Service Design – Section 4.5 Service Continuity Management.

Slides:



Advertisements
Similar presentations
IT Service Continuity Management
Advertisements

Business Continuity Training & Awareness by Sulia Toutai (ANZ)
Reliability of the electrical service Business Continuity Management Business Impact Analysis (BIA) Critical ITC Services Minimum Business Continuity Objective.
Optimal redundancy allocation for information technology disaster recovery in the network economy Benjamin B.M. Shao IEEE Transaction on Dependable and.
Business Continuity Disaster Recovery Risk Management How do these fit into a Framework?
1 Disaster Recovery “Protecting City Data” Ron Bergman First Deputy Commissioner Gregory Neuhaus Assistant Commissioner THE CITY OF NEW YORK.
Business Continuity Mark Holloway Former Head of Change Management at Co-operative Food.
Business Continuity Planning and Disaster Recovery Planning
Service Design – Section 4.5 Service Continuity Management.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey.
Disaster Recovery and Business Continuity Ensuring Member Service in Times of Crisis.
Service Design – Section 4.5 Service Continuity Management.
Disaster Recovery Policy & Procedures An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
1 Business Continuity and Compliance Working Together Kristy Justice, AVP WaMu Card Services 08/19/2008.
| Establishing a Contingency Plan.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Disaster Recovery, Business Continuity, and Organizational Policies.
Overview of Systems Audit
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
DEVELOPING A RISK ANALYSIS. What is a risk analysis? A Risk analysis is concerned with identifying the risks that an organisation is exposed to, identifying.
W ELCOME TO D E P AUL U NIVERSITY ’ S LDRPS 10: L IVING D ISASTER R ECOVERY P LANNING S OFTWARE.
Incident Management By Marc-André Léger DESS, MASc, PHD(candidate) Winter 2008.
David N. Wozei Systems Administrator, IT Auditor.
Risk planning & risk management (RM)
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Information Assurance for the Enterprise: A Roadmap to Information.
GBA IT Project Management Final Project - Establishment of a Project Management Management Office 10 July, 2003.
By Srosh Abdali.  Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure.
1. 2 Cost to Recover Time to Recover Last Backup Work Backlog Created Lost Data Recovery Operations Time Cost Disaster Recovery Time Frame Reconstruct.
Tingxuan Liu Risk Management in Software engineering.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Perspectives on Business Continuity Management Bill Wheeler, EPO.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
© College of Policing Limited 2012 Version 1.0 NOT PROTECTIVELY MARKED 26/10/2015 Stage Two Assess Threat and Risk Gold Public Order Commander 4.4.
Business Continuity Program Orientation (insert presentation date) (This presentation is a template that requires adjustments to meet your needs)
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
Phases of BCP The BCP process can be divided into the following life cycle phases: Creation of a business continuity and disaster recovery policy. Business.
Risk management and disaster preparedness
Unit 3: Identifying and Safeguarding Vital Records Unit Introduction and Overview Unit objective:  Describe the elements of an effective vital records.
Business Continuity Planning  What is it?  Why do we do it?  How do we do it?
The Risk Management Process
9 juni 2009 Alex van Os de Man BCI Forum 2009 Business Impact Analysis Process.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Principles of Computer Security, Fourth Edition Copyright © 2016 by McGraw-Hill Education. All rights reserved. Disaster Recovery and Business Continuity,
Business Continuity Disaster Planning
SueDon Ltd - Business Continuity Management BCM Overview ©1999 SueDon Ltd Business Continuity Management.
Business Continuity Management 101. KeepItSafe Professional Services The portfolio of business continuity management is to ensure we assist our clients.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
Disaster Recovery Planning (DRP) DRP: The definition of business processes, their infrastructure supports and tolerances to interruptions, and formulation.
Information Security Crisis Management Daryl Goodwin.
Business Continuity Planning 101
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-I)
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
CompTIA Security+ Study Guide (SY0-401)
Business Continuity / Recovery
Disaster Recovery Policy & Procedures
Security Engineering.
Personal Introduction
CompTIA Security+ Study Guide (SY0-501)
CompTIA Security+ Study Guide (SY0-501)
INFORMATION SYSTEMS SECURITY and CONTROL
Developing and testing the Plan
Presentation transcript:

Service Design – Section 4.5 Service Continuity Management

Maintain the necessary ongoing recovery capability within the IT services and their supporting components components. Focus on those events that the business considers significant enough to be considered a disaster. Service Design – Section 4.5 Service Continuity Management

Invocation

Invocation Policy setting - at a minimum, the policy should set out management intention and objectives Specify terms of reference and scope - defining the scope and responsibilities of all staff in the organization. It covers such tasks as undertaking a Risk Analysis and Business Impact Analysis and determination of the command and control structure required to support a business interruption. Allocate resources - the establishment of an effective Business Continuity environment requires considerable resource in terms of both money and manpower. Define the project organization and control structure - ITSCM and BCM projects are potentially complex and need to be well organized and controlled. Agree to project and quality plans - enable the project to be controlled and variances addressed. Quality plans ensure that the deliverables are achieved and to an acceptable level of quality.

Service Design – Section 4.5 Service Continuity Management Invocation Ascertaining the business requirements for IT service continuity is a critical component in order to determine how well an organization will survive a business interruption or disaster and the costs that will be incurred.

Invocation A balanced approach between Impact and the Time to Recover should be considered optimal. Business Impact Analysis Business Impact Analysis Quantify the impact to the business that loss of service would have.

Service Design – Section 4.5 Service Continuity Management Invocation Risk Analysis The likelihood that a disaster or other serious service disruption will actually occur. The level of threat and the extent to which an organization is vulnerable to that threat.

Service Design – Section 4.5 Service Continuity Management Invocation IT Service Continuity Strategy Typical Risk Reduction Measures Installation of UPS and backup power Fault-tolerant systems for critical applications RAID arrays and disk mirroring for LAN servers Spare equipment/components to be used in the event of equipment or component failure The elimination of Single Points of Failure Resilient IT systems and networks Outsourcing services to more than one provider Greater physical and IT-based security controls Better controls to detect service disruptions

Invocation Service Design – Section 4.5 Service Continuity Management Testing Types Walk-Through Tests - conducted when the plan has been produced Full Tests - conducted as soon as possible after the plan production and at regular intervals of at least annually thereafter Partial Tests - undertaken where recovery of certain elements of the overall plan is tested Scenario Tests - used to test reactions and plans to specific conditions, events and scenarios.

Service Design – Section 4.5 Service Continuity Management Invocation Keep the Continuity Plan Up-to-Date Information services function management should provide for change control procedures in order to ensure that the continuity plan is up-to-date and reflects actual business requirements. This requires continuity plan maintenance procedures aligned with change and management and human resources procedures.

Service Design – Section 4.5 Service Continuity Management Invocation Invocation The design of the invocation process must provide guidance on how all of these areas and circumstances should be assessed to assist the person invoking the continuity plan.

Service Design – Section 4.5 Service Continuity Management