (DRP)
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Key Terms (continued)
•
•
•
•
•
•
•
•
© 2010
Due care
Due diligence
Fault tolerance
Full backup
High availability
Hot site
Incident response policy
Incremental backup
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Key Terms (continued)
•
•
•
•
•
•
•
•
© 2010
Least privilege
Mutual aid agreement
Policies
Procedures
Separation of duties
Service level agreement (SLA)
Standards
Warm site
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Disaster Recovery
• Organizations face a variety of disaster
scenarios.
• Disasters can be caused by nature or manmade
events.
• Disaster recovery plans consider all types of
organizational disruption.
• Different disruptions will require different
recovery strategies.
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Disaster Recovery Plans (DRP) / Process
• DRPs intended to minimize disaster impact.
– Defines the data, resources, and necessary
steps to restore critical organizational
processes.
• Planning process, initial phase:
– Consider needed resources to perform the company’s
mission.
– Identify critical functions.
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Disaster Recovery Plans / Process
(continued)
• Initial phase yields the business impact
assessment (BIA).
• Continued planning includes:
– Outline of processes and procedures to restore an
organizations critical operations
– Prioritized according to criticality for restoral
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Category
Level of the Function’s Need
Critical
Absolutely essential for operations.
The function is needed immediately. The
Without the function, the basic mission organization cannot function without it.
of the organization cannot occur.
Necessary
for normal
processing
Required for normal processing, but
the organization can live without it for
a short period of time.
Can live without it for at most 30 days
before your organization is severely
impacted.
Desirable
Not needed for normal processing but
enhances the organization’s ability to
conduct its mission efficiently.
Can live without the function for more
than 30 days, but it is a function that will
eventually need to be accomplished when
normal operations are restored.
Optional
Nice to have but does not affect the
operation of the organization.
Not essential, and no subsequent
processing will be required to restore this
function.
Consider
eliminating
No discernable purpose for the
function.
No impact to the organization; the
function is not needed for any
organizational purpose.
© 2010
How Long Can the Organization
Last Without the Function
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Business Continuity Plan (BCP)
• Focuses on continued operation of a business in
extenuating circumstances.
• Stronger emphasis placed on critical systems.
• Will describe the functions that are most critical, based
on a previously conducted BIA.
• Will describe the order in which functions should be
returned to operation.
• Describes what is needed for the business to continue
to operate.
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Backups
• Critical part of BCP and BRP
• Provides valid, uncorrupted data for restoration
• Good backups include all needed files
– Applications, operations systems, and utilities
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
What Needs to Be Backed Up?
•
•
•
•
•
Data
Application programs
Operating systems
Utilities for the hardware platform
Personnel, equipment, and electrical power must
also be part of the plan.
• Backup plan should back up the files that
change more often than the files that do not
chance much.
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Backup Strategy
• Backup considerations
– Size of the resulting backup
– Media used for the backup
– How long backups will be stored
• Four types of backups
– Full, differential, incremental, delta
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Backup Types
• Full backup
– All files copied onto the storage media
• Differential backup
– Files that have changed since last full backup
• Incremental backup
– Files since last for full or incremental backup
• Delta backup
– Portions of files changed since last backup
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Characteristics of Different Backup Types
© 2010
Full
Differential
Incremental
Delta
Amount of Space
Large
Medium
Medium
Small
Restoration
Simple
Simple
Involved
Complex
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Backup Frequency / Retention
• Base frequency on time organization can survive
without current data.
• Base retention on operational environment and
frequency of backups.
• Retention strategy should avoid putting all backups
in one location.
– Ideally an offsite location will also be used.
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Alternative Sites
• Should be considered in BCP / DRP
• Three types of sites:
– Hot site: Fully configured environment that
can be operational immediately
– Warm site: Partially configured, lacks more
expensive computing components
– Cold site: Basic environmental controls but
few computing components
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Utilities
• Power failures may disrupt operations
– UPSs provide enough power to allow systems
to be shutdown gracefully.
– Backup generator may be necessary for
sustained power needs.
• Other utilities like telephone and Internet
should be considered.
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Secure Recovery
• Provide power, communications, and
technical support.
• Offer a secure operating environment.
• Provide restoration of critical files and
data.
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Cloud Computing
• Allows for the contracting of functions like
e-mail and file storage to third parties
• Can be more cost effective but also comes
with inherent risks
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
High Availability and Fault Tolerance
• High availability is the ability to maintain
availability during disruptive events.
• Fault tolerance is the mirrored system that takes
over if a fault occurs.
• Single point of failure is the point in a critical
operation that would cause the entire operation
to fail if it failed.
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Increasing Reliability
• RAID can mitigate availability problems caused
by disk failures.
• Redundant systems and spare parts also serve
to decrease availability issues.
• RAIDs
– 0: no redundancy, improved performance
– 1: mirrored drives, expensive
– 5: spread across disks with parity, inexpensive
redundancy
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Spare Parts and Redundancy
• Common applications of redundancy
– Redundant servers
– Redundant connections
– Redundant ISPs
– Spare parts
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Computer Incident Response Teams
(CIRT)
• Investigate incidents, advise on how to proceed.
• CIRTs should consist of permanent and ad hoc
team members.
• Details of CIRT team should be finalized before
an incident occurs.
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Test, Exercise, and Rehearse
• DRP should be practiced periodically.
– Reveals potential flaws in the plan
• Exercise to practice procedures.
• Test to grade performance.
• Evaluate performance and make
improvements as needed.
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Policies and Procedures
• Policies are high-level, broad statements of what
an organization wants to accomplish.
• Procedures are generally step-by-step
instructions on how to implement policy.
• Standards are mandatory elements regarding the
implementation of policy.
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Security Policies
• Security policies define high-level goals for
security for an organization.
• Other more specific policies include:
– Acceptable use policy
– Internet usage policy
– Email usage policy
– Due care and due diligence
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Additional Security Policies
• Prudent person principle
• Separation of duties
• Need to know and least privilege
• Password management
• Disposal and destruction
• Change management policy
• Classification of information
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Privacy
• Privacy policy should be completed
detailing how information is safeguarded.
• Privacy is enforced by law for some
organizations.
• Personally Identifiable Information (PII) is
becoming increasingly important to
safeguard.
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Service Level Agreement
• Agreement between two entities that
specifies:
– Minimum levels of service
– Penalties for failing to meet specified service
levels
– May also define service providers’
responsibility in a BCP or DRP
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Human Resources Policies
• People are the weakest link in security.
• Specific policies should be developed regarding:
–
–
–
–
© 2010
New hire screening processes
Periodic review process for current employees
Employee termination process
Mandatory vacation to uncover wrongdoing
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Code of Ethics
• Describes expected behavior from a highlevel standpoint
• Sets tone for employee conduct
• Encourages integrity and high ethical
standards
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Incident Response Policies and
Procedures
• Several phases should be covered in an
incident response policy:
– Preparation
– Detection
– Containment and eradication
– Recovery
– Follow-up actions
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Incident Response: Preparation
• Preparation activities
– Determine points of contact.
– Train employees for understanding.
– Establish the incident response team.
– Acquire needed equipment.
– Complete and specialized training needed.
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Incident Response: Detection, Containment,
and Eradication
• Detection activities
– Determine if an incident has occurred; work with network and
system administrators.
• Containment and eradication activities
–
–
–
–
© 2010
Contain the intruder; decide about prosecution.
Restore operations without destroying evidence.
Update antivirus and network peripherals as needed.
Take steps to prevent future incidents (patching, etc.).
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Incident Response: Recovery
• Recovery activities
– Assess the situation to determine what
actually occurred.
– Begin recovery based on assessment.
– May involve use of BCP to return business
back to normal operation.
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Incident Response: Follow-Up Actions
• Follow-up activities
– Report on the incident to senior management.
– Report should address what happened and
how it was addressed.
– Give recommendation to prevent future
incidents.
© 2010
Principles of Computer Security:
CompTIA Security+® and Beyond, Second Edition
Chapter Summary
• Describe the various ways backups are
conducted and stored.
• Explain different strategies for alternative site
processing.
• Describe the various components of a business
continuity plan.
• Explain how policies and procedures play a daily
role in addressing the security needs of an
organization.
© 2010