DISASTER RECOVERY RUNBOOK

Slides:



Advertisements
Similar presentations
CIP Cyber Security – Security Management Controls
Advertisements

Network security policy: best practices
(Insert agency name and/or date) Are we prepared?.
Lisa Wood, CISA, CBRM, CBRA Compliance Auditor, Cyber Security
Developing Plans and Procedures
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
NFPA 1600 Disaster/Emergency Management and Business Continuity Programs.
ISO DOCUMENT CONTROL. ISO Environmental Management Systems2 Lesson Learning Goals At the end of this lesson you should be able to: 
Ideally only staff that have been media trained should manage media releases. If you’re not media trained limit your focus on the facts.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
Disaster Recovery Management By: Chris Rozic COSC 481.
Business Continuity Planning 101
Call Center Support Process Web Support & Maintenance for BGC Partners Version 1.1 June 3, 2016 Notice: The enclosed material is proprietary to TRIZE Consulting.
Workforce Administration Scenario Overview
Cybersecurity Policies & Procedures ICA
Pre-Execution Process Review Presentation
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 1.1
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 2.0
SIMPLE SWOT MATRIX TEMPLATE
S W T O SWOT ANALYSIS TEMPLATE STRENGTHS (+) WEAKNESSES (–) • •
AGILE PRODUCT ROADMAP AGILE PRODUCT ROADMAP
Business Contingency Planning
Business Continuity Planning
IT STRATEGY ROADMAP TEMPLATE
MULTIPLE PRODUCT ROADMAP
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
S W T O SWOT ANALYSIS TEMPLATE STRENGTHS (+) WEAKNESSES (–) • •
S W T O SWOT ANALYSIS TEMPLATE STRENGTHS (+) WEAKNESSES (–) • •
1 2 Please stand by! The webinar will begin shortly.
S W T O SWOT ANALYSIS TEMPLATE STRENGTHS (+) WEAKNESSES (–) • •
IT STRATEGY ROADMAP TEMPLATE
TEXT TEXT TEXT TEXT BUSINESS OBJECTIVES.
ANNUAL BUSINESS REVIEW
QUARTERLY BUSINESS REVIEW
QUARTERLY BUSINESS REVIEW
Continuity of Operations Planning
BUSINESS CONTINUITY PLAN
Business Continuity Program Overview
TITLE Business Case YOUR LOGO BUSINESS CASE PRESENTATION 00/00/0000
TASK LIST YOUR LOGO PROJECT: [ TITLE ] COMPLETED BY: [ NAME ]
Manage Business Continuity Introductory Brief
Pharmacovigilance inspections: what HPRA expects
STRATEGIC PLANNING YOUR LOGO COMPLETED BY: [ NAME ]
BUSINESS CONTINUITY PROGRAM
BUSINESS CONTINUITY FRAMEWORK BUSINESS IMPACT ANALYSIS
BUSINESS CONTINUITY PROCEDURE
IT SERVICE CONTINUITY PLAN
M&A INTEGRATION SCORECARD
YOUR COMPANY NAME Tag Line YOUR LOGO 00/00/0000 PRESS KIT.
NONPROFIT NAME Tag Line YOUR LOGO 00/00/0000 PRESS KIT.
BLOG NAME Mission Statement / Tag Line YOUR LOGO 00/00/0000 PRESS KIT.
HEADLINE / NAME OF EVENT
LAW FIRM DISASTER RECOVERY PLAN
DISASTER MANAGEMENT PLAN
MANUFACTURING DISASTER RECOVERY PLAN
PAYROLL DISASTER RECOVERY PLAN
SCHOOL DISASTER MANAGEMENT PLAN
PROJECT NAME YOUR LOGO PROJECT CODE: PROJECT MANAGER: DATE OF REPORT:
DISASTER CALL TREE YOUR LOGO COMPANY NAME Street Address
DISASTER RECOVERY PLAN
DISASTER RECOVERY PLAN
DATA DISASTER RECOVERY PLAN
SaaS DISASTER RECOVERY PLAN
APPLICATION DISASTER RECOVERY RESPONSE
CR-GR-HSE-302 Management of change
PROJECT NAME YOUR LOGO [ NAME ] [ DATE ] BUSINESS CASE PRESENTATION
STRATEGIC PLANNING YOUR LOGO COMPLETED BY: [ NAME ]
Management of Change GROUP HSE RULE (CR-GR-HSE-302)
IT DISASTER RECOVERY PLAN
BUSINESS CONTINUITY PLAN
Presentation transcript:

DISASTER RECOVERY RUNBOOK YOUR LOGO COMPANY NAME Street Address City, State and Zip webaddress.com VERSION 0.0.0 00/00/0000 DISASTER RECOVERY RUNBOOK

VERSION HISTORY VERSION HISTORY VERSION APPROVED BY REVISION DATE DESCRIPTION OF CHANGE AUTHOR PREPARED BY TITLE DATE APPROVED BY VERSION HISTORY

WHAT’S INSIDE 1. DOCUMENT CONTROL TABLE OF CONTENTS 1. DOCUMENT CONTROL 2. CONTACT INFORMATION 3. DATA CENTER ACCESS CONTROL LIST 4. COMMUNICATION STRATEGY 5. DISASTER DECLARATION AND ALERT RESPONSE INFORMATION 6. ESCALATION RATINGS AND PROCEDURE 7. INFRASTRUCTURE OVERVIEW 8. RESTORATION ORDER AND DETAILS 9. SYSTEM CONFIGURATION AND BACKUP CONFIGURATION 10. DATA RESTORATION WHAT’S INSIDE

This includes document name, versions, creation and modification dates, and authors of each relevant document involved in the disaster recovery plan. Maintain document change history and version updates within this portion of the runbook. DOCUMENT NAME LOCATION VERSION NO. CREATION DATE MODIFICATION DATE AUTHOR   1. DOCUMENT CONTROL

This details the key contact information of all involved parties, including key personnel, external assets or networks, third-party resources, and key stakeholders. NAME & TITLE ROLE PHONE EMAIL MAILING   2. CONTACT INFORMATION

3. DATA CENTER ACCESS CONTROL LIST Include the name, role, contact information, and sharing levels of those who have access to key documents concerning the maintenance of operations during a disaster. NAME ROLE PHONE EMAIL ACCESS LEVEL   3. DATA CENTER ACCESS CONTROL LIST

4. COMMUNICATION STRATEGY This is the information regarding how personnel and employees will maintain contact and communication throughout a disaster, including phones, alerts, media, and other communication methods. 4. COMMUNICATION STRATEGY

5. DISASTER DECLARATION AND ALERT RESPONSE INFORMATION Include the situation, action, and owner of each potential disaster to track when and how a disaster declaration will be communicated to all involved parties. Additionally, include a detailed procedure regarding how each person should respond to a disaster alert. 5. DISASTER DECLARATION AND ALERT RESPONSE INFORMATION

6. ESCALATION RATINGS AND PROCEDURE Determine the severity of a disaster based on a rating system and react to the disaster accordingly. Ratings include: ○ Fatal ○ Critical ○ Serious ○ Minor ○ Request 6. ESCALATION RATINGS AND PROCEDURE

7. INFRASTRUCTURE OVERVIEW Include a detailed explanation and diagram of all necessary facilities that are critical to normal operation procedures. 7. INFRASTRUCTURE OVERVIEW

8. RESTORATION ORDER AND DETAILS This outlines the details regarding how recovery personnel should deal with disasters and in what order. (Base the order on priority rankings). Include details about event type, duration of event, mitigation action, and event criticality. 8. RESTORATION ORDER AND DETAILS

9. SYSTEM CONFIGURATION AND BACKUP CONFIGURATION This outlines all systems and inventory involved in a normal operation. It also outlines backup procedures, should any of the original configurations be disrupted. 9. SYSTEM CONFIGURATION AND BACKUP CONFIGURATION

These are the steps and resources needed in order to restore the disrupted systems or business. 10. DATA RESTORATION

DISCLAIMER   Any articles, templates, or information provided by Smartsheet on the website are for reference only. While we strive to keep the information up to date and correct, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability, or availability with respect to the website or the information, articles, templates, or related graphics contained on the website. Any reliance you place on such information is therefore strictly at your own risk.