1 DigiKnight Backup and Recovery Plan 2006 Robert Drake, Rick Osgood, Josh Wisman, Matt Smith, Chris Saltzman, Kevin Bunch, Alexander Andrews 2 Table of Contents DigiKnight Backup and Recovery Plan 2006 ............................................................ 1 Table of Contents ....................................................................................................... 2 Introduction ..............................................................Error! Bookmark not defined. Executive Summary ................................................................. Error! Bookmark not defined. Letter to the President ................................................................................................................4 Stakeholders: ..............................................................................................................................5 Department Scopes .................................................................................................... 7 Administration Department Scope .............................................................................................7 Sales Department Scope ............................................................................................................8 Research & Development Department Scope............................................................................9 Purchasing Department Scope .................................................................................................10 Administration/Purchasing Skill Matrix by Job Process .........................................................11 IT Skill Matrix by Job Process.................................................................................................12 Security/Purchasing/Shipping Skill Matrix by Job Process ....................................................13 Risk Assessments ..................................................................................................... 14 Layer One Assessment .............................................................................................................14 Layer Two Assessment ............................................................................................................15 Layer Three Assessment ..........................................................................................................17 Layer Four Assessment ............................................................................................................18 Layer Five Assessment ............................................................................................................20 FEMA Assessment...................................................................................................................21 Supplier Risk Assessment Form ..............................................................................................23 Vital Disaster Information ....................................................................................... 24 Emergency Telephone List ......................................................................................................24 First Alert Information Sheet ...................................................................................................25 Customer Analysis Form .........................................................................................................27 Computer Vendor Information Sheet.......................................................................................28 Critical Data List ......................................................................................................................29 Document Recovery Equipment Checklist ..............................................................................30 Insurance Provider Contact List: .............................................................................................32 Key Tracking Form ..................................................................................................................33 Backup Supply Companies ......................................................................................................36 Supplier Notification Checklist................................................................................................38 Hot Site Information ................................................................................................................40 Emergency Operations Center Information Sheet ...................................................................41 Emergency Operations Center Supply Sheet ...........................................................................43 Emergency Responsibility Chart .............................................................................................44 Disaster Recovery Procedures ................................................................................. 45 Restore Plan .............................................................................................................................45 File Retention Plan:..................................................................................................................47 Disaster Confirmation and Declaration Report........................................................................48 3 Maintenance Priority Ranking .................................................................................................50 Paper Records Recovery ..........................................................................................................51 Customer Disaster Notification................................................................................................53 Supply Chain Breakdown ........................................................................................................53 Family Employee Statement Policy .........................................................................................54 The Interim Plan....................................................................................................... 55 Backup Plan .............................................................................................................................55 Organizational Contact Information ........................................................................................58 Keys .........................................................................................................................................60 Test Scenarios & Continued Maintenance............................................................... 61 Power Outage Test Scenario ....................................................................................................61 Nature Based Test Scenario .....................................................................................................62 CD / Paper Plan Update Checklist ...........................................................................................64 Intranet Document Maintenance Checklist ..............................................................................65 Tabletop Test: Mudslides .........................................................................................................66 Paralipomenon ......................................................................................................... 67 DigiKnight Memo ....................................................................................................................67 Interim Plan Memo ..................................................................................................................68 Backup Memo ..........................................................................................................................69 Disaster Center Memo .............................................................................................................70 Raid Memo...............................................................................................................................71 Diagram 1: A Common Lan ....................................................................................................73 Sabotage Memo .......................................................................................................................74 Stress Memo.............................................................................................................................75 Test Memo ...............................................................................................................................76 Maintenance Memo .................................................................................................................76 Recovery Team Memo .............................................................................................................77 Glossary ...................................................................................................................................78 4 Letter to the President Robert Drake IT Department Editor 480-755-0829 Dear Mr. Smith: As you are no doubt aware, a disaster recovery documentation project has been created by a few of us members from the IT department. We realize this project may force us to divert time from other assignments and duties, but we fervently believe that DigiKnight Technologies needs this project in order to be prepared for an emergency situation. Within our company, there are dozens of separate, vital processes that if delayed, destroyed, or disrupted would cause significant interference to the continuation of standard business practices. It is our belief that it is in everyone’s best interest for there be plans in place should a disastrous event occur. With your approval we intend to document these vital processes, review all previous safety or emergency procedures, create further plans to secure these vital processes, assign individuals to different tasks during an emergency, and train all employees in emergency responses. We also intend to centralize all necessary contact information for law enforcement, suppliers, insurance, customers, employees, and all other relevant individuals. Our intent is that by preparing this document we will be more secure in the case of an emergency. We intend to prepare for man-made disasters, natural disasters, and even more mundane, but no less disruptive things, such as one of our suppliers going out of business. Our hope is to provide a document that is complete enough to serve in any disruptive situation of sufficient scope, but keep our project small enough that it remains effective. I believe that we are more than capable of this, but we will need the support of yourself, as well as that of the managers of each department, for this to be truly successful. At first only a few of us in IT, but eventually individuals from each department, will have to spend time away from other assignments. There may be some expense for training, planning software, research, and accessory items. We do not predict these will be excessive. Despite these limited expenses we believe that the benefit from this plan may very well be profitable in the long-term. The time saved, the equipment protected, and the people secured, could possibly outweigh the expenses a thousand times over. It is difficult to predict a massive emergency, but even if the future only holds many smaller disturbances, as we hope it does, this document will facilitate quick resolutions to problems that would otherwise require a great deal more time and effort. The organization this project provides will be useful if there is any massive emergency and the training we intend to perform will no doubt be invaluable. It is for these reasons that we request your support for our disaster recovery project. This project is a long-term endeavor. Our initial time frame for a complete document is around three months. As we pursue this project a more exact date will be determined. Even upon the ultimate 5 completion of this document it will be necessary for an individual to be tasked with keeping it up-to-date and periodically running new training exercises. New individuals will need to be familiarized with the document as well. The scope of this project requires support from the top of the company to be successful. We hope to complete this project in a timely and efficient manner for the benefit of the entire corporation and seek your approval. Should you have any questions pertaining to our disaster planning please contact the project’s leader, Josh Wisman, Robert Drake (myself), Rick Osgood, the documenter, Matt Smith, Kevin Bunch, Alexander Andrews, or Christopher Saltzman. Stakeholders: The stakeholders for this project are as follows: CEO: Carlton Smith Objectives: Assure that the company has a recovery plan in place for any event that could significantly harm business productivity. Administration Manager: Mark Saunders Objective: Assure the safety of all employees in the event of a disaster. Sales Manager: Diane Ford Objective: Sustain a minimum quality of service during a disaster. Understand all disaster procedures relevant to the sales department. Manufacturing Manager: Linda Kraemer Objective: Sustain a minimum quality of service during a disaster. Understand all disaster procedures relevant to the manufacturing department. R&D Manager: Carlton Bowden Objective: Decrease the probability of adverse effects on the R&D department and ongoing projects. Maintenance Manager: Michael Winters Objective: Understand all disaster procedures relevant to the maintenance department. Acquire a functional knowledge of all each course of action to be taken in the event of different disasters to preserve different types of equipment put under their department. Advertising Manager: Michael Churchill Objective: Acquire a functional knowledge of all each course of action to be taken in the event of different disasters. Prepare possible marketing statements to be made in the event of a disaster. Shipping Manager: Kenneth Gilliam 6 Objective: Sustain a minimum quality of service during a disaster. Maintain a backup list of buyers. Purchasing Manager: Katherine Cavenaugh Objective: Sustain a minimum quality of service during a disaster. Maintain a backup list of suppliers. Security Manager: Brett Kelcey Objective: Acquire a functional knowledge of all each course of action to be taken in the event of different disasters. Assure the safety of all employees in the event of a disaster. IT Manager: Alicia McKellips Objective: Protect critical IT resources. Assure the availability of working off-site back ups and an adequate procedure for their use in the event of a disaster. All stake holders are upper management and representative of all departments. Each has an objective they wish accomplished from this project. It is the responsibility of the managers to relay relevant information to the employees under them. This will assist the efficient completion of the Disaster recovery and backup plan. 7 Department Scopes Administration Department Scope Administration Department Responsibilities The Administration Department is responsible for organizing people and resources to our company’s goals and objectives. Included within the administrative department are both the decision makers and leaders. Administration assigns responsibilities to managers of each department and those managers then assign employees to uphold these responsibilities. Administration also does most of the planning for future responsibilities. Administration has all hiring and firing privileges. Administration Department Location The Administration Department is located in Building One. It is a small single story building of roughly 2000 square feet. At the entrance is a reception desk for guests visiting the facility. There is also a security guard post at the front door. There are a total of five offices, as well as bathrooms, and a medium sized conference room. This is the only building in which two or more departments do not share the building. Relevant Administration Department Assets Administration Computers – 10 These computers are the ones used by company administration for such tasks as basic word processing and spreadsheets. They are relatively simple machines, and are purchased from Compaq. They have the following specifications: 2.2 GHz Pentium 4 Processors 1024 MB of RAM 100 GB SATA Hard Drive Built-In Video Card Gigabit Network Card 17 Inch Monitor Windows XP Administration Key List Administration has no need to go anywhere but within its own building. All employees are issues sequentially numbered keys marked ADMN (For example, the first employee is the key ADMN-1). Thus Administration only has keys to the Administration building. Administration Personnel and Contact Department Phone: 415-555-8643 Manager: Mark Saunders Rod Hatherly Bea Holdeman Susan Marcotte Kendra Bell 8 Dillon Sommer Sales Department Scope Sales Department Responsibilities The Sales Department is responsible for purchasing all equipment necessary for other departments. This is a vital process that keeps departments supplied and operational. The Sales Department is also responsible for keeping track of orders and shipments. In this, the Sales Department, works closely with the Shipping Department to assure that all sales are promptly delivered. Sales also maintains contracts with companies DigiKnight sells and purchases through. This process is important in keeping expenditures down as well as selling as our services. Any maintenance required this department is brought to the Maintenance Department. Sales Department Location The Sales Department is housed in building two along with R&D, Shipping, Purchasing, and Advertising. It is two stories with usable floor space roughly double to that of the administrative building. Sales and Shipping are located on the bottom floor along with a security guard post. The top floor is home to the R&D Department and the Purchasing Department. Instead of having individual offices for each employee, the Sales department consists of a single room with cubicles set up to give each employee a working location. This enhances team communication and makes optimum use of available space. Relevant Sales Department Assets Sales Computers – 15 These computers are used by the sales staff and mainly contain sales data. Each of the nine sales associates has an individual computer. There are 3 computers that are currently unused and the remaining three are used as a local database for the sales members. The computers are purchased from Dell and have the following specifications: 2.7 GHz Pentium 4 Processors 1024 MB of RAM 200 GB SATA Hard Drive Built-In Video Card Gigabit Network Card 21 Inch Monitor Windows XP Sales Key List Each member of the sales department has keys to both the Administrative Building and the building housing the Sales Department. The keys for this department are marked SLS accompanied by a number. Sales Personnel and Contact Department Phone: 415-555-6312 Manager: Diane Ford Halle Branson 9 Natasha Lowe Thomas Baird Lorna Hastings Dwayne Roby Pam Millard Katie Barnes Leonard Filby Helen Reese Research & Development Department Scope Research & Development Department Responsibilities Research & Development is a small part of DigiKnight. R&D focuses mainly on new production methods as well as ways to reduce production costs. The staff stays in close contact with other manufacturing locations in order to keep up-to-date with the latest technology. Research & Development Location The Research & Development department is located in building two along with the Sales, Shipping, Purchasing and Advertising departments. R&D shares the top floor with the purchasing department. The R&D department is in one large room divided by cubicles to give employees personal space. Research & Development Department Assets Research & Development Computers – 3 These computers are high performance systems capable of running the latest CAD software. There is no need for each individual to have a system. As such there are only three workstations. The systems are custom built by Boldata Technology of Fremont CA. They have the following specifications: 3.2 GHz Pentium 4 Processors 2048 MB of RAM 450 GB SATA Hard Drive Quatro Pro Video Card Gigabit Network Card Dual 21 Inch Monitors Windows XP Research & Development Key List Each member of R&D has keys to the entire facility. Their keys are marked MNF accompanied by a number. Research & Development Personnel and Contact Department Phone: 415-555-3223 Manager: Carlton Bowden Carlton Bowden 10 Kurt Gossard Sam Jarosz Corey Bogdan Anne Mcloskey Purchasing Department Scope Purchasing Department Responsibilities The purchasing department is responsible for the acquisition of new products and materials necessary for business at DigiKnight that are of a sufficient expense that they cannot be purchased with individual employee credit cards. Essentially any purchases which require checks to be cut or the company to be billed are the purview of the purchasing department. Recommendations for purchases will be made by the appropriate department (example: IT recommends computers). Purchase authorization will be completed by the appropriate departmental managers. At this point, a PO (purchase order) is generated, which is sent to the purchasing department. Employees of the purchasing department then cut a check if needed, set up a billing account with the vendor, or otherwise process bills. Purchasing Department Location The Purchasing Department is located in Building One. There are five employees, each equipped with a Windows PC workstation. A central laser printer is used by this department for their various needs. Relevant Departmental Assets Computers – 5 Dell Optiplex Desktops 1.7 GHz Pentium 4 Processors 512 MB of RAM 40 GB SATA Hard Drive 17 Inch LCD Monitor Windows XP IBM Infoprint 1140 Laser Printer Keys Department head has a key to the purchasing office Department Members Manager: Jim Thompson Chris Bellors Jessica Curry Coral Gates Allan Simmons 11 DigiKnight Technologies Inc. 2725 E. Technology Ave, Freemont, CA 94536 Administration/Purchasing Skill Matrix by Job Process Administration Employee Mark Saunders Rod Hatherly Bea Holdeman Susan Marcotte Kendra Bell Dillon Sommer Purchasing Katherine Cavenaugh Shay Robertson Robert White Ian Wolf Prepared for the: Administration & Purchasing Departments Maintain Company Increase Reputation Paperwo rk Company Communication Hiring Employees Employee Retention 10 9 9 9 9 7 8 8 8 9 7 7 9 8 9 5 6 6 6 4 7 6 6 7 5 5 4 5 5 5 8 5 6 6 5 7 Maintain Purchasing Records Maintain Contacts Paperwo rk Keep Supplies Steady On Call Availability Train Other Employees 10 10 9 10 10 10 5 4 4 5 2 2 7 7 8 8 6 7 6 6 8 7 7 6 Scoring: blank = No knowledge 1 = Familiarity 5 = Highest score for subject knowledge but lacking experience at this company 10 = Complete mastery of subject and local processes 12 DigiKnight Technologies Inc. 2725 E. Technology Ave, Freemont, CA 94536 IT Skill Matrix by Job Process IT Maintain Network Repair Systems Automation Prepared for the: IT & Research & Development Departments Communication Hiring Employees Train Other Employees Alicia McKellips Luke McDowel 10 10 6 9 8 5 5 7 Allan Smith 5 7 8 8 Joesph Webber 9 5 5 6 Robert Wildhorn 3 7 9 9 Paperwork Documentation R&D Maintain Current Make Contacts Knowledge W/ Other Companies Carlton Bowden Kurt Gossard 10 10 9 10 7 9 8 8 Sam Jarosz 8 9 6 9 Corey Bogdan 4 5 7 9 Anne Mcloskey 6 6 8 10 10 Scoring: blank = No knowledge 1 = Familiarity 5 = Highest score for subject knowledge but lacking experience at this company 10 = Complete mastery of subject and local processes 10 13 DigiKnight Technologies Inc. 2725 E. Technology Ave, Freemont, CA 94536 Security/Purchasing/Shipping Skill Matrix by Job Process Security Brett Kelcey Frank Arrons Joanna Clark Purchasing Katherine Cavenaugh Shay Robertson Robert White Shipping Prepared for the: Security, Purchasing, and Shipping Departments Communication Prevent Theft Prevent Violent Acts 9 9 8 8 6 6 5 9 10 5 8 8 8 7 4 Maintain Current Knowledge Make Contacts W/ Other Companies Paperwork Keep Reciepts 10 10 7 7 6 4 9 8 4 3 8 10 Maintain Current Knowledge Make Contacts W/ Other Companies Paperwork Keep Reciepts Training Alertness 10 9 4 Response Times Keep Inventory Steady Kenneth 10 10 7 7 9 Gilliam Derrick Cunningha 7 6 9 8 5 m Evan 4 4 7 10 4 McAllister Scorin blank = No knowledge g: 1 = Familiarity and Some Competance 5 = Highest score for subject knowledge but lacking experience at this company, well trained 10 = Complete mastery of subject and local processes, Quick Response To isses 14 Risk Assessments Layer One Assessment We are based in Fremont, California in which there are several major external risks to be considered. Risks such as natural disasters affect everything from equipment, to employees, to our customers. Natural Disasters Earthquakes Earthquakes are a major risk in California, including Fremont. Depending on the magnitude of the earthquake, it could destroy the entire facility. If the entire facility were to be destroyed, our customers would move on to someone else to produce their software which would also destroy our business. This risk is the number one risk for DigiKnight considering probability and outcome of these earthquakes. The chances of a 5.0 earthquake hitting Fremont in the next year is around 11%. The chances of that in the next five years is 50%. A 5.0 earthquake surely wouldn’t destroy but things like power outages, electrical damage, or other moderate risks to the facility are certainly at risk. The chance of a 7.5 magnitude earthquake in the next five years is only 3%. However, this is an earthquake that could destroy the entire facility. The 1906 earthquake in San Francisco was around 7.9 that killed an estimated 700-3000 people. There hasn’t been an earthquake of that size around major cities in California since then, so the amount of damage could be much higher. A big killer of these large earthquakes is fire that usually comes along afterwards. With so much electrical equipment falling apart, the risk of fire is rather high. Earthquakes a risk to every part of our company including: employees, equipment, documents, and anything else inside the facility. Fire A fire can happen anywhere but the risk of a fire in Fremont is more likely than most places in the country. Fremont can have high temperatures which deteriorate equipment faster and increase the risk of fires. This is not a huge risk but certainly is a noticeable one. However, earthquakes can easily cause fires especially on the hotter days. A large fire could easily destroy our facility unless action is taken very quickly to contain it. Just like with earthquakes, everything in the facility is at risk during a fire. This risk is second to earthquakes. Thunderstorms The risk of thunderstorms in Fremont is rather low but it should still be considered. Lightning can cause electrical damage without even striking the facility. Man-Made Risks 15 Man-made risks could be just about anything. Rather than preparing for specific risks, prepare for the outcome of these risks such as a road block. If a road is blocked from a collision, road construction, police investigation, or other things, it is a risk that needs to be considered. Chemical spills are a possibility anywhere but depending on your surrounding businesses the risk increases or decreases heavily. Pipelines are break and if happens to break under or near your facility, you will most likely have to evacuate. Bomb threats are a risk in which you will have to evacuate everyone and lose a large amount of production and money. What if a bomb actually explodes? This risk has a very low probability but the outcome could be devastating. A risk that came up recently is illegal immigrants protesting in the streets and having the certain days when no Hispanics will work or buy any products that day. In Fremont, a decent population of the people are Hispanic so a lot of production is lost on these days. These are everyday risks that can be a huge risk or small risk. Suppliers With all these risks considered our suppliers must also be applied to our suppliers. If our suppliers were to go out of business we would need to have a backup supplier already on hand or act fast and find one. This is a moderate risk for DigiKnight. It should be an easy fix, but while we are finding a new supplier production time is lost. Layer Two Assessment We currently have no plans for any layer two risks. We are susceptible to a power outage or a loss of vital infrastructure such as fire, telephone, and water. This document will assess each layer two risk in detail. Electricity In the event of an electrical outage, we have no backup lighting. This is especially dangerous should an evacuation be necessary. The company will also need some battery backup in order to have adequate time to shutdown our servers and workstations. Surge protection is needed in the event of a thunder storm. Telephones If there is an electrical outage, base telephones will work fine. They should be used in order to report an electrical outage to the power station and also if needed for an emergency. There may be a telephone outage if a telephone pole is knocked down. Cell phones should be used if there is a telephone outage to report the outage and also be used if an emergency call is needed. Water We need to make sure that nothing expensive is below ground level to help prevent water damage should our building flood. We also need to plan for mudslides that may delay employees and partners in arriving to work. We also have a water-based cooling system. We need to assure to that any leak or failure in the cooling system can be reported quickly. Should it go down overheating will damage our workstations and servers quickly. We need to plan a backup system for drinking water and also sanitation if our water company has any problems. 16 We should have a reserve of water for drinking and a backup plan for sanitation. There is no danger of any ice damages. Climate Control If the climate control went out during the summer, the business may have to be shutdown for a short period of time. There is a danger of heat stroke and/or exhaustion if it is hot inside the building. If the cooling system goes out the servers and workstations may have to be shutdown. Fire Fire is always a risk. There should be flame retardant window shades, carpet, ceiling tiles, etc. The speed fire spreads should be accounted for in the evacuation plan. We currently possess a sprinkler system that automatically activates when a fire is detected. This will help prevent any further fire and smoke damage, but may harm some electrical components. The server room should have a system that will release carbon dioxide when a fire is detected. There should be an estimated response time for the local fire department to reach our building in case they are needed. Structural The building should be inspected to make sure that there are no visible flaws that may cause harm to a person or equipment. The building will need to be looked over for simple weather details like faulty roofing for leaks, poorly sealed windows for heating/cooling costs, etc. Sprinkler systems for fires need to be inspected to make sure that water does not seep into important records or equipment on the floors below. The water pipes should be inspected to make sure that they seem sound and locate all of the emergency shutoff valves. The valves should then be tested to make sure that they will work. The building should also be inspected to make sure it is grounded so if it is struck by lightning. This will help prevent damages to the building, people, and equipment. Security There will be a security group that will help with trespassing, workplace violence, sabotage, loss prevention, and other threats. Having an independent company manage this will help reduce our company’s burden. The security team will be briefed on all emergency procedures and will be the main point of contact for any emergency services. All security personnel will know the evacuation plans if needed. Medical There will be basic medic kits in the break rooms for things like cuts, headaches, and any other minor injuries. If there is any type of sickness or injury that cannot be easily resolved with basic medical supplies, an ambulance will be called to have an EMT dispatched. There is a small chance of a serious or fatal accidents occurring in our facility. There is a chance of electrocution via our electronic equipment and some of our heavier manufacturing supplies could crush individuals. These types of accidents can be prevented with basic electrical education and assuring that all equipment is adequately secured. 17 DigiKnight Technologies Inc. 2725 E. Technology Ave, Freemont, CA 94536 # of Buildings: 3 Layer Three Assessment Layer 3 – Data Systems Date: Likelihood 0 - 10 Impact 0 - 10 Restoration Time 1 - 10 1 4 1 2 1 7 1 3 1 10 10 7 2 5 1 2.66 2 4 1 2.33 2 8 2 4 2 3 1 2 2 3 1 2 Servers 4 8 9 7 PCs 4 6 6 5.33 Grouping Risk Electrical Supply Loss of Power to Building One Loss of Power to Building Two Loss of Power to Building Three Telecommunications System Loss of telecommunications for Sales Department Loss of telecommunications for Research and Development Loss of telecommunications Shipping Loss of telecommunications Purchasing Loss of telecommunications Advertising Score Data Communications Network Routers/Firewall 2 10 5 5.66 18 Layer Four Assessment The company has ten major departments. These departments are divided by the different tasks and personnel working in those departments. As such, the risk of each individual department varies. Each department is listed along with a short description of that department’s risks. Corporate Administration: The Admin department carries few risks, but should these risks be exploited, the damage could be overwhelming. The administration holds key information with regards to the wellbeing of the company as well as an overview of all ongoing and upcoming projects. It is also the department which controls the others. In light of this, all executives and managers should be well versed in safe practices regarding information and its safe keeping. Also, no company files of any kind should be allowed to leave the premises of the building and all corporate e-mails should be sent to addresses within the company’s own e-mail server. No information should be sent to someone’s home address. Sales: The sales department is mainly in charge of relations with the customer/client. This means that they have direct access to information, not only belonging to the company, but to those whom we do business with. This information should be considered very sensitive and important. If that information is not well protected it could be harmful, not only to our company, but our clients as well. All sales associates should know the importance of safeguarding information. Also, a password policy should be in place for all those who have ready access to customer information. Manufacturing: Manufacturing has access to most current projects in place. They hold key information about all products important to the company. Should data of that kind be leaked, it could cause major damage to the company, as well as for any clients. The manufacturing floor should be monitored for anyone trying to get a product off the premises. All employees should be checked at punchin and at punch-out. Advertising: Advertising has access to information pertaining to not only current projects, but also upcoming ones not yet announced. This poses a risk to the company should the information be leaked. This information should be secured and all employees should know the importance of safeguarding privileged information. Also, e-mail correspondence about new projects should be kept within the company’s network. No e-mail to home addresses 19 Shipping: The shipping department is in charge of getting the product to the customers. This entails that they have access to the private addresses of our customers. This information should be kept as secure as possible. It should also be backed up on a regular basis. In addition, the same password policy should be in place here as in the sales department. Purchasing: This department has access to company accounts to purchase needed supplies and equipment. The information used by this department should be kept as secure as possible. I suggest that not more than two employees in this department have direct access to the information and a password policy should be in place. Also, the data should be backed up daily and be monitored for tampering from outside sources. Security: The security department is in charge of the physical security around and in each of the buildings. They, in turn, have access to every room in each building. This poses a specific risk of robbery should the keys used for the buildings be lost of stolen. I recommend using an electronic key card system, as it is more secure. The keys used should be numbered and locked in a secure place when not in use. Electronic keys can be cycled on a regular basis so that should a key be lost of stolen, it may not be used after a certain time. Also, all security employees should undergo an in depth background check. IT: The IT department should be kept the most secure. This department has access to all information on every computer on the company’s network. IT employees also have access to the physical hardware on the network as well as administrative rights to employee folders. Server rooms should be locked and monitored with security cameras. Only one key should be issued to the manager of the department. A password policy should be in place for all employees who have access to admin logins. All hardware, not in use, should be kept in a secure location. 20 Layer Five Assessment As a system administrator, the things necessary for me to do my job are essentially the same as those required for the general health and security of the DigiKnight network itself. Electricity: Because the network is critical to normal operations of the company, and my position is responsible for the health of the network, the continued operation of my position is critical. As a result, my workstation will need to be connected to the main UPS (Uninterruptible Power System) in the server room. As this system is itself powered by a failsafe generator in the event of a major power failure, I will be able to continue operating in the event of a power failure. This will allow me to properly shut down servers remotely, initiate an emergency backup if necessary, etc. Telephones: Most employees as well as myself have cellular telephones, so the business will not suffer critically if the phone system is down for a period of time. As no catastrophic natural disasters are likely in Phoenix, the likelihood of cellular networks going down at the same time as the landline system is extremely unlikely. However in the event this does happen, all senior managers will be equipped with satellite telephones for use in extreme emergencies. Water: All external water must necessarily be kept out of the server room at all times. As a result the server room is located on the second floor and is secured by watertight doors which remain closed at all times for other reasons. Fire suppression systems do not use water. Climate Control: Server room temperature is maintained at 68 degrees at all times. In the event of power failure, the UPS system or generators will kick on and allow for the maintenance of a safe temperature until the servers can be properly shut down. Fire: In addition to a standard manual-pull fire alarm, there will be an air-aspirating fire detection system. Depending on the size of the room, one or many manually operated fire extinguishers will be installed. They will each be inspected monthly and maintained if necessary. Dry chemical fire extinguishers will be preferable, and a system will be in place to cut power to the room in the event of a fire alarm. An undetermined amount of time depending on the size of the room and expected number of occupants will be calculated as a delay before fire suppression systems activate. Security: The server room has one entry point, which is a watertight, bullet proof steel door. The one window to the right of the door is made of bulletproof glass. 21 FEMA Assessment To: Task Coordinator Josh Wisman From: Editor Robert Drake As requested, I reviewed the FEMA reports for the Bay Area to determine what natural disasters were most relevant to the construction of our disaster recovery document. FEMA reported that our area could experience severe storms, flooding, mudslides, landslides, earthquakes, and severe freezes. Wildfires were also consistently reported in California, but I believe our position in an urban environment mitigates that possibility. Of these, the most relevant are earthquakes, flooding, and mudslides. All three have occurred repeatedly as per FEMA’s list of California’s disasters. Alternatively, severe freezing is a rare occurrence. Nevertheless, we should review our insurance policy to see if cracked or exploded pipes are included. The rarity of this disaster means that, in my opinion, we should relegate it to the general disaster plan rather than a separate section. I believe that severe storms should also be included in the general disaster plan. If the storm causes flooding than the appropriate response steps will be within the flood plan. If the damage caused by the storm is not flooding then the general disaster plan would be the better response. Landslides and mudslides are similar and should be included as a single plan. Ultimately our three disaster-specific plans should be earthquakes, flooding, and mudslides. It would be prudent for us to determine what insurance we have in each of these situations. It would also be useful for us to contact a structural engineer to determine the likelihood of our infrastructure being adversely affected by an earthquake or mudslide. In both situations we can expect that some amount of cleanup will be necessary, but we need to determine if the damage caused by such an event is likely to be more catastrophic or less so. Aside from insurance, we need to create detailed plans for each emergency. We need to keep an up-to-date list of all company assets so that should a catastrophic event occur we will be able to file for appropriate damages. Further we need to know how to protect these assets. In the event of an earthquake there is the possibility for fire. We need to include our fire prevention and fire emergency steps within our earthquake disaster plan. Flooding also requires a specific plan for the protection of our assets. Due to the great possibility of flooding within this geographic area it may be necessary for us to purchase flood insurance. If our present insurance does not include flood damage, especially that related to severe storms, we need to purchase ancillary insurance to cover that eventuality. Due to the extreme nature of earthquakes training will be particularly important. There is a high likelihood that medical assistance will be needed. Many key individuals may be out of communication with a large earthquake so each individual needs a high level of experience to the earthquake disaster plan. Evacuation procedures should be written. It would be advisable for us to review these procedures with law enforcement. Mudslides will also require evacuation plans. It is far less likely that key individuals will be out of contact for a mudslide, but the time necessary to evacuate may be much shorter. Therefore training and testing of the procedures in place will be just as, if not more, important for this disaster. Our final addition to the documentation of these disasters is how we proceed should our suppliers or customers be adversely affected. Most likely this information will be included in a 22 separate section of the document, but we should note the possibility that we could lose a substantial number of our co-companies if a large earthquake were to take place. Hopefully this information will serve our overall documentation project. If you wish to review the FEMA disaster reports they can be found at http://www.fema.gov/news/disasters_state.fema?id=6 23 DigiKnight Technologies Inc. 2725 E. Technology Ave, Freemont, CA 94536 Supplier Risk Assessment Form Date: Likelihood 0 - 10 Impact 0 - 10 Alternative Sources 1 - 10 Score The Tech Geek 3 6 9 162 Disc Makers 3 3 9 81 Dub-It Media Services 3 3 9 81 3 3 9 81 3 7 6 126 Boxes ISSI Business Solutions Customized Packaging Solutions Inc. The Packaging House, Inc. 3 4 6 72 Paper JC Paper 3 9 5 135 Dell Computers Dell 1 2 3 6 HP Computers HP 2 2 3 12 General Computers Bold Data 4 2 3 24 3 3 3 27 3 6 2 36 Dell Computer Repair Dell 1 4 4 16 HP Computer Repair HP General Computer Repair Boldata Software Tech Support We Sell Software Inc. 2 4 4 32 4 4 4 64 2 4 4 32 Item Supplier Raw Materials Blank DVD / CD / Cases Blank DVD / CD / Cases Blank DVD / CD / Cases Blank DVD / CD / Cases Boxes Services Copy / Fax machine Repair Office Equip Inc Production Machine Repair We Fix’Em Inc Infrastructure Phone Ma Bella 3 7 4 84 Electricity Bill’s Electric Company 4 9 1 36 3 5 6 90 5 7 6 210 2 3 6 36 Plumbing Pipes Plus Air Conditioning/Heating Air Surplus Pest Control Russ’ Roach Ranch 24 Vital Disaster Information DigiKnight Technolgies Inc. 2725 E. Technology Ave, Freemont, CA 12345 # of Buildings: 3 Emergency Telephone List Internal Security Electrical/Gas Water Heating & Air Conditioning Legal Phone Number Brett Kelcey (Manager Security) ext: 0170 415-555-3852 Michael Winters (Manager Maintenance) ext: 0400 415-555-3970 Michael Winters (Manager Maintenance) ext: 0400 415-555-3970 Michael Winters (Manager Maintenance) ext: 0400 415-555-3970 Mark Saunders (Manager) 0180 415-555-8643 External Fire Department 510-494-4200 Local, Emergency 911 Police/Sheriff 510-790-6800 Local, Emergency 911 Ambulance 510-797-1111 Local, Emergency 911 Hospital 510-797-1111 Local, Emergency 911 Electrical Company Natural Gas Company Mission Valley Electric 510-657-6180 TXU Energy Services 510-226-5777 Telephone Company Impact Communications 510-659-8488 Long Distance Company Impact Communications 510-659-8488 Internet Service Provider Charter Communications Inc. 888-438-2427 25 First Alert Information Sheet DigiKnight Technologies Inc. 2725 E. Technology Ave, Freemont, CA 94536 # of Buildings: 3 Name Mark Saunders Main Phone 415-555-8643 Order of Contact Department Administration Main Fax 415-555-2622 1 Title Manager E-mail MSaunders@dk.com Reason: Name Alicia McKellips Main Phone 415-555-8352 Order of Contact Department IT Main Fax 415-555-2622 2 Title Manager E-mail AMcKellips@dk.com Reason: Name Brett Kelcey Main Phone 415-555-3852 Order of Contact Department Security Main Fax 415-555-2622 3 Title Manager E-mail BKelcey@dk.com Reason: Name Carlton Smith Main Phone 415-555-7841 Order of Contact Department CEO Main Fax 415-555-2622 4 Title CEO E-mail CSmith@dk.com Reason: Name Michael Winters Main Phone 415-555-3970 Order of Contact Department Maintenance Main Fax 415-555-2622 5 Title Manager E-mail MWinters@dk.com Reason: Name Linda Kraemer Main Phone 415-555-6161 Order of Contact Department Manufacturing Main Fax 415-555-2622 6 Title Manager E-mail LKraemer@dk.com Reason: Name Carlton Bowden Main Phone 415-555-3223 Order of Contact Department Research & Development Main Fax 415-555-2622 7 Title Manager E-mail CBowden@dk.com Reason: Name Kenneth Gilliam Main Phone 415-555-6431 Order of Contact Department Shipping Main Fax 415-555-2622 8 Title Manager E-mail KGilliam@dk.com 26 Reason: Name Diane Ford Main Phone 415-555-6312 Order of Contact Department Sales Main Fax 415-555-2622 9 Title Manager E-mail DFord@dk.com Reason: Name Katherine Cavenaugh Main Phone 415-555-3298 Order of Contact Department Purchasing Main Fax 415-555-2622 10 Title Manager E-mail KCavenaugh@dk.com Reason: Name: Michael Churchill Main Phone 415-555-3131 Order of Contact Department Advertising Main Fax 415-555-2622 11 Title Manager E-mail MChurchill@dk.com Reason: Above is a list of the important managers in the event of a disaster. The order of contact reflections each manager’s importance and relevant skills in a disaster situation. Administration is first because they have the best overview of the entire corporation as well as all the contact data and authority. IT is next since they have the most experience with disaster operations. Security follows since they provide a necessary service in a disaster. Following that the CEO should be contacted. If the disaster has already passed or is less severe he may be called first, but the first three contacts she be notified if the disaster is ongoing or very serious. The rest of the contacts refer to relative importance in a disaster. Maintenance is useful in getting all systems back up and running. Manufacturing needs to maintain production as best as possible. Research and Development potentially has the most to lose in a disaster. Shipping, Sales, Purchasing, and Advertising are relatively unimportant in a disaster, hence they are called last. 27 DigiKnight Technologies Inc. 2725 E. Technology Ave, Freemont, CA 94536 Customer Analysis Form Goods Category/Type Critical Times Criticality Salespers on Electronic Arts JIT Critical Times Critical Times Contra ct High Volum e Main Product Peak Seas on Least Season Accessori es Peak Season Least Season Spare Parts Peak Season $100k 50k Units Madde n 07 Sum mer Spring Madden Contest Cd Summer Spring Madden Controlle r Summe r 75k Units Prince of Persia Fall Spring Na Fall Spring Na Fall 25k Units Grand Theft Auto 3 Fall Spring Na Fall Spring Na Fall 5k Units Star Wars Empire at War Wint er Spring Lightsabe r Winter Spring Darth Vadar Mask Winter 120k Units Zelda Wint er Spring Wii Winter Spring Wii Controlle r Winter 10k Units Street Fighter Spri ng Fall Movies Spring Fall Na Spring 20k Units Titan Quest Fall Spring Movies Fall Spring Na Fall 50k Units Spy Hunter Sum mer Spring Na Summer Spring Na Summe r 30k Units X-Men Legend s Fall Spring Na Fall Spring Na Fall 10k Units Na Spri ng Fall Game Genie Spring Fall Naa Spring $150k Ubisoft $50k Take-Two $10k LucasArts $240k Nintendo $20k Capcom $40k THQ $100k Midway $60k Activision Codemast ers $20k L ea st S ea so n S pr in g S pr in g S pr in g S pr in g S pr in g F al l S pr in g S pr in g S pr in g F al l 28 DigiKnight Technologies Inc. 2725 E. Technology Ave, Freemont, CA 94536 Computer Vendor Information Sheet Date Compiled: System Type July 5, 2006 # Purchased Last Purchased Compiled By: Purchase From Contact Info Joshua Wisman Service Contract (circle one) Administr ative Workstati ons 10 5-1-06 Compaq 800-282-6672 Yes No Sales Workstati ons 15 5-1-06 Dell 1-800-WWWDELL Yes No R&D Workstati ons 3 5-1-06 Boldata Technologies 800-923-2653 Yes No Shipping Workstati ons 4 5-1-06 HP 800-282-6672 Yes No Purchasin g Workstati ons 3 5-1-06 HP 800-282-6672 Yes No Advertisin g Workstati ons 5 5-1-06 HP 800-282-6672 Yes No IT Workstati ons 10 5-1-06 Dell 1-800-WWWDELL Yes No IT Servers 4 5-1-06 Dell 1-800-WWWDELL Yes No Comments Purchase new workstatio ns biyearly Purchase new workstatio ns biyearly Free phone support but only hardware warranties Purchase new workstatio ns biyearly Purchase new workstatio ns biyearly Purchase new workstatio ns biyearly Purchase new workstatio ns yearly Purchased new as needed 29 Critical Data List Computer Backups (Optical Media) – BUSINESS CRITICAL – Computer backups are critical data. When backups are lost data is in jeopardy of being unrecoverable. Losing backups is the same as not creating backups. Replacing backups is not very hard. It does however take a substantial amount of time. If the backups are lost they need to be replaced as soon as possible. Employee Personal E-mail Accounts – NONCRITICAL – Employee personal email accounts are not of high importance. The company has both business emails and personal emails so contacting the person is not difficult. Of course there are many other ways to contact someone other than through email such as their phone, which is our database as well. Employee Business E-mail Accounts – NONCRITICAL – This is about the same as the personal emails. There are other ways to contact people if they are needed. E-Mail Correspondence w/ customers – CRITICAL – Our customers are where we get our profit. If we do not respond to the customer emails they will take their business elsewhere. E-mail Correspondence w/ suppliers – SENSITIVE – This isn’t as critical as it is with customers because if we don’t respond to our suppliers email they will probably call us up because we are the ones paying them. It is still important to keep in contact with suppliers. Company Website Design – SENSITIVE – The actual design is not of high importance, but the better the website is, the more customers we will gain. Some people dismiss bad looking sites instantly and move on to the next one. This is not what we want happening with our website design. Customer Database – CRITICAL – This is our money and we need to know how to keep in contact with our customers if something were to come up. The customer database for our company is of higher importance than most companies. We don’t have hundreds of customers; we have several that give us a lot of revenue each. Supplier Database – CRITICAL – We need to know who is supplying us with what. Even though we are essentially a supplier ourselves, we will still need supplies. If something breaks we need to know immediately who to contact in order to get the missing part. Corporate Database – CRITICAL – This is our database that tells all about what supplies we have to who we are going to give supplies. It should show our employees as well with their personal information and salaries etc. Losing our corporate database would be an extreme situation especially when payday comes. Customer Payment Information (including Credit Cards) – CRITICAL – This is definitely critical. If we don’t have our customers’ payment information we will not be able to bill. If we do not receive any money the company goes bankrupt and it disappears. 30 DigiKnight Technologies Inc. 2725 E. Technology Ave, Freemont, CA 94536 # of Buildings: 3 Document Recovery Equipment Checklist Location Supplier Daytime Phone # Flashlights Building 1 Wal-Mart #2989 (510) 651-3301 Flashlight Batteries Building 1 Wal-Mart #2989 (510) 651-3301 Mops and Buckets Building 1 Wal-Mart #2989 (510) 651-3301 Squeegees Building 1 Wal-Mart #2989 (510) 651-3301 Sponges Building 2 Wal-Mart #2989 (510) 651-3301 Carts Building 1 Home Depot (510) 490-0191 Folding Tables Building 2 Wal-Mart #2989 (510) 651-3301 First Aid Kit Building 2 Wal-Mart #2989 (510) 651-3301 Protective Masks/Glasses Building 3 Wal-Mart #2989 (510) 651-3301 Rubber Boots Building 3 Wal-Mart #2989 (510) 651-3301 Rubber Gloves Building 3 Wal-Mart #2989 (510) 651-3301 Paper Towels Building 2 Wal-Mart #2989 (510) 651-3301 Plastic Trash Bags Various Sizes of Polystyrene Bags Building 2 Wal-Mart #2989 (510) 651-3301 Building 2 Wal-Mart #2989 (510) 651-3301 Waxed or Freezer Paper Building 2 Wal-Mart #2989 (510) 651-3301 Absorbent Paper Building 3 Wal-Mart #2989 (510) 651-3301 Building 3 Home Depot (510) 490-0191 General Items After Hours Phone # (510) 6513301 (510) 6513301 (510) 6513301 (510) 6513301 (510) 6513301 (510) 4900191 (510) 6513301 (510) 6513301 Individual Equipment (510) 6513301 (510) 6513301 (510) 6513301 Drying & Cleaning Material (510) 6513301 (510) 6513301 (510) 6513301 (510) 6513301 (510) 6513301 Containment Material Sand Bags (510) 4900191 31 Heavy Plastic Sheeting Building 3 Home Depot (510) 490-0191 Scissors Building 1 Wal-Mart #2989 (510) 651-3301 Duct Tape Building 1 Wal-Mart #2989 (510) 651-3301 (510) 4900191 (510) 6513301 (510) 6513301 32 Insurance Provider Contact List: In the event that the company’s insurance provider should be contacted there are some steps that should be done before the call is made. Listed below are the information that should be on hand before the call is made: 1. What is the reason for the call? a. Is the reason something the insurance company can help with. b. Make sure it is not something that a manager can handle. 2. Make sure that you have the company’s member number and any other authentication information before calling. 3. If the call is about an employee make sure to have that employees’ information on hand as well as any other information that might be asked about the situation. During the call to the insurance company: 1. Get the customer support operators name or ID number. 2. If they ask for you name or employee number, give it to them. 3. Relay the information about your inquiry to them and write down all information they give you. After the call is over: 1. Replace any files pulled for informational use. 2. Take all information written down and place it in the corresponding file. For example if the inquiry was about an employee put the information given in that employees file. 3. The date and time of the call should be logged in the corresponding file as well and should also be logged in the phone record list. 33 DigiKnight Technologies Inc. 2725 E. Technology Ave, Freemont, CA 94536 # of Buildings: 3 Key Tracking Form Key Label Key # Key Owner (The Department the Employee Works In) Key Works For LIST ALL AREAS Date Last Verified 1 Mark Saunders ADMN-1 Admin 6-15-06 2 Rod Hatherly ADMN-2 Admin 6-15-06 3 Bea Holdeman ADMN-3 Admin 6-15-06 4 Susan Marcotte ADMN-4 Admin 6-15-06 5 Kendra Bell ADMN-5 Admin 6-15-06 6 Dillon Sommer ADMN-6 Admin 6-15-06 7 Diane Ford SLS-1 Admin, Sales 6-15-06 8 Halle Branson SLS-2 Admin, Sales 6-15-06 9 Natasha Lowe SLS-3 Admin, Sales 6-15-06 10 Thomas Baird SLS-4 Admin, Sales 6-15-06 11 Lorna Hastings SLS-5 Admin, Sales 6-15-06 12 Dwayne Roby SLS-6 Admin, Sales 6-15-06 13 Pam Millard SLS-7 Admin, Sales 6-15-06 14 Katie Barnes SLS-8 Admin, Sales 6-15-06 15 Leonard Filby SLS-9 Admin, Sales 6-15-06 16 Helen Reese SLS-10 Admin, Sales 6-15-06 17 Linda Kraemer MNF-1 All 6-15-06 34 18 Jessica Talen MNF-2 All 6-15-06 19 Andrew Saunders MNF-3 All 6-15-06 20 Cassie Johnson MNF-4 All 6-15-06 21 Annette Watson MNF-5 All 6-15-06 22 Marty Kitzman MNF-6 All 6-15-06 23 Carlton Bowden MNF-7 All 6-15-06 24 Kurt Gossard MNF-8 All 6-15-06 25 Sam Jarosz MNF-9 All 6-15-06 26 Corey Bogdan MNF-10 All 6-15-06 27 Anne Mcloskey MNF-11 All 6-15-06 28 Michael Winters MNF-12 All 6-15-06 29 Bell Rosenburg MNF-13 All 6-15-06 30 Adam Loudy MNF-14 All 6-15-06 31 Katelin Griffin MNF-15 All 6-15-06 32 Lance Addams MNF-16 All 6-15-06 33 Jeffery DeVane MNF-17 All 6-15-06 34 Michael Churchill ADV-1 Sales 6-15-06 35 Aaron McDowel ADV-2 Sales 6-15-06 36 Owen Mill ADV-3 Sales 6-15-06 37 Allison Bell ADV-4 Sales 6-15-06 38 Rebecca McClintock ADV-5 Sales 6-15-06 39 Jessica Williams ADV-6 Sales 6-15-06 40 Brett Kelcey SEC-1 All 6-15-06 41 Frank Arrons SEC-2 All 6-15-06 35 42 Joanna Clark SEC-3 All 6-15-06 43 Martin Burns SEC-4 All 6-15-06 44 Alicia McKellips IT-1 All 6-15-06 45 Luke McDowel IT-2 All 6-15-06 46 Allan Smith IT-3 All 6-15-06 47 Joseph Webber IT-4 All 6-15-06 48 Robert Wildhorn IT-5 All 6-15-06 36 Backup Supply Companies In the event of a key supplier being unable to keep up with our demands for a product that is vital to the success of our company we must have a backup list of potential suppliers for each product. Having a predetermined list of companies to turn to when one supplier is unable to keep up with demands will prevent confusion and maintain our company’s operations without suffering losses due to another company’s inability to meet demands. Since we produce games and coordinate shipping around the world our key product is cases for the games. For that reason we need to have more secondary suppliers for DVD/CD cases than any other product. A list of companies to turn to in case The Tech Geek is unable to produce DVD/CD cases at the rate in which we need are: http://www.discmakers.com 7905 N. Route 130 Pennsauken, NJ 08110-1402 Toll Free: 800-468-9353 Local: 856-663-9030 Dub-It Media Services – Secondary Supplier Hollywood Sales Office 1110 North Tamarind Avenue Hollywood, California 90038 1-888-99DUB-IT Local: 323-993-9570 ISSI Business Solutions– Secondary Supplier 22122 20th Ave SE #152 Bothell, WA 98021 Toll Free: 1-800-660-3586 Local phone: 425-483-4801 Another product DigiKnight needs to continue normal operation is boxes for packaging software. The primary supplier of boxes is Customized Packaging Solutions based out of Sacramento, CA. In case of an emergency then a company to fall back onto for our packaging needs is: The Packaging House, Inc. 6330 North Pulaski Road Chicago, Illinois 60646-4594 1-800-966-1808 The final product DigiKnight needs to continue operating normally is a paper supplier for box inserts. The primary supplier of paper for box inserts is JC Paper based out of Fremont, CA. For an emergency supplier of paper for box inserts contact: Koolprint 37 6750 West Loop South Suite 140 Bellaire, TX 77401 1-888-352-1800 http://www.koolprint.com 38 DigiKnight Technologies Inc. 2725 E. Technology Ave, Freemont, CA 12345 # of Buildings: 3 Supplier Notification Checklist Current Suppliers Give Name / Contact Info for EACH COMPANY Tech Geek CDs/DVDs/Cases Disc Makers (secondary supplier) Dub-It Media Services - CDs/DVDs/Cases CDs/DVDs/Cases (secondary) 1-800-456-0825 1-800-468-9353 1-888-99DUB-IT ISSI Business Solutions CDs/DVDs/Cases (secondary) 1-800-660-3586 Customized Packaging Solutions Inc - Boxes 8333 24th Avenue P.O. Box 278060 Sacramento, CA 95826 The Packaging House, Inc – Boxes (secondary) 1-800-966-1808 JC Paper - Paper (510) 413-4700 Step # Step Comments 1 Fill out order form If we don’t fill out these forms our supplies won’t know what to send us. 2 Customized Packing Solution Inc phone number 3 Find Specific contacts 4 Secondary suppliers 5 Supplier problems We currently do not have the phone number for Customized Packing Solutions Inc. If we want to contact them we need it. We do not have something telling us a specific contact person to talk to for each supplier. We only have their phone number. Are our secondary suppliers still aware we may need them at anytime? Are any of our suppliers having monetary issues or something else that would affect us? Comp leted Done 39 6 Supplier disaster recovery 7 Paper secondary supplier Do our suppliers have a good disaster recovery plan? If they have a disaster it will of course affect us as well. We need a secondary supplier of paper in case something happened between us and JC Paper. 40 Hot Site Information The equipment needed for the hot site backup location will be identical to the main sites equipment. The four servers will be duplicated for the hot site and will be given updates on user information from the off site backup facility. The servers’ hardware will consist of: Dual 3.2 GHz Processors 4 GB of RAM 3 X 500 GB Hard Drive (configured to RAID 5) Windows Server 2003 Dual Gigabit Network Cards 15 Inch Monitor This is the exact hardware specs for the four servers on the main site. Since this is making a partial duplicate of the main site network, the price for this type of plan will be high. The benefits of making a site like this are in the event of a disaster where our main site goes down for an unknown period of time this site can be brought up with minimal time lost. Also, with having the most recent backups on hand there will be minimal loss of data when going from the main site to the backup. With the only main drawback being the cost, there shouldn’t be any reason not to implement this type of backup system as the pros greatly outweigh the cons in this situation. 41 DigiKnight Technologies Inc. 2725 E. Technology Ave, Freemont, CA 94536 # of Buildings: 3 Emergency Operations Center Information Sheet Primary Emergency Operations center Digiknight EOC Site Digiknight Technologies Inc. Building 1 2725 E. Technology Ave, Freemont, CA 94536 415-555-2668 415-555-2622 Site Name Site Location Site Address Telephone Number Fax Number Contacts Name Mark Saunders Telephone Number 415-555-8643 ext 0180 Fax Number 415-555-2622 Name Telephone Number Fax Number Brett Kelcey 415-555-3852 ext 0170 415-555-2622 Comments Comments Mark is the Administrative contact for this facility. Brett is the head security guard in this building. He can be contacted if Administration is unavailable. Alternate Emergency Operations center Tech Geek EOC Site The Tech Geek warehouse 48965 Warm Springs Blvd Fremont, CA 94539 1-800-456-0825 Site Name Site Location Site Address Telephone Number Fax Number Contacts Name Telephone Number Fax Number John Foreman 510-226-9075 510-226-9076 Name Telephone Number Fax Number Maria Woo 510-226-9074 510-226-9076 Comments Comments Primary contact at The Tech Geek. Secondary Contact at The Tech Geek. 42 43 Emergency Operations Center Supply Sheet 1. Flashlights/glow sticks/strobe signal light with spare batteries 2. First aid kits 3. Waterproof ponchos/rain gear 4. Bottled water 5. Sign in sheet/ Employee checklist 6. Towels 7. AM/FM Radio 8. Local area maps 9. Pens/Pencils (Small office set) 10. Rope/parachute cord 11. Garbage bags Flashlights will be important in almost any natural disaster. Most of the disasters that can occur can/will cause power outages. Next are first aid kits which are important as well. If someone should be injured immediate care can be administered. Rain gear should be kept in plenty stock, enough for everyone. Water and the sign in sheet are next. Water should be stored if the Operations center becomes a refuge where people must stay for an extended period of time. The sign in sheet should be completed at an opportune time and checked against an employee checklist to see who is present and who is not. Towels are important as they have many uses in different situations. AM/FM radios are important to have so that news repots and updates on the situation can be heard. Maps of the local area should be kept as well in case people have to move to an unfamiliar place and need to get their bearings. A small office set should be kept with pens and other stationary as these items might come in handy. Rope/parachute cord can be used in many different ways and should be kept at hand in case needed. Garbage bags like the towels and rope can be used in many different ways even as spare rain gear. 44 DigiKnight Technologies Inc. 2725 E. Technology Ave, Freemont, CA 94536 # of Buildings: 3 Emergency Responsibility Chart Position Purpose of Position Responsibilities Disaster Containment Manager Contain Disasters Minimize structural and personal damage Facility Engineering Manager Facility/Utility Recovery Bring equipment back online after a disaster Purchasing Staff Maintain Department Recover full operations Public Relations Coordinator Press Contact Create a news report Human Resource Staff Account for Personnel Account for personnel when a disaster strikes Security Manager Loot and Salvage Protection Secure facility during/after disaster Vital Records Manager Secure Vital Records Secure before disaster Recover after disaster Materials Manager Maintain Department Recover full operations Sales Manager Maintain Department Recover full operations 45 Disaster Recovery Procedures Restore Plan The restore plan implements all of our backup solutions and most people should be able to understand our restore plan. We now know what backup solutions we will be using and the restore plan can be created. Our hardware solution will be RAID level 5 which is an excellent choice. Our software solution is SOS online backup, which we will use for our users’ computers. We can archive our data at our off-site solution with tape backups. This restore plan tells how DigiKnight will implement these different backups by explaining certain policies and procedures. Our servers need RAID level 5 as soon as possible. The data on our servers is probably the most important so we need to get that backed first. RAID is only being used on the servers because using it for host machines would be a waste of money. Once RAID is setup you don’t have to mess around with it anymore because it does the work itself. The first thing to do is to buy a RAID controller and put it in the server. The motherboard must support RAID 5 and the controller also must support RAID level 5. A good controller to buy is PROMISE FastTrak SX4300 PCI-X SATA II Controller Card RAID 0/1/5/10. It supports RAID 5 and also uses SATA II and PCI express. The minimum number of hard drives is three for RAID 5 but four drives would give better performance and faster speeds. If you have more drives, you have a higher chance of two of the drives failing at the same time. When this happens RAID 5 dies on those drives. Only one drive can fail at once. This is why four is a good choice and not some unusually high number. The controller I chose has four connectors so using four drives should work well. Now we can connect the controller to the motherboard and start sliding in the four drives. The four drives connect the four slots on the RAID controller rather than to the motherboard since the controller is already connected to the motherboard. Start up the computer and hit CNTRL-F when prompted by Promise. Set it to RAID 5 and the leave it at the default amount of data for each stripe block. Also enable FastInit for this card because it will be really slow if you don’t. Those are the important options. There may be other options that should most likely be left to default. Save the changes and reboot. Insert the Windows CD and hit F6 to install “Third party SCSI or RAID drivers.” Now insert the CD that came with the RAID controller and the drivers should be installed. Create a partition around 10GBs for the Windows files and use the rest for data. Now you’re set. RAID 5 is installed and working. Use speed test software to see if RAID 5 is working properly. Something like PCMark would work fine for this test, even if it does test more than just RAID. SOS Online Backup is the software backup we will be using on our users’ systems. The first thing to do is to buy the software. SOS offers business accounts which come up as $1800 a year for 100GBs. I don’t think DIgiKnights would need more 46 than 100GBs of backup just for the users. Text files really don’t take up a huge amount of data so I say we purchase the 50GBs for $950. If we need more we can always buy more. Once we buy the software from SOS they will give us the software to install. Users should have their own accounts created and not share with others. This software enables users to share their backed up data easily so sharing an account for that reason should not be considered. So we install the software on each users computer, create an account for each user to log in to so their data is backed up and they can recover when needed. Then we pay SOS either monthly or annually. Either way it is the same price. Users need to know how to recover data. This way if they are missing something they can simply login, search for the file, and restore to their system. Teaching a user how to do this should not take more than ten minutes. Our off-site solution is tape backups. For tape backups, we don’t need to backup our users files, only the sever files. The users’ files are already off-site on SOS’s servers. If two drives of RAID 5 fail we will lose the data that was lost unless we have tape backups. Of course these are off-site so in case of a fire or some other catastrophe we will have these tapes to save us. A good tape drive to buy is Quantum DLT 1 Tape Drive. It costs $849 and holds up to 80GBs per tape at 21GBs an hour. Since tape backups aren’t our primary backups we do not need a super fast drive. We are just using this drive to archive our data and to keep it off-site in case something was to happen to the facility. Tapes also need to be purchased along with a cleaning kit for the drive. Every other week tape backups should be created of the new data. It may need to changed to once a month if the amount of new data is not a significant amount. The tapes should be brought to the off-site location and labeled correctly the day the tape backup was created. Creating tape backups involves a lot of waiting considering the one we are purchasing isn’t a high end drive. One person needs to setup what data needs to be copied and then let the drive do its thing and go back to their normal schedule. This preferably should be an IT person that works by doing what task “needs to be done today.” Implementing this restore plan can be done by a lot of people but should be done by the professionals at DigiKnights. The combination of RAID, SOS, and off-site tape backups is really a good one that keeps all data at DigiKnights safe. Every part of the organization’s data is backed up and also off-site somewhere. One thing that should not be forgotten is to test the backups. This applies to the tape backups more than anything else. If these tape backups aren’t tested and there is a fire at the facility and all our servers are gone, DigiKnights will be in a load of trouble. Just having backups doesn’t mean they will work. SOS should also work well with users but I’m sure there will be users who will not like it or blame causing them to lose files. This restore plan fits DigiKnights very well and should keep them safe for a long time. 47 File Retention Plan: All files that have private information with relation to the company’s employees, financial outlook, business strategy, and clients will be kept in a secure location(s) for a minimum of three years. When it is time to get rid of old information the documents will be incinerated or deleted when dealing with information stored on electronic media. With the exception of client information, this will be the procedure for all documents that are destroyed when they pass the three year mark. Client info will be destroyed as well, but only after being offered to the client first and with their understanding that should they not take the documents, they will be permanently destroyed. Breakdown of documents that should be kept: Employee records Legal documents such as Deeds, Power of attorneys, and contracts of any kind. Client information records All financial transaction records between the company and employees, outside contractors, and clients. 48 DigiKnight Technologies Inc. 2725 E. Technology Ave, Freemont, CA 94536 # of Buildings: 3 Disaster Confirmation and Declaration Report Page 1 Disaster Classification Of 2 Page(s) Catastrophic / Major / Minor Description: Loss of all electrical power to all three buildings of the organization. Confirming Manager Confirming Source (1) Name Alicia McKellips Name(s) Brett Kelcey Department IT Title(s) Manager of Security Telephone 415-555-8352 Telephone 415-555-3852 Fax Fax Confirming Source (2) Confirming Source (3) Name(s) Mark Saunders Name(s) Linda Kraemer Title(s) Manager of Administration Title(s) Manager of Manufacturing Telephone 415-555-8643 Telephone 415-555-6161 Fax Fax Comments: Unknown the extent of time the buildings will be without power. Backup generators only capable of running the production facility long enough to properly shut all equipment, avoid further problems from arising. In the event of a catastrophic event contact Alicia Mckellips, IT manager, who is capable of officially declaring when a problem has become a disaster and organizing the emergency operations center. Alicia McKellips will designate orders to the department heads on what to do 49 and where to go. Emergency response team should have a predetermined meeting place and await Alicia McKellips orders on how to proceed. If Alicia McKellips is unreachable, contact one of the following managers: Brett Kelcey manager of security, Mark Saunders manager of administration, or Linda Kraemer manager of manufacturing. Any of the previously mentioned managers are a confirming source for a disaster and will be able to either contact Alicia McKellips or act in her absence. Each of the managers that have been chosen to be a confirming source were chosen for a specific reason. Alicia McKellips is the confirming manager since she is the head of the emergency operations center. Brett Kelcey has been chosen as a confirming source since he is the manager of security. As manager of security he has access to the entire local facility and therefore a good confirming source. Mark Saunders is manager of the administration department and therefore is in essence the head manager of DigiKnight especially building one. If anything should happen in building number one Mark Saunders should be contacted first hence the reason for his being a confirming source for the entire local facility. Finally Linda Kraemer, manager of manufacturing, has been chosen for the same reasoning that Mark Saunders was chosen. Linda Kraemer is the manager of building number three and hence the decision maker for that building. If a disaster should occur contact one of the above mentioned managers or meet at the predetermined destination. At the predetermined destination one of the managers will be able to confirm there has indeed been a disaster and will begin working with Alicia Mckellips on setting up the emergency operations center. 50 DigiKnight Technologies Inc. 2725 E. Technology Ave, Freemont, CA 94536 # of Buildings: 3 Maintenance Priority Ranking Ranking (Top Priorities First) Maintenance Process 1 Check for Broken Equipment 2 Test your backups 3 Test fire alarms 4 Fire extinguishers 5 Check for leaks 6 Test backup equipment 7 Check locks 8 Empty Trash/Clean floors 9 Check for humid areas 10 Pest control Reason for Ranking DigiKnight has a lot of technical equipment and if something breaks it needs to be replaced as soon as possible, otherwise lots of production time is lost (which is money). What’s the point in making backups of important data if you don’t whether it works or not? If your data becomes corrupted and you find out the backups don’t work, this will cost the company more money and you won’t have a job anymore. This doesn’t have to be done often but you need to know that the fire alarm works. If there is a fire and everyone is still sitting at their desks people could easily die and the facility would be burn down much faster without the fire department being aware immediately. Make sure you have fire extinguishers. Fire extinguishers can put out what could become the DigiKnight’s death. Make sure no water is getting in especially if it is actually raining at the time. Leaks still need to be checked for often because they can cause a good amount of damage to your equipment. This is things such as backup lights that would be used in the emergency operations center. Make sure that if a disaster occurs the backup equipment you have in place will actually function. DigiKnight can’t have random people coming into their facility taking whatever information they can find. The facility needs to be clean otherwise there will be garbage/germs everywhere and people will start calling in sick which means DigiKnight will lose money. If mold starts to grow you have to know about it because the earlier you know about it the easier it is go get rid of. If you keep checking for leaks this probably won’t become a problem. If there is an infestation present, pest control can be called and will deal with it fast. Otherwise call in pest control to clean twice a year or so. 51 11 AC Filters Air conditioning filters need to changed for cleaner air. Paper Records Recovery Water Damage: Paper is fragile especially when wet. Thus it must be handled with care. There are several ways to handle water damage. The first is air drying. Air drying is most suitable for smaller quantities of items. It is just not efficient enough to properly dry larger quantities. All items should be placed in a room with a humidifier keeping the humidity below 20%. The higher the humidity the more likely mold will grow. Room temperature should be kept below 70 degrees. Fans must be going in the room at all times to keep the air circulated. This greatly helps to prevent mold. For books, you want to take each book and stand it up on its end, open at a 90 degree angle. Place unfolded sheets of paper towels between groups of pages. You can also put one under the books. Periodically change the paper towels and flip the books over onto their opposite end. After the drying process books will most likely have to be rebound. Paper documents can be hung up on a drying line or laid out on sheets of drying paper. They should not be stacked more than 1/4inch high. The next method of recovering water damaged documents is freeze drying. Freeze drying can dry a much larger amount of items. They are literally placed in a freezer and frozen. The freezer must be kept between -10 degrees Fahrenheit and -40 degrees Fahrenheit. While freeze drying works better than air-drying and eliminates the chances of mold, it can take 4 to 18 months to finish the drying process. Another method of saving documents from water damage is vacuum drying. With this method, items are placed in a chamber where a vacuum is introduced and the temperature is brought to just above freezing. This method can cause a lot of distortion in books, and also is not good for photographs. For larger quantities of damaged items, it is more cost effective than air drying. The last method of drying is vacuum freeze drying. With this method, the damaged items have to be transported to a special facility via refrigerated truck. There, they are placed in a vacuum chamber and frozen until dry. This method is often so good that books do not have to be re-bound. However it is not so great for photographs. Fire Damage: Documents that have been damaged by fire are also very fragile. They should be placed on absorbent paper to remove any moisture left in them. Carry any documents by the absorbent paper, not by the document itself. Any documents that are not critical should be discarded. Other documents can be photocopied if possible. Books have a tendency to be less flammable than a sheet of paper. This is because there is no space for air in between the pages. Even if parts of books are damaged or destroyed it may be possible to recover the rest. In really bad cases there are companies that deal with fire damage. They can attempt to remove charring and have specialized deodorization techniques to remove the smell left behind from smoke. 52 Sewage Damage: Any documents damaged by a sewage leak need to be decontaminated. Document recovery specialists have special decontamination solution that they use on the documents before they dry them. This must be done otherwise when the documents have dried, substances will remain inside of the fibers of the paper and can be toxic. 53 Customer Disaster Notification This is to notify you that DigiKnight Technologies Inc. has experienced a serious incident. A (insert incident) occurred that has temporarily halted shipping and production. This may impact your order by late shipments. A detailed recovery assessment is now underway. We will contact you again within 24 hours with a full update to the situation and any impact it may have on your open orders. Thank you for standing by us in this moment of adversity. If you have any questions, please contact Michael Churchill at 415-555-3970 x0400. Supply Chain Breakdown Jim Thompson issued the following statement today regarding the problems caused at Digiknight due to the recent hurricane in Louisiana: “I met with Steve Gibson and Cody Belkin at Principal Metrics, our chief supplier of electronics components today to discuss the severe interruption of shipments. Because the main production facility is located in New Orleans, it effectively no longer exists as a viable operation. The facility has been heavily damaged by the storm and electricity has not yet been restored to the region. Even if the plant had power, it is unlikely that the facility is in any condition to manufacture anything, much less sensitive electronic devices. The company is still taking orders and producing parts at a smaller secondary facility in Kentucky, but obviously, order turnaround is extremely reduced. While we at Digiknight wish to remain loyal to Principal Metrics, for the security of our business and the welfare of our customers, we must now establish a relationship with a new vendor who is capable of meeting our production demands. To that end we have entered in to discussions with several reputable organizations and will be selecting one as a business partner by the end of the week. Until we are able to able to return to normal operating levels, we ask that our customers and partners who depend on our services be as patient as possible considering recent events. While we value our relationship with each and every one of our customers and hope that they will all stay on board with Digiknight, we realize that some customers may find it necessary as we have to find a new vendor. We hope that upon return to normal production levels, those customers who turn to another vendor consider returning to Digiknight. It is estimated that the New Orleans facility used by Principal Metrics will not be operating at full capacity for a minimum of one month. We will be in contact with the production manager there on a frequent basis and will keep our customers as up to date as possible with their progress. In the interim, we invite you to contact our Public Relations Representative, Jessica Curry. She will be devoting her full attention to this issue and is happy to answer any questions that customers, press, or other interested parties may have. 54 Sincerely, Jim Thompson Division Manager Digiknight Family Employee Statement Policy To the families of our valued employees, In light of the recent disaster that has affected many of our daily lives; we at DigiKnight Technologies extend our deepest sympathies to all that have experienced the disaster. Our employees and their families are an important part of our company family and we will be there to support in any way we can. We will make it our goal to help with the recovery efforts and should anyone need aid we have set up a support line for such inquiries. Listed below are help lines setup by our company and other relief agencies. Again we want our employees and their families to know they are not alone and DigiKnight will be there to aid in any way we can. Greatest Respects, DigiKnight Management Staff DigiKnight Relief Helpline: 1-800-567-8843 Red Cross Helpline: 1-800-RED-CROSS Government Relief Helpline: 1-800-WHATS-GOINGON 55 The Interim Plan Backup Plan In order to decide what products should be used for backing up our data and assets we first need to research what products would work best for us. Certain solutions may not suit our organization very well but would work well for others. This is why a number of solutions will be compared to find the best one for our organization. I will compare three hardware solutions, three software solutions, three off-site solutions, and make my recommendation for which solution is the best of each category. The first hardware solution I will discuss is RAID. RAID stands for redundant array of independent disks. RAID has multiple levels that have different functions and I am choosing RAID level 5. RAID level 5 gets the biggest bang for the buck. Other higher level RAID levels are more efficient but are much more expensive and also expensive to implement. RAID level 5 works using many of the other qualities of lower level RAID levels. First you need three drives to implement RAID level 5. Data is separated into multiple pieces and each piece is placed on a different drive along with the parity on a different drive. This way if a drive fails it will it can combine the blocks on the working drives along with the parity block to get the data back. RAID level 5 is also one of the faster levels of RAID. It has the highest read data transaction rate. The best thing about RAID is that it does not require human intervention. A big problem with backups can be human error but with RAID, humans don’t have to do anything other than implement it. I found a 4.2TB (16 300GB Drives) RAID level 5 SATA II rackmount for $7000. RAID should be used for server backups and not for personal computers. One of the best things about RAID is that the data is always ready to be restored and is being backed up all the time. In most cases data will be backed up once a day and if something new is created that day and is lost in the same day, there may not be a backup of it unless of course RAID is being used in this situation. The second hardware solution is tape backups. Tape backups are a simple process. Tape drives are used to copy as much data possible onto them which is the backup of your data. It is an actual physical tape that will need to be stored somewhere. Tape backups have been used for some time and have rather slow transfer rates. Faster tape backups can be bought but it comes at a price of course. HP sells a StorageWorks DAT 40GB Tape Drive for $1124. This tape drive stores only 40 GB of data but can transfer at up to 23GBs an hour. Some of the different types of tape drives are DAT, DLT, AIT, and LTO. LTO has the highest storage per tape and the fastest transfer rate. LTO can go at up to 216 GB an hour for 400 GB tapes. These tape drives cost $4000 with each tape costing $36. Tapes aren’t the most reliable backup so they need to be kept clean and in a safe area. Doing tape backups manually starts up the human error process. Everyone can have a bad day and not pay attention to what they are doing and can easily destroy an entire tape backup. I will say right now that tape drives are good for archiving all your data. All of these tape drives use a SCSI interface. 56 The third hardware solution is using any sort of removable media other than tape drives. This can include anything from floppies, Zip drives, CDRs, DVDRs, and external hard drives. This is used more in small businesses and also has the human error factor to it. Writing your data to CD-Rs or DVD-Rs can take a long time seeing as how the transfer rate is rather slow. CDs and DVDs can’t hold a lot of data so that is definitely another disadvantage there. External hard drives would be the best choice for removable media but it transfers would still take a long time and do it all manually. That is worst part about using removable media for backups; everything has to be done manually. There is no automated way to do it. If you use CDs or DVDs there will be a lot of them and they will need to be labeled properly. Considering CDRWs and DVDRWs would also be a smart thing. The rewritable media would be better overtime but it is expensive. However if you want to archive it all you shouldn’t buy rewritable media. All of these hardware solutions will also include a power backup system. A large UPS system should be purchased and APC sells an “industrial” UPS that is designed for “equipment in harsh industrial environments. “ APC says it works well for manufacturing floors, process automation, and control rooms. Considering DigiKnight does a lot of manufacturing so this should suit us well. It is very important to have some sort of backup power to keep the process going until it can be effectively stopped. It is also important for a meeting in the Emergency Operations Center. We need a UPS to support our computers as well. If the power goes out there needs the UPS needs to have enough power so we can save the data that is currently in the RAM before the computers are properly shutdown. The first software solution is Acronis True Image. The main purpose of Acronis True Image is to of course make exact images of your hard drive. You can store this on anything from a CD to an external hard drive. This makes storing data on your tapes or other removable media much easier. Also, it comes with its own DVD burner. Apparently it takes “15 minutes” to back up your entire drive to an external drive. Whether or not this is the image creating process or the transfer process is not known. The official website of the product doesn’t show the speed of creating the image which means it’s either slow or most products are the same. Either way Acronis is only $50 which isn’t bad at all. It has other features such as editing an image but these other features aren’t very important. The next software is solution is SOS online backup. This is different from Acronis. This works by installing SOS on the client’s computer and telling SOS which files to backup. You then set a time for SOS to backup the data, probably nighttime, and then during that time SOS will backup the files to a global network of SOS datacenters. SOS will only send files that have changed and will not keep sending the same files every night. This will save a lot of time if it actually works. A lot of backup software will keep backing up the same files no matter the case and not check for new or modified files. It will send the files in compressed format to reduce the transfer size. The options for backing up files can get very specific which reduces backing up non wanted files. Although why would someone have files that they do not want to backup? When you 57 end up losing your data from a virus a failed hard drive you open up the program, login, and select the files you want to recover. When the data is backed up it is encrypted on the user’s computer, again when it is sent, and encrypted when it is resting in storage. SOS also has some share feature to share any data with someone who has an email address. Unlike Acronis, SOS requires a monthly fee. This makes it much more expensive and considering off-site capabilities, it is probably worth the money spent. The third software solution is LiveVault Online Backup Service. This is very similar to SOS online backup but there are differences. With LiveVault, your data is continuously backed up when your data changes. It seems as though this would cause problems with computers slowing down since every time a new file is created it will begin backing up the file. However they are trying to achieve what RAID does and have your data safe 24/7. Just like with SOS the data is stored in an off-site datacenter. You can login to any web browser and whichever computer the login is for, that computer will now be accessible for LiveVault options through your web browser. Prices are not given because they want to you do the trial but it is a monthly price. I didn’t read anything about encryption which isn’t good. The first off-site solution is tape backups. I have already discussed tape backups a lot as a hardware solution so I’ll discuss how it would help as an off-site solution. Tape backups are very good for archiving A LOT of data. Some of these tapes can hold an incredible amount of GBs and archiving your data for many years is a good idea. Some day could come when you are in court and something is needed to prove innocence. Tape backups don’t have to be your main source of data backup but they can be your off-site choice. The backups will need to be delivered the off-site facility as soon as possible after the backups are created. Tape backups shouldn’t take up too much space if the large size versions are used. These tapes need to be kept somewhere clean and safe and they need to be tested. Having backups that do not work is a large waste of time and money. The second off-site solution is SOS online backup. I have also already talked about this product and it isn’t a hardware backup. This solution is extremely easy. If the facility burned down and you used SOS for all your systems there shouldn’t be a problem when it comes to lost data. You will just need to login to the software and choose what files you want to recover. The only thing that could possibly be hard about using SOS is the paying the monthly fee. Other than that it is safe because of the three tiered encryption method. This encryption may slow things down but it is secure. The third off-site option is LiveVault Online Backup Service. I have talked about this as well. It works the same as SOS except it backs up data instantly as it changes. The recommended hardware solution is RAID level 5. I think RAID is much more efficient than tape backups and removable media is just a joke compared to RAID and tape backups. Tape backups removable media created solely for backups so they will be better than any removable media out there. RAID is better than tape backups because it does not require human intervention and it is alive and ready to restore any 58 lost data 24/7. With tape backups that data isn’t backed up until it is actually transferred. RAID is there waiting to fix any failed drives. RAID cannot back up the entire organization though because there needs to be some sort of off-site solution. RAID probably costs slightly less than tape backups in terms of capacity and paying people to do the tape backups. Once RAID is implemented you really don’t have to mess around it with much anymore. It is good to go. The recommended software solution is SOS online backup. First of all Acronis doesn’t do much. It just creates and image for you to place on some removable media. There are free programs out there that can do this if it is really needed. SOS and LiveVault come much closer than Acronis. The primary reason SOS is better is because it uses three levels of encryption. LiveVault just sends all your files unencrypted to the LiveVault datacenter. LiveVault brags about its “24/7 backup” but this seems as a disadvantage to daily backups. When you create a file, LiveVault will start creating a backup of it and slowing everything down. This will happen a lot which means lost production which means lost money. Since RAID is being used for the servers this wouldn’t be a bad choice to backup data on users’ computers. The recommended off-site solution is tape backups. Even though I didn’t choose tape backups as the hardware solution, they are still great for archiving your data. If you wanted to keep all your data for years with SOS or LiveVault you would be paying a monthly fee the entire time. With tape backups you just buy the drive and the tapes. These tapes however would be used to backup critical files first and foremost and the files on users’ computers will be on the SOS off-site datacenter. Why make tape backups of if they are already off-site somewhere else? Tape backups are a great solution for critical server files and configurations. Organizational Contact Information Department Employee Dept. Phone Extension Administration Administration Sales Sales Manufacturing Manufacturing R&D R&D Maintenance Maintenance Advertising Advertising Shipping Mark Saunders Rod Hatherly Diane Ford Halle Branson Linda Kraemer Jessica Talen Carlton Bowden Kurt Gossard Michael Winters Bell Rosenburg Michael Churchill Aaron McDowel Kenneth Gilliam 415-555-8643 415-555-8643 415-555-6312 415-555-6312 415-555-6161 415-555-6161 415-555-3223 415-555-3223 415-555-3970 415-555-3970 415-555-3131 415-555-3131 415-555-6431 0180 0181 0200 0201 0150 0151 0100 0101 0400 0141 0160 0161 0130 59 Shipping Purchasing Purchasing Security Security IT IT Derrick Cunningham Katherine Cavenaugh Shay Robertson Brett Kelcy Frank Arrons Alicia McKellips Luke McDowell 415-555-6431 415-555-3298 415-555-3298 415-555-3852 415-555-3852 415-555-8352 415-555-8352 0131 0120 0121 0170 0171 0190 0191 60 Keys Keys are important to DigiKnight Technologies. Controlling access to certain parts of the facility is not a difficult task but it must be done correctly. Documentation should show who has access to what parts of the facility. In the case of passwords, this information doesn’t necessarily need to be documented. In fact, since Administrators have access to everyone’s password they should not be documented. Another consideration is what rights and privileges users have on the network. For instance, accounting should not be allowed to read or modify all documents on the network. Using traditional keys versus electronic keys is an issue that has come up in a lot of companies. Electronic keys are superior in many ways but also have their disadvantages. Traditional keys are very cheap and are something you carry with you. Electronic keys can be something you are, meaning something such as biometrics. Keycard IDs are essentially the same as traditional keys easier to keep track of. Unfortunately they are more expensive to set up. Certain people may have problems with keeping track of multiple traditional keys, but keeping track of one key card should not be a huge problem. If you require people to wear their key card and show it all times the chances of them losing it drops significantly. If certain people tend to “lose” their keys a lot, they should no longer be given keys. Something should be changed so they can access what they need to without the risk of a random person finding a key to access this information. Biometrics is another access control method that is far more secure than traditional keys and key cards. People do not have to carry an object with them to gain access when biometrics is used. The authentication is part of their body such as fingerprints, or eye retina. The reason why biometrics are not used much today is because of the cost. Nevertheless It is well worth investing in a simple fingerprint authenticator for the critically important assets of DigiKnight Technologies. Passwords are the least “secure” form of authentication. However, passwords should be always be used as a multiple form of authentication. The more keys/passwords put onto something the more secure it becomes. The passwords given should be complex using letters (in lower case and upper case), numbers, and special characters. They should be at least ten characters in length and a new password should be given out every 60-90 days. Passwords are obviously the cheapest form of the authentication and require very little effort to implement. Passwords should not be relied on to secure the most important assets of DigiKnight Technologies. 61 Test Scenarios & Continued Maintenance DigiKnight Technologies Inc. 2725 E. Technology Ave, Freemont, CA 94536 Power Outage Test Scenario Date Prepared 8/2/06 The Test will be conducted on: Scenario Leader: Alicia McKellips 10/15/06 The Test will last for 4 Hours Description: In this scenario it is imagined that an automobile accident down the road resulted in a power outage for anyone in the area. Since this is a business area and the power company workers already know the location of the problem, the power should return fairly soon. Servers must be shut down properly to avoid any data loss. The proper department employees must contact the power company to find out what is going on as well as contact any customers that may have a concern. Customers that may have delayed shipments are especially important to contact. The manager from every department will participate in the testing of this scenario as it applies to everyone. Each manager must know what their employees should be doing. This includes employees that are not directly involved with recovery. Safety precautions must also be taken to be sure that no employee gets hurt stumbling around in the dark. Everyone should know to keep doors closed since if the power is out, the AC is out as well. Purpose: Power outages are common occurrences for anyone on the power grid. If the power goes out the entire business will be shut down and production will be suspended until it is restored. This is a major concern for DigiKnight. Everyone must know how to deal with this situation to get the maximum amount of work done while also trying to restore power. Servers must also be shut down properly or data loss may result. Employees must know what to do or they may not remain calm and may be unable to assist in the recovery process. Understanding is critical to recovery and maximum productivity. Major Individuals Involved Alicia McKellips Mark Saunders Brett Kelcey Katherine Cavenaugh Kenneth Gilliam Michael Churchill Michael Winters Carlton Bowden Linda Kraemer 62 Diane Ford DigiKnight Technologies Inc. 2725 E. Technology Ave, Freemont, CA 94536 Date Prepared 8-6-06 Scenario Leader: Mark Saunders Nature Based Test Scenario The Test will be conducted on: 8-21-06 The Test will last for 5 hours Description: This is an earthquake test because an earthquake is the most likely large disaster to happen at DigiKnight Technologies. This test will involve everyone at the facility. The test earthquake is a large earthquake that could possibly destroy the facility, which is what we need to test for. Everyone in the manufacturing rooms will be told to get out of those rooms into the closest department rooms to them. The manufacturing rooms have the largest equipment and the first thing to do is get away from large equipment. People will attempt to exit the building as fast as possible in an orderly fashion. This means people closest to exits of the facility should leave immediately. If someone is in a room where are all exits are blocked of they should take cover under something that can break the fall any other objects. Purpose: The purpose of this is to obviously keep people alive. Since this test earthquake is assumed to be a large one that could destroy the facility our first priority is to get people out of the building. Saving equipment will be hard to do but some things may help. All computers, servers, or other data will need to be left behind. We will lose the actual hardware but we will still have our data backed up off site. The building and other large equipment should be insured so that is another reason why people come first. Sure the equipment brings us more money but lawsuits can come up if people start dying when there was a way to keep them alive. This test won’t be easy to emulate because earthquakes don’t last a long time so everything needs to be done immediately. Since things have to be done so quickly, it needs to be tested so everyone knows exactly what to do in case of an earthquake. Major Individuals Involved 63 Mark Saunders – Administration Manager Linda Kraemer – Manufacturing Manager Carlton Smith – CEO Michael Winters – Maintenance Manager Brett Kelcey – Security Manager Alicia McKellips – IT Manager Administration staff 64 DigiKnight Technolgies Inc. 2725 E. Technology Ave, Freemont, CA 12345 # of Buildings: 3 CD / Paper Plan Update Checklist Process # Process Title Purpose 1 Burn new revision to discs. Discs are to be distributed to employees so that each employee can have a copy of the disaster recovery plan. 2 Clearly label discs with the date. Mislabeled discs may result with someone referring to an older version of the plan. 3 Collect old copies. This helps prevent employees from being unsure of which revision to refer too. 4 Hand out new copies. This step provides each necessary employee with an updated copy of the disaster plan. 5 Email users. This step allows for any employees that may have been skipped to be sure they receive a copy of the new plan. 6 Destroy old discs. This prevents the old copies from being mistakenly referred too while also preventing anyone from outside the company from being able to read the plan. 65 DigiKnight Technologies Inc. 2725 E. Technology Ave, Freemont, CA 12345 # of Buildings: 3 Intranet Document Maintenance Checklist Process # Process Title Purpose 1 Server up? If the server isn’t up there won’t be an Intranet to look at the plan. 2 Plan on the Intranet Now that the server is up, the plan should be on the Intranet or people can’t find the plan. 3 All pieces of the plan The whole plan needs to be on the Intranet, it can’t be bits and pieces. If anything is left out people could spend a lot of time looking for something that isn’t there. 4 Update Access 5 Updated? 6 Organized 7 Update Notes Someone should be noting when the intranet is updated and what the update was at that time. 8 Access to Intranet Not all random people should have access to this intranet. This is a bigger priority in other cases, but in terms of looking at a backup plan, this isn’t the top priority at all. 9 Typos, Grammar, etc. Grammar, typos, and other things should be corrected in the plan. Not everyone should have access to update the plan because everyone would have their own little suggestions that may be realistic or just jokes The plan should be updated on the intranet because if someone else has the updated plan but the intranet does not, people will be doing the different things. Plus the updates are to help the plan work better. The intranet needs to be organized so people can find where the actual plan is go directly to the part they need to find. 66 Tabletop Test: Mudslides 1. Confirm a meeting with President: We need to talk to the President. He has to write off on all testing. Although this is a tabletop test only we will be taking a large percentage of the managers from their daily tasks. This is something that requires confirmation from the highest levels. 2. Send Email to every manager: We need to contact all relevant individuals of a meeting. 3. Confirm an RSVP for each manager: We need to make sure there are no major conflicts with the managers. Any managers who we don’t get an RSVP from need be contacted in person. 4. Choose a leader for the test: Someone needs to be given responsibility for the complete organization of the test. This person needs to be familiar with all aspects of the company. A person experienced in mudslides will be especially useful. 5. Plan the tabletop test: Before the test even begins we need to create an agenda. This includes what topics will be discussed, what results we expect to achieve, and everything else related to the test. This section includes researching all relevant information on mudslides. Copies should be made in preparation for the tabletop test. 6. Prepare physical supplies. Things like cups, water, donuts, paper, folders, all need to be grouped in one area before the test. If these things are not in place before-hand time will be wasted during the actual test. Since we are already decreasing productivity this is unacceptable. 7. Make a final confirmation. The day before the planned testing every manager should again be contacted. Testing is important and every individual needs to be there. 8. Hold the meeting. This stage is for the actual tabletop test. Mudslides should be discussed. The disaster recovery document should be reviewed. The entire emergency procedure for mudslides needs to be discussed. Errors should be noted and full documentation of the meeting should be collected. 9. Debrief. After the meeting the core recovery team members should review the changes to be made to the document. A final report should be given to the President. If a small scenario testing scenario is planned the above steps should be repeated again on a larger scale. 67 Paralipomenon DigiKnight Memo Kevin Brunch IT Department Team Member Dear DigiKnight Technologies Incorporated Employee: As of June 4th, 2006, DigiKinight Technologies Incorporated will begin a project to create a working document establishing the plans and procedures to follow in the event of a disaster affecting the company’s network infrastructure. The recovery document will be a step by step process to follow for each department and will contain a different plan of action for an array of disaster scenarios. Although some departments may already possess a recovery document, this project will include all departments as well as how each department will interact with others in the event of a disaster. The project is will end no later than August the 7th of 2006. During the length of the project a minimum of one person per department will be needed to participate in the creation of the recovery document. However, every member of the team will not be required to attend each meeting. Only days in which input from your department is needed will members be required to attend. The project team is scheduled to meet twice a week on Mondays and Wednesday s from 4:30 to 5:30 p.m. The department manager for each department will decide as to which team member will be able to participate in the project. The member from each department will need to have full knowledge of the function and procedures of the department. They do not need to be the most experienced or head of the department. The project team member must be knowledgeable enough to provide input as to what actions and plans are applicable and useful to their department. Each project team member will also need to be capable of researching any additional information about the department for specific disaster issues. Any employees with previous experience with disasters recovery are encouraged to speak with their department managers about potentially helping with the project. Although some departments may already have a recovery plan it is important to create a disaster recovery plan that encompasses all aspects of the company in one document. While one department may have created a recovery plan it will not be take into account outside issues or the totality of business continuity. A universal disaster recovery plan is needed. Any previous disaster plans that have been created by individual departments will be used in the planning of the organization-wide disaster recovery plan. The organization-wide disaster recovery plan shall incorporate all previous disaster planning into a detailed plan of action useful should virtually any situation that may occur. Without a detailed list of procedures the only plan of action is to ad lib the recovery process, which inevitably leads to mistakes. There are many items to consider during the planning of the disaster recovery plan. It must be planned thoroughly. In the event of a disaster how long could the department continue to 68 operate before having to shut down? Who will execute the plans? How much warning time is there before the disaster occurs? These are just a few items the project team must consider, not only for each department, but for the entire company as well. Each department will have different requirements in different disaster scenarios. Such is why one person per department will be needed to participate in the creation of the disaster recovery document. During the next few months we will appreciate all assistance and cooperation with the project team. If you wish to be a member of the project team please contact your department manager. Any comments, questions, or concerns about the project can be direct to your department manager or to the project lead, Joshua Wisman. Thank you, Project Team Interim Plan Memo Sir, As the Disaster Recovery and Management Team compiles the Disaster Recovery Plan I would like to suggest and recommend that we concurrently design and implement an Interim Plan in the event of an incident before the completion of the Disaster Recovery Plan. It would be highly unfortunate and damaging if the company was caught “with its pants down” and suffered a heavy loss from a disaster of some sort while it was in the progress of compiling a disaster recovery plan. To that end, I suggest the following steps: 1. 2. 3. Form a separate sub-team to compile the Interim Plan Task this team with assessing the immediate disaster recovery needs of the company. The team will need to do the following things: Compile a list of key personnel and contact information Collect a complete set of keys to all critical areas and passwords Compile a list of service contracts and appropriate contact information Compile a list of vendors and appropriate contact information Complete a walk-around asset inventory Compile a software asset list Compile a list of critical business processes Compile a prioritized list of critical restoration activities Compile a list of any toxic materials stored and their locations Compile a list of all emergency equipment and its locations Compile a list of all first responders (EMT, fire) 4. 5. Assign the team the job of compiling all of the above information in to a cohesive, interim disaster plan Test the plan Designing a plan such as this for short-term needs will help protect the company in the event of a disaster strike before the completion of the main plan. It is absolutely essential to protect the company and its interests now, not in six or nine months when the full plan is finished. The goal is to complete this plan in no less than one month’s time. 69 Thank you Chris Saltzman Backup Memo Dear Mr. Smith: Our company creates and uses a wide variety of important data including customer information, Research & Development Projects, as well as private financial information. Were this data to be lost our company would be hurt dramatically. It is for this reason that we have prepared a backup plan. Each computer contains, at least in part, vital data. Certain computers do however have more important data that require different backup strategies. Thus we have different backup plans implemented specifically for each department. The plans are as follows. Administration Department: 10 Computers. The Purchasing Department’s primary records are contained with the server database. There is no department specific backups. Sales Department: 15 Computers. These computers contain the majority of the short term financial records. This data is potentially extremely important. While we would like to backup each computer, that is financial prohibitive. We suggest that the Sales department turn one of their computers into a server. We can then perform a full Grandfather-Father-Son backup on that single server. Monthly full backups would be archived. Weekly full backups would be saved for a month. Over the week differential backups would facilitate the speed of data recovery should the backups be necessary. Until we can convert one of these computers to a server we intend to perform daily incremental backups and a single full monthly backup that is saved offsite. Restoring that data could potentially be extremely time consuming, hence our plan to add a storage server. Research & Development: 3 Computers. R&D contains some of our most vital information. As above, all computes will be protected with a full GFS system. Since speed is not necessary the “son” backups will be incremental instead of differential. Shipping Department: 4 Computers. The shipping department keeps a record of shipments made and received. While this data is important most of it can be reconstructed as necessary. Also their data along with the Purchasing department is almost all contained with the IT servers. As such there are no special backups for this department. Purchasing Department: 3 Computers. The Purchasing Department’s primary records are contained with the server database. There is no department specific backups. Advertising Department: 5 computers. The advertising department keeps track of past, ongoing, and future advertising. Contained within the computers are the artwork and slogans related to this task. In an emergency this data is not strictly necessary, but we have decided that occasional backups may facilitate a faster return to “normalcy”. Thus we have decided to perform weekly full backups that are maintained on-site. A yearly backup will be archived. IT Department: 10 Computers. These computers save all their files to the servers. The workstations contain minimal information. There will be no IT backups for the workstations on a scheduled basis. IT Department: 4 Servers. The servers contain the most important information in the company. To maintain server usage only one server will be backed-up at a time. On Monday 70 Evening Server One will have a full backup. One Tuesday Server Two, Wednesday Server Three, and Thursday Server Four. Every third backup will be sent offsite. Regarding all backups tapes: Each tape will be labeled with the department and computer that the backup is for. Each backup will be tested immediately to confirm its success and usability. Archived backups will be sent via truck to the offsite location. Onsite backups will be kept within a cabinet located within IT. Since we already possess Traven tape drives all backups will be made on Traven tapes. The Purchasing department is responsible for purchasing as necessary. Our offsite backup location will possess two working Traven drives in the event that a disaster destroys our drives. A member of IT to be chosen, will be responsible for performing the backups as part of his job duties. The above is a summary of our backup plan. Should you have any questions pertaining to our disaster planning please contact the project’s leader, Josh Wisman, Robert Drake (myself), Rick Osgood, the documenter, Matt Smith, Kevin Bunch, Alexander Andrews, or Christopher Saltzman. Thank you, Project Team Disaster Center Memo Sir, I wrote to you several weeks ago to bring to your attention and discuss with you the necessity of an Interim Disaster Recovery Plan. I thank you for your time and consideration of this matter and ask that you devote the same attention to the subject of this letter as well. An important component in the Disaster Recovery Plan of DigiKnight is the establishment of an off-site Emergency Operations Center. In short, a facility located in a different region outfitted with the capabilities of running the business-critical operations of the company should the main facility be disabled or otherwise unusable. The most important function of this emergency facility will be communications. The facility will be a center point for all disaster recovery and management communications. The three most important functions of the EOC will be as follows: 1. 2. 3. Command and Control Operational Control Recovery Planning To this end, it will be necessary to locate the facility somewhere far enough away to be unaffected by any large-scale disaster that strikes Phoenix, but close enough to provide close recovery support for the main facility. Northern Arizona is unacceptable because of heavy snows during the winter. The DRP team recommends a facility in Sierra Vista, a small town in 71 Southern Arizona. Because of the proximity to Fort Huachaca, we may be able to enlist the support of the military. The EOC will require the following six capabilities and types of equipment: 1. 2. 3. 4. 5. 6. Electricity Emergency Lighting Readily Available Sanitary Facilities Medical Kits Office Supplies PC Workstations and Printers with a network To facilitate a steady supply of electricity, the EOC will require a generator or generators of appropriate capacity to ensure an uninterrupted power flow. To support redundancy, the most critical servers and workstations will also be connected to a UPS device. Emergency lighting systems will be tied in to the generator and there will also be flashlights with regularly replaced batteries stationed throughout the facility. Some sort of standing arrangement will be made with a local sanitation company to provide an appropriate number of chemical toilets. Well-stocked medical kits will also be stowed along with flashlights. Thank you Chris Saltzman Raid Memo Carlton Smith, When disaster strikes, the most irreplaceable part of our company lies within the computer systems themselves. Data is the one thing that cannot be replaced if it is lost. Therefore we must be assured that it is safe. All information on a computer gets stored on the hard disk. When the hard disk fails the data is lost. Even if thousands of dollars were to be spent on professional data recovery there is no guarantee that all of the data would be recovered. One thing that can save our data and our time is RAID. RAID stands for Redundant Array of Inexpensive Disks. There are many different implementations of RAID but the method best suited for our company is probably disk mirroring or duplexing, both called RAID 1. Disk mirroring is simple enough to understand. Essentially it uses multiple hard disks to store the same data. Everything that gets written to one hard disk also gets written to the other. That way if one hard disk fails, the other one contains an exact replica of every single file that was on the original. 72 With RAID, all hard disks are connected to at least one RAID controller. The computer sees all of the disks as one device. The beautiful thing about this system is that if one disk fails, the other one can take over immediately. The system does not crash and nothing has to be replaced or repaired before the systems can continue running. It just works. If RAID 1 is used with duplexing, even a RAID controller can fail without bringing down the system. Duplexing is where each hard disk is connected to its own controller. This provides for maximum protection. Consider the fact that any hard drive can fail at any moment. This is especially so if the drive is running a lot. In our case this is very much so. If one of the server’s drives fail all of the data on that disk is gone. Even if we have a hard copy of every digital document money and time will have to be spent re-entering everything back into the computer. It is just not practical. Not to mention that any production involved with that server comes to a complete stop. Anyone that needs access to the resources that server provides now has to wait for it to come back up. With RAID if one of the drives fails or even if one of the drive controllers fails our data is safe. And as an added bonus production doesn't miss a beat. The other drive takes over as if nothing has happened. All that has to be done is to replace the bad drive with a new good one and the system takes care of the rest. As you can plainly see, RAID 1 is a great idea for DigiKnight. With almost all important data being stored digitally, steps must be taken to prevent that data from being lost or damaged. RAID is the answer. While it can't provide protection against other types of disasters such as fire or water, it will efficiently protect our data from a much more likely disaster; drive failure. It is a problem that must be addressed as soon as possible to prevent a crippling blow to DigiKnight. Sincerely, The Disaster Recovery Plan Team 73 Diagram 1: A Common Lan 74 Sabotage Memo Sir, In addition to my previous three memos regarding the progression of the Disaster Recovery Plan, there is another issue that I need to discuss with you. Because of the critical nature of many of the records we keep here at Digiknight, I need to discuss possible vectors and types of sabotage that may occur. Although our records are kept in a relatively secure area, several people do have access to them. Because of the possibility of a disgruntled employee, industrial espionage, or simply random vandalism, it is important to discuss this issue as soon as possible. Before writing this memo, I have attempted to think of any reasonably possible type of sabotage that may occur to our records and how we might go about preventing each one, or at least minimizing the damage, should it occur. Potential Types of Sabotage Fire Water Other physical damage such as shredding or tearing Random Theft Targeted Theft Intentional mixing-up of records Intentional mislabeling of records Intentional replacing of a document or documents with other(s) From looking at this list, I see basically two types of threats: those depending on access and those resulting from random natural or intentionally caused natural vectors. There are several countermeasures common to each of these possible threats. To minimize damage from any sort of loss, the most important thing is to have digital backups of every single important record. If this is accomplished, it doesn’t matter what records are burned or destroyed, the company can always print more. As far as the access-based threats, the solution here is to significantly restrict access. Only those people with a legitimate and continuous need should have access to the records storage area. When another employee has a temporary need for access, it should go through one of the permanent-access employees. When this is not feasible, the temporary-need employee should be accompanied by a permanent-access employee while he or she accesses records. This covers internal threats. As far as external ones (thieves, industrial espionage, vandals) go, there is no such thing as a perfectly secure anything. What we can best hope to do is to 75 secure our records area with card readers, sturdy doors with hinges on the inside of the room, and other such physical security measures. To help minimize fire damage (and subsequent water damage), dry chemical fire suppression systems should be installed. Thank you Chris Saltzman Stress Memo Sir, An important factor to consider in our preparation for a major disaster is the human one. It is extremely important to protect and plan for the security of our physical assets, but what use are they without our human ones. Following a disaster, during the recovery phase, people will be upset, confused, and looking for answers and explanations. They will need a support network. To this end, I recommend that we devise plans for disaster and grief counselors to be on site immediately after the disaster occurs and the area is safe. Employees will be unusually stressed and may need the services of professional counselors to deal with what has happened. If coworkers are injured or killed they may be unwilling to return to work in. They will want to know why the incident happened, what is being done, and could it happen again. Many employees will be unwilling to admit how upset they are to other employees or supervisors for fear of appearing weak or unable to handle the pressure. Therefore it will also be necessary to offer private sessions with the disaster counselors with the assurance of confidentiality. Employees who were absent during the disaster will be confused and want to know exactly what happened, why, to whom, and they may feel left out for having not been around during the event. Employees will want to feel as if their role in recovering from the disaster is important, that they have a place, and that they matter and contribute in a significant way. It would probably be prudent to plan on one counselor for every 20 employees. Of course not all employees will wish to partake of their services, either because they genuinely do not need to, or because they would be embarrassed to do so. However, it is critical to have support for everybody who needs it, assuming everybody will need it. After the first couple of days when the need is more accurately assessed, the number of counselors on scene can be adjusted appropriately. It is my hope that you will carefully consider the points made in this memo and authorize the addition of disaster and grief counselors to the preparations included in the disaster recovery plan and budget. 76 Sincerely, Chris Saltzman Test Memo Test Team Members, In light of the recent completion of the test phase of your nature-based test scenario, management has concluded that further evaluation should be preformed. This task should be relatively quick given the amount of data collected during the actual test. The evaluation should include post-testing thoughts and ideas from all participants. Also, there should be an employee who was not part of the testing brought in to review the information to make sure it is: 1) Understandable to those who have no part in the testing. 2) Is purely based on factual information with no influence from team members who have a vested interest in the projects success. The team is advised to finish the evaluation as soon as possible so that conclusive facts can be recorded and saved. Management has given an estimated completion time of two weeks. Should the need to extend that time frame occur please call any of the management staff so a new time frame can be decided upon. Sincerely, DigiKnight Management Staff Maintenance Memo Even though the disaster recovery and backup plan is complete, the need to keep the plan up to date is also of great importance. Changes in all aspects of the company and the rest of the world will have adverse effects on how our plan will need to function in the future. Changes within the company itself could make the plan we have in place now ineffective. If the company changes its business outlook or company goals, the plan will have to change accordingly to fit the needs of the company once more. World events can also have an impact on how effective our recovery plan is. Weather changes, government changes, and things of that nature can have effects on how our company conducts business. Thus, the disaster and recovery plan must be able to adapt to supplement the changes that will eventually take place. Some things that can be done to help with the plans adaptive-ness should be to leave space for any kind of changes. Do not keep the plan under lock and key. By letting new information into the plan it can be kept up to date with whatever changes take place in the company. Also, by having a history of the different changes made to the plan it can be easier to keep track of old information. 77 Keeping the disaster recovery plan up to date will help the company be ready for any new types of events we did not think of in the beginning. Having a plan that can adapt to different times will keep our company safe no matter what course it takes in the future. Recovery Team Memo Dear Sir: Right now we have a core disaster planning team of six people. Over the last three months we have researched every aspect of disaster planning and recovery. We have made contacts within the company, gained an understanding of every relevant procedure, and formulated a large document with the purpose of preparing this company for a disaster. This document is nearing completion. As we have mentioned previously it will require constant updating and testing to remain useful. While you may be tempted to break our team up and return us to our home departments I believe that you should not. In creating this document we have not only gained incredible experience that will be invaluable in keeping this document viable, but we have also gained a report among each other. We have an impeccable working environment that is professional, efficiency, and effective. You may want to replace our positions with newer, less experienced, and ultimately cheaper employees. These individuals may be able to maintain the document, but not with the same skill and dedicated that I believe we have shown. In allowing us to create this document you have shown an intense desire to see our company protected from unavoidable disasters. This was an incredible first step, but our knowledge will be required to maintain your goal. Newer members will lack the experience to make appropriate additions. It will take them months to determine the layout of the document. They will be forced to ask veteran members for names, phone numbers, and information. Associates we have worked with will lack the same relationship that we have built. Replacing us may seem cheaper and easier, but will ultimately prove less effective than if you were to keep us. Since this project began our original positions in various departments have been filled by others. These individuals have gained familiarity and talent our former positions. To return us now is liable to throw cogs into already effective departments. Since our original task is completed and all we need to do now is update we will have more time. We can use this to assist underhanded departments as needed, but it would be unwise to remove us from the disaster recovery team. Ultimately the decision rests entirely with you. It has been a pleasure creating this disaster recovery document regardless of your choice, but I humbly recommend that you consider my proposal and keep this team together. As a group we will maintain the disaster recovery document and bring our company forward into the future. 78 Thank you, Josh Wisman & the Disaster Recovery Team Glossary Emergency Operations Center – An emergency operations center is a physical location in which important decision makers can meet to discuss disaster recovery. This physical location can be a place that is set aside solely for the use as an emergency operations center or it can be an office that is currently in use for something else. The emergency operations center does not have to be in the company’s actual facility either. A restaurant or someone’s house can also be the emergency operations center. A place that is open all day long would fit best. It is important that all people needed to be at the emergency operations center know where it is. Command and Control – The decision makers need to be leaders during a disaster because if they aren’t some other random people will try to be. Command and control is simply the people in charge actually controlling the situation during a disaster. They have to make quick decisions in order to tell everyone what they need to do. Operational Control – Operation control is making decisions for things such as ordering food or water for people that need it. The main difference between “command and control” and “operational control” is controlling people versus doing certain duties. Operational control also involves gathering information for managers and other decision makers. Operational Control is usually what someone is told to do from the emergency operation center. Recovery Planning – Recovery planning is planning what to do in the event of a disaster. You must plan ahead of time because you actually have the TIME to make many decisions. When a disaster occurs there needs to be a recovery plan so the right decision is made instantly and the people in the emergency operations center can discuss anything that isn’t in the recovery plan. Containment Team – The containment team is a team of people that is formed as soon as there is a disaster. They containment team’s job is to minimize the damage the disaster is causing. If there is a fire, this team will try to save as much equipment as they can. They definitely cannot save everything and they are much different from the recovery team which I’ll talk about next. Recovery Team 79 – The recovery team will try to restore the facility to working ability as fast as possible. There needs to be a recovery team leader to inform the rest of the team of what to do. This is much more important for the recovery team than it is for the containment team because the containment team doesn’t have time for planning. The recovery team can start restoring the facility when the disaster is still happening. As long as no more damage will be done to that specific part of the facility recovery can begin. The recovery team shouldn’t have to recover something twice over. Application Software – Program written for a specific application to perform functions specified by users. Business Critical Data – Data that a business can not operate without. Client/Server Network – Network in which the server directs communication traffic to all users that are connected to it. Cold Site – Location in which to store data. However the location has no equipment or communication ability prior to need of data, and requires substantial time in which to setup. Differential Backup – Method of backing up files by performing a full system backup and then performing an incremental backup. Full System Backup – Method of backing up files by backing up every file and folder on the server being backed up. Hot Site – Location in which data is stored. The location has complete equipment and communication ability, and requires little time to be up and running. Incremental Backup – Method of backing up files by only backing up files and folders that have changed since the previous full system backup. 80 Load Balancing – Used to evenly separate network traffic among a number of servers to prevent one server from becoming overloaded. Mirrored Site – An exact replica of the IT and communications center of an organization. In the event of a disaster to the main IT facility the mirrored site will immediately take over to minimize down time. Mirroring – The process of writing the same data to more than one disk, creating an exact replica of data, as a fail safe should one disk fail. Mobile Site – Mobile location with IT and communication abilities. Used as a backup in the event of a disaster to the main communication center. Amount of time required to become operational varies with each mobile site. Noncritical Data – Data that a business could due without and not cause harm to its bottom line. Parity – A form of striping with a minimum of three disk, to achieve data redundancy without the waste of space that is caused by mirroring. Peer to Peer Network – Network that treats all processors equally and is used primarily in small networks. RAID – (Redundant Array of Inexpensive Disks) used to provide fault tolerance to disk storage systems. Sensitive Data – Data that a business wishes to be kept secret, and would be deferential to a business if it were to fall into the hands of competitors. 81 Striping – The process of taking a single piece of information and writing a portion of it on one disk and the next portion on a separate disk and so on until the piece of information is complete. System Software – Program that manage the computer’s resources, communications and peripheral devices. Warm Site – Location in which to store data. The location has partial equipment and communication ability prior to need of data, and requires a medium amount of time in which to setup. Tabletop Test–A tabletop test is the first step is testing a disaster recovery document. Since other testing types can be highly intrusive and almost always effect productivity it is vital to begin the testing phase by planning everything out. That is what the tabletop test is for. Absolutely everything related to the other tests should be gone over and analyzed within this phase. It is likely that continuity errors and contradictions within the document will be noticed and can be changed. Small typos are likely to be noticed along with similar documentation changes. As the group looks over each document the order they should be presented will quickly become obvious. This sort of meeting also allows department managers and other individuals outside the project to be brought in. These individuals can be prepped for the larger types of testing so that it goes soother and less productivity is lost. Small Problem Testing–Small Problem testing involves testing each department or only an individual problem. This form of testing does not test entire business and does not give an overview of how the entire business body will perform, but it does fine-tune the procedures for a group of individuals or for a single process. Since small problem testing is larger it will be required that high level approval is acquired. Before testing even begins everything needs to be planned in advance (usually through tabletop testing.) All relevant individuals need to be notified and plans need to be place in case the testing does not go as planned. Time also needs to be set aside to evaluate the testing. This evaluation, which will include meetings with participating staff members, will help make changes to the disaster recovery document. Furthermore the participating individuals will now have some training should a disaster happen. It is important that small problem testing be performed regularly. Full-Scale Testing–Full-Scale Testing is when everything is completely tested. This is a massive undertaking and only the highest authorization will allow this sort of event to proceed. Everyone needs to be 82 onboard and ready. Even more so than with small problem testing all aspects of the operating need to be planned in minute detail. This sort of testing demonstrates how unified and cohesive the company is in total. Every department and every process will undergo an evaluation. This is the ultimate trail for the disaster recovery document over an actual disaster. Experienced project managers should be brought it prior to the test to make sure every contingency from success to every type of failure is addressed adequately. Due to the size of this sort of testing the damage caused by inappropriate procedures could be financially catastrophic. This testing is intensive training for the entire company. Other than an actual disaster, this is the only testing procedure that fully challenges every department and individual.