Principles of Computer Security

advertisement
Principles of Computer Security:
CompTIA Security+
Security+® and Beyond, Third Edition
Disaster Recovery, Business Continuity,
and Organizational Policies
Chapter 19
© 2012
Principles of Computer Security:
CompTIA Security+
Security+® and Beyond, Third Edition
Objectives
• Describe the various ways backups are
conducted and stored.
• Explain different strategies for alternative site
processing.
• Describe the various components of a business
continuity plan.
• Explain how policies and procedures play a daily
role in addressing the security needs of an
organization.
© 2012
Principles of Computer Security:
CompTIA Security+
Security+® and Beyond, Third Edition
2.5 Compare and contrast aspects of
business continuity
•
•
•
•
•
•
•
© 2012
Business impact analysis
Removing single points of failure
Business continuity planning and testing
Continuity of operations
Disaster recovery
IT contingency planning
Succession planning
Principles of Computer Security:
CompTIA Security+
Security+® and Beyond, Third Edition
2.7 Execute disaster recovery plans and
procedures
• Backup / backout contingency plans or policies
• Backups, execution and frequency
• Redundancy and fault tolerance
• Hardware
• RAID
• Clustering
• Load balancing
• Servers
• High availability
• Cold site, hot site, warm site
• Mean time to restore, mean time between failures, recovery
time objectives and recovery point objectives
© 2012
Principles of Computer Security:
CompTIA Security+
Security+® and Beyond, Third Edition
Disaster Recovery
• Organizations face a variety of disaster
scenarios.
• Disasters can be caused by nature or manmade
events.
• Disaster recovery plans consider all types of
organizational disruption.
• Different disruptions will require different
recovery strategies.
© 2012
Principles of Computer Security:
CompTIA Security+
Security+® and Beyond, Third Edition
Disaster Recovery Plans (DRP) / Process
• DRPs intended to minimize disaster impact.
– Defines the data, resources, and necessary
steps to restore critical organizational
processes.
• Planning process, initial phase:
– Consider needed resources to perform the company’s
mission.
– Identify critical functions.
© 2012
Principles of Computer Security:
CompTIA Security+
Security+® and Beyond, Third Edition
Disaster Recovery Plans / Process
(continued)
• Initial phase yields the business impact
assessment (BIA).
• Continued planning includes:
– Outline of processes and procedures to restore an
organizations critical operations
– Prioritized according to criticality for restoral
© 2012
Principles of Computer Security:
CompTIA Security+
Security+® and Beyond, Third Edition
Business Continuity Plan (BCP)
• Focuses on continued operation of a business in
extenuating circumstances.
• Stronger emphasis placed on critical systems.
• Will describe the functions that are most critical, based
on a previously conducted BIA.
• Will describe the order in which functions should be
returned to operation.
• Describes what is needed for the business to continue
to operate.
© 2012
Principles of Computer Security:
CompTIA Security+
Security+® and Beyond, Third Edition
Backups
• Critical part of BCP and BRP
• Provides valid, uncorrupted data for restoration
• Good backups include all needed files
– Applications, operations systems, and utilities
© 2012
Principles of Computer Security:
CompTIA Security+
Security+® and Beyond, Third Edition
What Needs to Be Backed Up?
•
•
•
•
•
Data
Application programs
Operating systems
Utilities for the hardware platform
Personnel, equipment, and electrical power must
also be part of the plan.
• Backup plan should back up the files that
change more often than the files that do not
chance much.
© 2012
Principles of Computer Security:
CompTIA Security+
Security+® and Beyond, Third Edition
Backup Strategy
• Backup considerations
– Size of the resulting backup
– Media used for the backup
– How long backups will be stored
• Four types of backups
– Full, differential, incremental, delta
© 2012
Principles of Computer Security:
CompTIA Security+
Security+® and Beyond, Third Edition
Backup Types
• Full backup
– All files copied onto the storage media
• Differential backup
– Files that have changed since last full backup
• Incremental backup
– Files since last full or incremental backup
• Delta backup
– Portions of files changed since last backup
© 2012
Principles of Computer Security:
CompTIA Security+
Security+® and Beyond, Third Edition
Alternative Sites
• Should be considered in BCP / DRP
• Three types of sites:
– Hot site: Fully configured environment that
can be operational immediately
– Warm site: Partially configured, lacks more
expensive computing components
– Cold site: Basic environmental controls but
few computing components
© 2012
Principles of Computer Security:
CompTIA Security+
Security+® and Beyond, Third Edition
Utilities
• Power failures may disrupt operations
– UPSs provide enough power to allow systems
to be shutdown gracefully.
– Backup generator may be necessary for
sustained power needs.
© 2012
Principles of Computer Security:
CompTIA Security+
Security+® and Beyond, Third Edition
Cloud Computing
• Allows for the contracting of functions like
e-mail and file storage to third parties
• Can be more cost effective but also comes
with inherent risks
• Oct 21, 2012 Amazon Cloud outage
• June 29, 2012 Amazon Cloud outage
© 2012
Principles of Computer Security:
CompTIA Security+
Security+® and Beyond, Third Edition
High Availability and Fault Tolerance
• High availability is the ability to maintain
availability during disruptive events.
• Fault tolerance is the mirrored system that takes
over if a fault occurs.
• Single point of failure is the point in a critical
operation that would cause the entire operation
to fail if it failed.
© 2012
Principles of Computer Security:
CompTIA Security+
Security+® and Beyond, Third Edition
Incident Response Policies and
Procedures
• Several phases should be covered in an
incident response policy:
– Preparation
– Detection
– Containment and eradication
– Recovery
– Follow-up actions
© 2012
Principles of Computer Security:
CompTIA Security+
Security+® and Beyond, Third Edition
Chapter Summary
• Describe the various ways backups are
conducted and stored.
• Explain different strategies for alternative site
processing.
• Describe the various components of a business
continuity plan.
• Explain how policies and procedures play a daily
role in addressing the security needs of an
organization.
© 2012
Download