Professional Documents
Culture Documents
Disaster Recovery Plan: Olicies Rocedures
Disaster Recovery Plan: Olicies Rocedures
VS-ISMS-T-DR
Version 1.0
Revision History
Ver # Rev Date Author Distr Date Brief Description
Distribution List
Approved By
TABLE OF CONTENTS
1. Introduction............................................................................................................................................ 3
1.1 Objectives................................................................................................................................... 3
1.2 Scope......................................................................................................................................... 3
1.3 Site Name................................................................................................................................... 3
1.4 Incident Management Team....................................................................................................... 3
1.5 Physical Security Perimeter........................................................................................................ 3
2. Resource Identification......................................................................................................................... 3
2.1 Infrastructure Setup Preview...................................................................................................... 3
2.2 Software Applications................................................................................................................. 3
2.3 Hardware Equipment.................................................................................................................. 3
2.3.1 <Department Name>.................................................................................................................. 3
2.4 Documents/ Information............................................................................................................. 3
1. INTRODUCTION
1.1 OBJECTIVES
The objectives of Disaster Recovery plan is to:
1.2 SCOPE
Scope of this document is to identify critical:
Software/Applications
Hardware equipment
Documents
Critical Machines
Data/information
And to minimize the risk of any damage or disaster that may occur by taking necessary steps
and assign responsibilities to the individuals for carrying out these steps.
<Company Name> System’s facilities are prone to natural hazards causing the disaster, this
include Fire, Flood and Earthquake. As per the location of processing facilities, Earthquake and
Flood can not be avoided and also has less probability of occurrence but fire has the most
probability of occurrence among these hazards so special measures are taken to avoid this risk
or to minimize its damage to the least scale in case if it happens. Physical security measures
are taken to avoid the risk of terrorist attack; following are some of the important measures
taken for physical security:
Above mentioned measures are monitored on quarterly basis and updated as needed.
Look for, and eliminate overloaded electrical circuits to avoid the possible threats of fire.
Above all, the users are properly educated and trained on <Company Name> Systems
information security policies and procedures, the relevant problems and threats, the impact of
these threats and weaknesses.
2. RESOURCE IDENTIFICATION
2.1 SOFTWARE APPLICATIONS
Following is a list of software applications necessary for business operations.
Customised Slips
Antivirus
3.2.1 BACKUPS:
Data is the most critical component of IT Operations and it should be protected from any site
loss. Our current practice is to take back up in both tape cartridges and removable hard drives.
In consultation with all departments, the infrastructure department has developed a backup
plan; this plan is updated time to time as on need basis.
3.2.2 RESTORE:
Backup is restored on need basis or once in a month to check the data integrity and efficiency
of restoration procedure and it should be logged properly. For details refer to the Procedure
Definition Backup and Recovery.
The backup media and one original copy of all software used for business operations should be
kept at offsite location.
Time Estimate: <Give time required and the details of tasks if the time
span is more than 8 working hours for example time for cabling,
networking, server installation, workstation preparations, etc.>
Server related
(A) Failure of the Primary Domain Controller
problems
There are two parts of disaster recovery for the <Write the primary
domain controller server name > First part describes the hardware
specifications required to perform installations and second part
describes the software installations itself.
Software Requirements:
1. <Give the Software list to be installed on server here>
Existing Configuration:
1. Host name: <>
2. IP Addresses: <>
3. Operating System: <>
4. Windows service pack: <>
Software Requirements:
1. <Give the Software list to be installed on server here>
Backup/Restore Method:
Software Requirements:
1) <Give the Software list to be installed on server>
Existing Configuration:
1) Host name: <>
2) IP Addresses: <>
3) Operating System: <>
4) Windows service pack: <>
Following are the details on how to avoid disaster from such incidents.
Disk crash:
Tasks:
1) Inform IMT
2) Restore entire System on backup server Or
3) Prepare a machine for the same and recover all data from
backup server on this machine.
4) Instantly place order for the faulty part.
Motherboard failure
Tasks:
1) Inform IMT
2) Arrange a motherboard of the same brand and model from the
office.
3) If motherboard is not available in office, shift the hard disk to a
new machine of the same capacity
4) Instantly place order for the faulty part.
Tasks:
1) Inform IMT
2) In case of the communication link is damaged and it is not
possible to recover it within <give number of hours after which to
execute this activity>, purchase the wireless communication link
of <give the bandwidth requirement of link> from <write the name
of service provider> and make services available within
maximum of <provide number of maximum hours within which
the service can be made available>
Following People are responsible for keeping the important documents safe during the disaster.
Name Responsibility
<Name 1> <Network Development>