A Technical View of Risk Assessment Methods for Backup Systems Bradley Wong Life Sciences Consulting Tustin, CA – USA DIA/All Hands: 12 February 2015.

Slides:



Advertisements
Similar presentations
Utility program + driver program Thomas Wat 4D (21)
Advertisements

Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
A new standard in Enterprise File Backup. Contents 1.Comparison with current backup methods 2.Introducing Snapshot EFB 3.Snapshot EFB features 4.Organization.
11 BACKING UP AND RESTORING DATA Chapter 4. Chapter 4: BACKING UP AND RESTORING DATA2 CHAPTER OVERVIEW Describe the various types of hardware used to.
Barracuda Backup Service Data Backup and Disaster Recovery.
© 2008 Kroll Ontrack Inc.| Ontrack PowerControls 5.1 The ultimate “power tool” for SharePoint administrators.
High Performance Computing Course Notes High Performance Storage.
Disaster Prevention and Recovery Kristen Emch Christine Jennings-Garant.
Lesson 11 – NETWORK DISASTER RECOVERY Disaster recovery plans Network backup and restoration OVERVIEW.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Guide to Linux Installation and Administration, 2e1 Chapter 13 Backing Up System Data.
Servers Redundant Array of Inexpensive Disks (RAID) –A group of hard disks is called a disk array FIGURE Server with redundant NICs.
© 2009 Kroll Ontrack Inc.| Ontrack PowerControls 6.0 for SharePoint™ A Better Way to Search and Restore.
Module 8 Implementing Backup and Recovery. Module Overview Planning Backup and Recovery Backing Up Exchange Server 2010 Restoring Exchange Server 2010.
Module 12: Planning for and Recovering from Disasters.
Academic Year 2014 Spring. MODULE CC3005NI: Advanced Database Systems “DATABASE RECOVERY” (PART – 1) Academic Year 2014 Spring.
1 Objectives Discuss the Windows Printer Model and how it is implemented in Windows Server 2008 Install the Print Services components of Windows Server.
November 2009 Network Disaster Recovery October 2014.
Backup Strategy. Backup strategy Backup copy is a second copy saved to another location, usually on a backup device e.g. USB stick.Backup copy is a second.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Introduction to Computer Networks Introduction to Computer Networks.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
A BigData Tour – HDFS, Ceph and MapReduce These slides are possible thanks to these sources – Jonathan Drusi - SCInet Toronto – Hadoop Tutorial, Amir Payberah.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
DATA DEDUPLICATION By: Lily Contreras April 15, 2010.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1.
Chapter 1 Introduction to Databases. 1-2 Chapter Outline   Common uses of database systems   Meaning of basic terms   Database Applications  
Configuring Data Protection Chapter 12 powered by dj.
Module 15 Managing Windows Server® 2008 Backup and Restore.
Backups CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Component 8/Unit 9bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 9b Creating Fault Tolerant.
BACKUP/MASTER: Strategies for Archiving Dianne McAdam Senior Analyst and Partner Data Mobility Group.
STORAGE MANAGEMENT/MASTER: Building an Affordable Practice for Regulation Compliance Getting the most out of existing technology Marc Farley President.
Cosc 4750 Backups Why Backup? In case of failure In case of loss of files –User and system files Because you will regret it, if you don’t. –DUMB = Disasters.
© Copyright 2007 Instrumental, Inc. Slide 1 of 11 What Is Important in the Datapath Henry Newman Library of Congress Designing Storage Architectures Workshop.
Install, configure and test ICT Networks
Backup Exec System Recovery. 2 Outline Introduction Challenges Solution Implementation Results Recommendations Q & A.
Component 8 Installation and Maintenance of Health IT Systems Unit 9b Creating Fault-Tolerant Systems, Backups, and Decommissioning This material was developed.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Windows Vista Configuration MCTS : Installing and Upgrading.
CommVault Architecture
Network-Attached Storage. Network-attached storage devices Attached to a local area network, generally an Ethernet-based network environment.
CDP Technology Comparison CONFIDENTIAL DO NOT REDISTRIBUTE.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
The Troubleshooting Process. Hardware Maintenance Make sure that the hardware is operating properly.  Check the condition of parts.  Repair or replace.
A Solution for Maintaining File Integrity within an Online Data Archive Dan Scholes PDS Geosciences Node Washington University 1.
«My future profession»
Oracle Database High Availability
Local Area Networks, 3rd Edition David A. Stamper
Slide Template for Module 4 Data Storage, Backup, and Security
Planning for Application Recovery
Integrating Disk into Backup for Faster Restores
Jonathan Walpole Computer Science Portland State University
Managing Multi-User Databases
Oracle Database High Availability
Section 15.1 Section 15.2 Identify Webmastering tasks
Acutelearn Technologies Tivoli Storage Manager(TSM) Training Tivoli Storage Manager Basics: Tivoli Storage Manager Overview Tivoli Storage Manager concepts.
Exchange OST Recovery Freeware Tool. Index Introduction What is OST File? Reasons for OST file corruption Possible ways to fix OST file corruption issue.
Diskless network security
RAID RAID Mukesh N Tekwani
SpiraTest/Plan/Team Deployment Considerations
RAID RAID Mukesh N Tekwani April 23, 2019
IBM Tivoli Storage Manager
Presentation transcript:

A Technical View of Risk Assessment Methods for Backup Systems Bradley Wong Life Sciences Consulting Tustin, CA – USA DIA/All Hands: 12 February 2015

Introduction Risk Assessment Methodology Backup Strategies –Traditional Method –Virtual Tape Library / Virtual Tape Server –Deduplication and other new ideas 12 February 2015DIA Electronic Information Integrity CommunitySlide 2

Risk Assessment Methodologies Identify –The risks, their causal factor, and potential to harm Analyze –The probability of occurrence of each risk and its severity Mitigate –The creation of a risk mitigation plan Maintain / Monitor –The effectiveness, periodic review and update. 12 February 2015Slide 3DIA Electronic Information Integrity Community Identify Maintain / Monitor Mitigate Analyze

Risk Assessment Methodologies We will use the Risk Assessment Methodology to analyze the Backup Strategy 12 February 2015DIA Electronic Information Integrity CommunitySlide 4

Traditional Backup Methods More than 15 Years ago Backup device generally attached to the server or a backup server. Backup media generally magnetic tapes with optical for longer term storage. 12 February 2015DIA Electronic Information Integrity CommunitySlide 5

Traditional Backup Methods Media has a limited lifetime before its usefulness would be in question. Set a strategy for the type of media and perform a refresh of the media. Periodic Checking of tapes by performing restores and checking for errors. 12 February 2015DIA Electronic Information Integrity CommunitySlide 6 Identify Mitigate Monitoring

Traditional Backup Methods Media manufacturers have different specifications that affect the retention life of the product Use known sources and try not to deviate. Check with sources to see if the media sources change. 12 February 2015DIA Electronic Information Integrity CommunitySlide 7 Identify Mitigate Monitoring

Traditional Backup Methods Compatibility of old media with future retrievals Standards for Migration of data to the new media. Periodically extract files to verify readability. 12 February 2015DIA Electronic Information Integrity CommunitySlide 8 Identify Mitigate Monitoring

Traditional Backup Methods Compatibility of old media with future retrievals Standards for the obsolescence of old data. Periodically extract files to verify readability. 12 February 2015DIA Electronic Information Integrity CommunitySlide 9 Identify Mitigate Monitoring

Traditional Backup Methods Compatibility of old media with future retrievals Standards for the obsolescence of old data. No need for monitoring unless you track how often you delete files that you really need. Then you would update your standards. 12 February 2015DIA Electronic Information Integrity CommunitySlide 10 Identify Mitigate Monitoring

Traditional Backup Methods The number of tapes required for a restoration is generally larger. Standards for handling of tapes from the backups. Periodically extract files to verify catalog of tapes. 12 February 2015DIA Electronic Information Integrity CommunitySlide 11 Identify Mitigate Monitoring

Traditional Backup Methods Missing a tape in the middle of the set, it might render the set useless. Standards for handling of tapes from the backups. Periodically extract files to verify catalog of tapes. 12 February 2015DIA Electronic Information Integrity CommunitySlide 12 Identify Mitigate Monitoring

Traditional Backup Methods Active files during the Backup process. Define a mechanism to ensure that the save is performed accurately and at a “Point in time”. Perform periodic restoration activities. Possibly in conjunction with Disaster Recover testing. 12 February 2015DIA Electronic Information Integrity CommunitySlide 13 Identify Mitigate Monitoring

VTL/VTS 12 February 2015DIA Electronic Information Integrity CommunitySlide 14 Hard Disk Tape JukeboxOptical Jukebox

Virtual Tape Library Years ago Backup moves from device to a server Backup media combination of Hard Disk Drives and Magnetic Tapes Optical common for longer term storage. 12 February 2015DIA Electronic Information Integrity CommunitySlide 15

Virtual Tape Library Shared Risks as the Traditional Backup –Media has a limited lifetime before its usefulness would be in question. –Media manufacturers have different specifications that affect the retention life of the product. –Active files during the Backup process. 12 February 2015DIA Electronic Information Integrity CommunitySlide 16

Virtual Tape Library Compatibility of old media with future retrievals Standards for Migration of data to the new media. The feature is included in the VTL system. Periodically extract files to verify readability. 12 February 2015DIA Electronic Information Integrity CommunitySlide 17 Identify Mitigate Monitoring

Virtual Tape Library The number of tapes required for a restoration is generally larger. Tapes are catalogued by the VTL system. Periodically extract files to verify catalog of tapes. 12 February 2015DIA Electronic Information Integrity CommunitySlide 18 Identify Mitigate Monitoring

Virtual Tape Library Disk Failure in the pool. RAID configuration. Service Contracts for repair of failed media. Media failure in the hard disk pool. RAID configuration Proactive replacement of disks. 12 February 2015DIA Electronic Information Integrity CommunitySlide 19 Identify Mitigate Monitoring Identify Mitigate Monitoring

Virtual Tape Library Media failure in the tape pool. Watch systems for tape errors. Proactive replacement of tapes. Network communications. Private network for backup services. Service Contracts for repair of failed hardware 12 February 2015DIA Electronic Information Integrity CommunitySlide 20 Identify Mitigate Monitoring Identify Mitigate Monitoring

Virtual Tape Library System failure. Multiple backup systems. Maybe two small ones instead of one big one. Service Contracts for repair of failed media. Failure of a single tape could have a greater effect on the backup. 12 February 2015DIA Electronic Information Integrity CommunitySlide 21 Identify Mitigate Monitoring Identify

Virtual Tape Library Migration/File Location Metadata. Documented Qualification. Monitor error logs. 12 February 2015DIA Electronic Information Integrity CommunitySlide 22 Identify Mitigate Monitoring

Virtual Tape Library Handling of media errors when reading/writing data during saves or migrations. Documented Qualification. Monitor error logs. 12 February 2015DIA Electronic Information Integrity CommunitySlide 23 Identify Mitigate Monitoring

Deduplication 0-5 Years ago Backup moves from device to a server Backup media is mainly Hard Disk Drives Magnetic Tapes and Optical common for extracted longer term needs. 12 February 2015DIA Electronic Information Integrity CommunitySlide 24

Deduplication Shared Risks as the Virtual Tape Library and Traditional Backup –Media has a limited lifetime before its usefulness would be in question. –Media manufacturers have different specifications that affect the retention life of the product. –Active files during the Backup process. 12 February 2015DIA Electronic Information Integrity CommunitySlide 25

Deduplication Shared Risks as the Virtual Tape Library and Traditional Backup –Disk Failures in pool –Media failure in Hard Disk Pool 12 February 2015DIA Electronic Information Integrity CommunitySlide 26

Deduplication Flaws in compression algorithms or loss of algorithms can lead to the entire backup pool being lost. Documented Qualification. Monitor error logs. 12 February 2015DIA Electronic Information Integrity CommunitySlide 27 Identify Mitigate Monitoring

Deduplication Errors in Hash function causes different file chunks to point to same location. Calculate Risk. None. 12 February 2015DIA Electronic Information Integrity CommunitySlide 28 Identify Mitigate Monitoring

Outsourcing Separation of data. Private VPN. Audit. 12 February 2015DIA Electronic Information Integrity CommunitySlide 29 Identify Mitigate Monitoring

Summary Backup methodology has dramatically changed over the past 20 years. –A Current Risk Assessment of the Backup Strategy should be in place. –Old Risk Assessment of the Backup Strategy are still useful and make a good starting point for update. 12 February 2015DIA Electronic Information Integrity CommunitySlide 30

Thank You Bradley Wong (714) February 2015DIA Electronic Information Integrity CommunitySlide 31