First, and foremost,
- Communications: Email and instant messaging must be available, and working more or less as normal. Many organizations arrange for outsourced access to email services during the recovery period, and rely on a combination of consumer-grade IM software with commercial-grade security and protection software to limit the security and disclosure risks that such software can pose.
- Applications: Key databases and related front ends and tools must be restored as soon as recovery time objectives (RTOs) dictate, particularly for contact and client information, parts and inventory, order processing, and so forth, along with line-of-business apps such as HR, ERP, and so forth. Mirrored hot backup sites can deliver the quickest uptimes, but many elect to restore backups at warm or cold sites to save money. This can keep employees in touch with key Software-as-a-Service (SaaS) applications, multi-tiered apps and services, custom applications and so on.
- Remote access: If employees can work from home while disaster recovery is underway, organizations suffer much less from lost revenues and opportunity costs during a disaster recovery period. This observation grants special urgency to funding for hot backup sites and remote access technology, even during tough economic times like those we're experiencing right now.
Remember, when disaster strikes or recovery becomes necessary for whatever reason, all basic needs for access and functionality remain unaltered. In fact, during a recovery effort, additional needs for access often become necessary to help facilitate and speed the recovery process to completion. This helps to explain why it's such a fantastic idea to arrange for rapid deployment of high-speed wireless networks, and such high-speed wired infrastructure as may be necessary to support transplanted disaster recovery teams and the data centers they invariably bring into operational status.
When it comes to implementing a backup scheme like the remote access approach just outlined, it's also important to address these technology requirements:
- The chosen solution must be easy and quick to deploy so as to ensure minimal or no disruption of service and access
- It must be sufficiently scalable and available to handle even peak loads during the recovery process (and very likely beyond normal peaks, owing to the background activities so often involved during restoration)
- The chosen solution must provide access to all key applications, services and data so as to impose minimal or no disruption on normal work activities
- The chosen solution must maintain compliance with mandated regulations and best practices, and must also be sufficiently secure to maintain proper security coverage throughout the recovery period
When planning for backup or recovery sites (particularly for failover or hot backup situations), it's essential to think about the geographic scope of potential disasters. A building next door or down the street won't be much good as a workable alternative if a hurricane, forest fire or earthquake occurs. That's because a nearby site is just as likely to be rendered inoperable as a primary site if the two are too close together. Most experienced DR/BC professionals look for sites that are at least 100 miles away, if not several states distant, so as to keep local or regional disasters from knocking out a backup site as well as the primary site.
SSL-based VPNs for remote access and recovery
To those ends, SSL-based VPNs are particularly well-suited to deliver remote access during recovery operations. Furthermore, SSL VPNs are clientless, and work through any Internet browser, so virtually any Internet-connected PC (netbook, notebook, or desktop) may be used for remote access. SSL VPNs operate at the application layer, to maximize security protection and application of appropriate compliance and security policy requirements. They also support fine-grained access controls, so organizations can count on the same rights and privileges taking effect both locally and remotely.
Finally, support for strong encryption and strong end-point security also protects remote communications from unauthorized snooping or sniffing. In fact, these same technologies can be used at all times to facilitate teleworking, and to help reduce commute times, and boost worker productivity. That's why many organizations are taking this approach to boost connectivity during normal operations as well as during disaster recovery. This helps speed the payoff on the investments involved, and ensures a better ROI overall.
About this author: Ed Tittel is a long-time freelance writer and trainer who specializes in topics related to networking, information security, and markup languages. He writes for numerous TechTarget.com Web sites, and recently finished the 4th edition of The CISSP Study Guide for Sybex/Wiley (ISBN-13: 978-0470276886).
This was first published in August 2009