Disaster recovery plan examples for real-world scenarios
We ’ ll focus specially on situations involving the restoration of data handiness, but the lessons below use by and large to any type of disaster recovery scenario.
Example 1: A DDoS attack
In this disaster recovery scenario, imagine that a group of malicious hackers executes a Distributed-Denial-of-Service ( DDoS ) attack against your company. The DDoS attack focuses on overwhelming your network with bastard requests so that lawful data can not get through. As a solution, your business can nobelium long connect to databases that it accesses via the network – which, in nowadays ’ s long time of cloud-native everything, means most databases. It ’ s rare nowadays to have a database that does not require a running network joining to do its job. In this scenario, calamity recovery means being able to restore data handiness even as the DDoS attack is afoot. ( Ending the DDoS attack would be helpful, excessively, but anti-DDoS strategies are beyond the setting of this article ; moreover, the reality is that your ability to stop DDoS attacks once they are in progress is often circumscribed. ) Having accompaniment copies of your data would be critical in this situation. That ’ south obvious. What may be less obvious, however, is the importance of having a plan in place for making the accompaniment data available by bringing new servers online to host it. You could do this by merely keeping backing data servers running all the prison term, fix to switch into product mode at a consequence ’ second notice. But that would be costly, because it would mean keeping accompaniment servers running at full capacity all the meter. A more efficient approach would be to keep accompaniment data waiter images on hand, then spin up newly virtual servers in the cloud based on those images when you need them. This summons would not be instantaneous, but it should not take more than a few minutes, provided that you have the images and data already in stead and ready to spin up. Read our White wallpaper
The One Essential Guide to Disaster Recovery: How to Ensure IT and Business Continuity
This white newspaper will help you ensure clientele continuity and survival by leading you through three all-important steps—from understanding the concepts of calamity recovery and high gear handiness to calculating the occupation impact of downtime .Read
Example 2: Data center destruction
One of the worst-case scenarios that a mod commercial enterprise can face is a calamity that destroys part or all of its data center – and all of the servers and disks inside it.
While such a situation is rare, it can happen, and not alone as a result of a major natural disaster like an earthquake or hurricane. Issues such as electric surges and tied doomed squirrels can cause permanent data center damage. The best means to prepare your business for convalescence from this type of catastrophe is to ensure that you have offsite copies of your data. If your production data lives on-premise in one of your datum centers, this would mean keeping backups of the data at another datum center site or in the cloud. If your data is hosted in the defile, you could back it up to local storehouse, to another mottle or a different region of the like cloud. You will besides want to make certain that you have a way of restoring the accompaniment data to new infrastructure quickly. Moving large amounts of data from one site to another over the Internet can take a hanker time, so it ’ s not always a wise strategy within the context of calamity convalescence. In some cases, it might be faster to move physical copies of disks from one web site to another. alternatively, it might prove quick and easier to stand up new servers in the data center where your backup data lives, then connect them to the backup data and turn them into your production servers. The bottom line : Restoring data after data concentrate destruction requires having offsite copies of the data available, ampere well as a plan for moving that data quickly to wherever it needs to go following the catastrophe in order to keep your business running .
Example 3: Data sabotage
A third gear character of data disaster that might befall your occupation is one in which person – such as a disgruntled employee – intentionally sabotages data. The employee might insert inaccurate or bogus data into your databases, for exemplar, in order to lower data quality and make the data unserviceable for your clientele. He or she might even insert malicious code into your data in an attempt to spread malware to your systems. The critical step in preparing for this type of disaster is to ensure that you have backup copies of your data that go back army for the liberation of rwanda adequate in time to allow you to recover using a version of the data that you know to be safe. If the lone copy of your data that you have available was taken a day ago, but the damage occurred three days ago, the stand-in won ’ triiodothyronine aid in this situation. This is why it ’ s a good idea, when possible, to have multiple backups of your data on-hand, each taken at a unlike time increase. alternatively of deleting the final data accompaniment when you make a new one, keep older backup on hand so that you can use them for calamity recovery if you need. If you make a backup day by day, and keep seven backups on hand, then you know that you can restore data from angstrom long as a week ago if newer accompaniment contain damaged information.
Read more: Top 5 Benefits of Collaboration in Business
The tradeoff for using an older backup for catastrophe convalescence, of class, is that any data that was added or modified since the stand-in was taken will be lost. In certain disaster convalescence situations, however, this is the price you have to pay. Keep in mind, besides, that if you can identify which parts of your data was sabotaged, you can leave that data entire, and recover only the damaged data, in order to minimize data loss. Read our white paper The One Essential Guide to Disaster Recovery to learn how you can ensure business continuity and survival through three all-important steps .