Page 560 - ITGC_Audit Guides
P. 560

GTAG — BCM Requirements





               •   The recovery capabilities of critical IT and informa-  •   Information security and compliance standards need
                  tion service providers must be assessed to ensure they   to be considered when designing recovery solutions.
                  meet the requirements of the business.              Recovery solutions should not introduce unreason-
               •   The recovery of IT and information components often   able  levels  of  security  or  compliance  risks.  Some
                  must be combined to create a complete system needed   security and compliance controls will be relaxed if a
                  to  support  critical  business  processes.  For  example,   real disaster occurs, but a conscious decision is needed
                  recovery of an application may require recovery of the   to  understand  the  risks  that  exist  in  the  recovery
                  desktop application, server application, server hard-  environment.  Recovery  solutions  are  intended  to
                  ware, server operating system, infrastructure servers,   reduce the risk associated with the loss of availability,
                  data center, third party network connections, etc.   but must be balanced with the need for integrity and
               •   Internal and external service providers of IT and infor-  confidentiality.
                  mation services should describe the recovery services
                  they provide, including information regarding:  B.  Recovery Solutions and Recovery Sites
                     o  The  recovery  activities  the  service  provider  is   The following is a list of recovery solutions and recovery sites
                     responsible for and any recovery limitations there   commonly used.
                     may be.                                       •   Hot recovery plan/capabilities.
                     o  The recovery activities (e.g., reconstructing lost     o  A recovery plan exists.
                     data) the organization is responsible for.          o  Recovery  resources  are  available  at  recovery
                     o  The manner in which the organization and service   site(s)  and  data  is  synchronized  in  real-time  to
                     provider will communicate during a disaster.        enable the system to be recovered immediately or
                     o  Contracts  for  third  parties  (e.g.,  application   within hours.
                     service providers) or service level agreements for     o  Typical recovery time is minutes to one day.
                     the internal provider.                        •   Warm recovery plan/capabilities.
                     o  The scope of their recovery efforts (e.g., systems,     o  A recovery plan exists.
                     data, network, etc.).                               o  Recovery resources (e.g., nonproduction systems,
                     o  Their recovery strategy.                         spare  hardware,  etc.)  are  available  at  recovery
                     o  Their RTOs and RPOs.                             site(s) but may need to be configured to support
                     o  The  cost  of  their  recovery  solutions,  services,   the production system when the disaster occurs.
                     testing, and declaration of disaster.               o  Some  data  may  need  to  be  restored  (probably
                     o  The frequency of their recovery testing.         from tape or other backups).
               •   Components of the environment may be recovered        o  Typical recovery time is two to 13 days.
                  using solutions that would not normally be used in a   •   Cold recovery plan/capabilities.
                  production data center. For example, some data may     o  A recovery plan exists.
                  not be recovered initially (e.g., large image libraries)     o  Recovery site(s) have been identified with space
                  which means they would not be available (e.g., may     and  base  infrastructure  needed  to  perform  the
                  generate error messages).                              recovery.
               •   Recovery strategies for each IT system or component     o  Recovery resources (e.g., servers) are not avail-
                  should be developed independently without a need       able  at  recovery  site(s)  and  likely  need  to  be
                  for consistency with other IT systems. However, it’s   procured.
                  important  that  components  that  work  together  to     o  Data likely needs to be restored (probably from
                  form a system be hosted in the same location or in     tape backups).
                  multiple locations that have sufficient network band-    o  Typical recovery time is 14 to 30 days.
                  width. For example, e-mail might be recovered at one   •   No recovery plan/capabilities.
                  large central data center, file replication may occur at     o  No recovery plan exists.
                  another site on a server within the local region, some     o  Recovery  resources  and  data  restore  processes
                  applications and services (e.g., engineering) may be   have not been defined.
                  outsourced temporarily during a disaster, local appli-    o  Data  backup  plans  exist  to  ensure  that  critical
                  cations recovery may occur using a PC instead of a     data can be restored at some time in the future.
                  server, etc. The objective is to find the best and most     o  A  risk  exists  that  the  systems  and  business
                  cost-effective recovery solution for each system, even   processes they support may never be recovered or
                  if  solutions  are  spread  around  the  world.  The  only   may result in an extended delayed recovery.
                  requirement is that the systems be accessible by the
                  users, regardless of where they are recovered, and all   The BCM sponsor and an appropriate team of managers
                  components of a system work together.         must  approve  the  IT  recovery  solutions  for  their  scope  of


                                                             13
   555   556   557   558   559   560   561   562   563   564   565