Docstoc

Disaster_recovery

Document Sample
Disaster_recovery Powered By Docstoc
					Disaster Recovery and Contingency Plan




                           Author: Denis Hands
               Date: Tuesday, 18 September 2012
Contents
Introduction ......................................................................................................................... 3
Physical Security................................................................................................................. 4
Passwords ........................................................................................................................... 5
Connections To and From the Internet .............................................................................. 6
Summary of Significant Risk Factors ................................................................................ 7
Contingency Plan ...............................................................................................................14
Firewall and virus protection strategy. .............................................................................15
Appendices .........................................................................................................................16




                                                                                                                                      2
Introduction
In every business data recovery and contingency is a big thing. Data recovery and
contingency can mean the difference between a staying open or closing! Data recovery can
be in the form of such things as backups or cloud computing where contingency could take
the form of security, password protection and internet connection control.




                                                                                           3
Physical Security
Physical Security is normal thought of as the first line of defence and can be implanted in so
many different ways depending on the workplace layout. At Minimuse security will be
implemented by having multiple entrances to the building, CCTV, the use of already on
ground security staff, dual smartcard key code systems, low access isolated areas within
them the core distribution network and sticky MAC security.
The easiest way to maintain a level of security from external vistors is at the entrance to the
building. In this case Minimuse requires two entrances so Customers and Visitors can be
distinguished from staff members that have access to the backend of the business. In any
dual entrance situation it is recommended that the entrance for the employees be one that in
fact is isolated or one that know that they can only enter with some form of security check
there. In this case we have chosen to make the employees entrance a dull door with a high
CCTV presence requiring a fingerprint and key code both to be used to access the building
any further.
CCTV is becoming a big part of identification for unknown users within a building with so
many applications available it is getting easier to trace someone who is not meant to be
there! CCTV will mainly be used in high risk areas such as the showroom where there are
more unknown people than known protecting the systems from external vistiors. As well as
the CCTV deployed in the showroom, CCTV will be deployed where access to core systems
are kept, for example access to Networking and Server rooms. It is assumed that all
employees will have their photographic identity stored somewhere in company data folders
so using this CCTV vision with photo recognition software built in to the CCTV system this
will make it harder not to be noticed before and after a crime is committed.
As well as CCTV in the Networking and Server rooms they will be also secured by dual
swipe card, fingerprint, keypad systems requiring an access certificate and a special
authorisation certificate on the swipe card and a keycode only known to the user of that key
card. Certificates that are embedded on the card will be updated at a regular interval as well
as the keycode. All access attempts will be traced and kept in records for at least 90 days to
alleviate the chance of someone gaining access with someone else’s card or access when
not authorised to do so.
Each time someone is required to access the Networking and Server rooms as noted above
they will require a special authorisation certificate. Only two people will be able to issue these
certificates, these will be the IT manager and his second in charge (should he be
unavailable). But however to get a certificate from one of these two the staff member must
write down the reason why they must access the room, the amount of time expected in the
room, and the change to be made. They will then seek the signature of both the requester
and the Manager to agree that the job must be done and the liability of not doing it, after this
is done the certificate made to allow access to the room needed for the amount of time that is
requested and is loaded on the user’s swipe card. All requests will be audited from time to
time and should a problem occur on the Network.
As well as these physical security measures a password will be required for all computer
user accounts. Password policy is explained in further depth in the next section




                                                                                                 4
Passwords
Passwords are an easy way to make sure that someone that is trying to login to a network is
someone authorised to do so. A good password can deter people from trying to crack against
a weak password that is as simple as your birth date, pets name or some random letters all
in a row like qwerty.


A password policy should be enforced to make sure that the system is as secure as we can
make it. At minimuse it is suggested that the following password policy be taken


Passwords will be changed by an employee every 30-90 days to a new password
Passwords must be of 8 characters or longer including at least 1 uppercase character,
1 digit or symbol, to be checked by Windows Server based on Group Policy
Passwords must not resemble any password used in the last 6 months
3 attempts will be given for account access authentication, after this the account will
be locked out and the employee require to call the IT department for a security check
and password change
The administrator account will be only be useable by the IT Manager for post OS
install tasks and otherwise disabled with all Server tasks to be delegated via Group
Policy
Temporary accounts will only be issued for guests who are joining the company for 7
days or more. They will not have access to any shares except the public share which
contains information that has already been released to the public




                                                                                           5
Connections To and From the Internet
The internet is a big part of business today; it is a point of interconnection between them and
their customers growing to be an essential marketplace compared to traditional face to face
dealing. Internetworking policy is needed due to this fact and needs to be implemented for
the safety of business and customer details.


Internetworking Policy
All computers will be connected to the network which then will have internet access
Staff must be told that documents that are not in the public share are not to be
distributed out of the LAN and they will face action should they distribute confidential
information
Data sent between Minimuse offices will be encrypted and sent over a VPN unless it is
of a small size eg a small document that can be attached to an email
Encrypted mail should be used for all confidential information transfers or should be
transmitted face to face
Remote users will have access to limited network resources via a secured VPN, each
connection will be setup on an approved device for the user by minimuse IT staff
Remote users will only have access to resources from 8am to 7pm weekdays with no
weekend access unless a prior agreement has been put into practise
All remote devices will be checked for antivirus, firewall and other security software
upon connection, all software must be up to date and be recognised by NAP Server,
uncompliant computers will only be able to access details and recommended software
to become compliant
Should the NAP Server be unavailable interconnection for remote users will be also
unavailable, remote users are not to receive information by any other medium than
that available from the VPN




                                                                                              6
Summary of Significant Risk Factors
There are a number of different risk factors that must be taken into account when project
planning all of these are different for each project meaning that they must be specially
defined for the project.


In the minimuse project the main risk factors pertain to the network hardware. Some risk
factors that need to be taken into account are listed below and further summarised.


Risk Factors
   Physical security
   System failure, accident, sabotage (hackers)
   Denial of service
   Virus attack
   Telecommunications failure
   Total loss of building.




                                                                                            7
Factor
Physical security


Probability
It is very unlikely for physical security to be breached however at one stage or another it may
be


Relative Impact
People accessing equipment and data that they are not meant to


Mitigation/Contingency Measures
Lock the door
Monitor CCTV
Give the key card to those who are allowed to access (and change certificates regulary)
Fingerprint
Lock down equipment (tie it down to the ground, or lock it in a cabinet)
Prey, used to track computer like devices after stolen using GPS, Camera and Internet
connection etc.
Use multiple authentication methods, use both fingerprint and keycode


Cost of Mitigation Strategy
50 (1 per door) x 50+ Employees CapeSoft Networked Time Clock -
Fingerprint/Proximity/Keycode @ $2,190.00 = $109500 (bioshop.com.au)
1 x Magicard Enduro Single Side Business Starter Pack ID Card Print $1,915.89
(bioshop.com.au)
17 x Mobotix DualNight M12 (demo: http://bit.ly/rZwTCq choose front camera) @ $1489.83 =
$25327.11
8 x DualDome D14 @ $1354.14 = $10833.12
MxControlCenter Free (included with camera registration)

Monitoring Methods
Report open doors to the relevant department
Trace who goes in the room and for how long and whether it is really takes that long to do
the task
Trace denied access with keycards
Check equipment caging, locking etc for wear or signs of physical damange




                                                                                              8
Factor
System failure, accident, sabotage (hackers)


Probability
Unlikely


Relative Impact
Depending on the actually equipment it could be a simple swap out or a wait for importation
of the goods


Mitigation/Contingency Measures
Use software monitoring tools (including what is already built in to the equipment)
    Spiceworks
    S.M.A.R.T (HDD)
    Nagios
    Zabbix
Logging of failed access attempts on firewall


Cost of Mitigation Strategy
$0 they have already been factored into the project


Monitoring Methods
Use a network software monitoring tool to find out unhealthy devices, eg HDD problems,
printer usage, bandwidth usage
Have ACLs in place on the firewall and log failed attempts to gain access




                                                                                              9
Factor
Denial of service


Probability
Very Unlikely


Relative Impact
Leave minimuse with no way of contacting the outside world using their internetwork


Mitigation/Contingency Measures
Block Ping
Log high Level of downloads or web requests
Log unusual processing power levels
Send blacklisted traffic to a nonexistent place


Cost of Mitigation Strategy
$0, all of this can be done on the Servers and Network Hardware


Monitoring Methods
Log high Level of downloads or web requests
Log unusual processing power levels
Use software monitoring tools like ngaios for windows or spiceworks




                                                                                      10
Factor
Virus attack


Probability
Likely


Relative Impact
Sending spam to contacts
Modified program access
MBR rewrite (causing non boot)


Mitigation/Contingency Measures
Install SPAM filters/block lists
Install proxy to block websites (squid and squidguard for windows)


Cost of Mitigation Strategy
Antivirus and Firewall is suggested further in the document with pricing
SPAM blacklists will be made for exchange server


Monitoring Methods
Log suspicious emails with attachments
Defuse the emails on a test bed to see if in fact they are viruses




                                                                           11
Factor
Telecommunications failure


Probability
Unlikely


Relative Impact
No EoF services
Slower WAN connection (Public contended internet service)


Mitigation/Contingency Measures
SLAs
ISP having multiple IP routes
Backup DNS
Automatic switch over to ADSL2+ connection


Cost of Mitigation Strategy
SLAs will cost more depending on what you want from the provider should the service not
work eg call out times, backup service, level of support
TPG ADSL2+ Business Grade 1 Unlimited 20mbps peak and 512k offpeak plan $59.99
DynDNS Secondary 75 DNS and 600,000 query/month $39.95/year, run using dyndns host
update software (updates public addresses on EoF and ADSL Link)


Monitoring Methods
Flaky or flapping network or telephony services, report audible problems to telephony
provider
Have a benchmark, test access to certain websites eg speed, time to load, hop and route




                                                                                          12
Factor
Total loss of building


Probability
Very Unlikely


Relative Impact
Nowhere to work


Mitigation/Contingency Measures
Be natural disaster ready
Have fire fighting equipment onsite
Backup data offsite
Virtual Database


Cost of Mitigation Strategy
The cost of installing and maintenance of emergency systems
The amount of data packets it takes to transfer minimuse data to a backup facility
VmGuest VDS Slice $600 month (400GB primary/ 1TB secondary, 16Ghz, 16GB unlimited
100Mb/s link, collocated unlimited number of virtual nodes with unlimited turnkey)


Monitoring Methods
Check CCTV for suspicious persons
Monitor alarms and find causes for any alarm triggers




                                                                                     13
Contingency Plan
The Australian Database should be backed up to the Virtual Host
CCTV and Biometrics system is to be routed to the Security Room, no one is allowed to gain
information other than weekly/monthly timesheets to be used for calculating onsite pay
Suspicious documents etc are to be reported to the relevant department
All systems implemented in this document are to be tested twice per year
Possible security problems are to be reported to security and it is their responsibility to
contact other relevant departments to mitigate a problem
Backup systems should be used and reviewed on a regular basis for useability purposes eg
EoF connection disconnected and ADSL2 connection used and Virtual Server used
temporarily to host web services




                                                                                              14
Firewall and virus protection strategy.
Firewall and virus protection helps a business to avoid unauthorised network access which
could lead to data being received where is not meant to.
A firewall is an integral part of any business network, if it fails your network is open for all. I
believe that the best way to firewall the network is to require all inbound is to go through
firewalls and NAT. There will only be one item on the NAT tree on the edge router will be the
firewall/IDS address. To access anything other than this people will have to use a VPN,
receive an IPSEC certificate and authenticate through the Web Server.
The type of firewall that will be used is a software firewall Cisco ASA 5580-20 Firewall. This
firewall will be attached under the main router and will process all incoming traffic from the
NAT connection while outgoing traffic will be passed from the Web Server and automatically
be sent to the web. This firewall will be brought from infinity-micro.com at a price of
$33942.55 AUD.
Along with a firewall, virus protection is important to remove access to bugged files that can
lead to networking backdoors. Kaspersky Enterprise Space Security will be used on all
workstations, and the servers this will cost $16881.25 AUD (2 year, 150 workstation/server +
255 mailbox). In addition it is recommended that the Web Server be running an extra node
called a Internet Gateway Node, these come in a minimum of 10 nodes this will cost an extra
$492.15.
Virus checking will be turned on at all times, all HTTP/FTP and Mail traffic will be scanned
automatically. As well as this all servers will run a full scan and workstation will run a quick
scan every night at close of trade. Every weekend all servers and workstations will undergo a
deep scan.




                                                                                                 15
Appendices
Risk Summary table
Analysis tools




                     16
                                      System failure,
Extreme    Total loss of building   accident, sabotage
                                         (hackers)




  High       Physical security




           Telecommunications
Medium           failure




  Low                                                             Virus attack




Very Low




              Very unlikely             Unlikely         Medium     Likely       Almost Certain
Analysis tools
Software Tools are the main way to generate test traffic and monitor the network. These will
be used mainly on Network Hardware such as Servers, Routers and Switches.


On the main server will be the most important piece of monitoring software, this software is
Spiceworks. Spiceworks is an intensive piece of Open Source network monitoring software.
Not only will it check the bandwidth used on major links, it will check for high utilization, link
health (goodput), and link state. Spiceworks is not only a bandwidth software it is a total
management suite with the ability to trace anything you wish it to. Spiceworks can be used to
check health and uptime of all network hardware, trace assets, map the network tracing any
changes overtime, run as a helpdesk, software policy, even little things such as a printer
running out of toner or a network computer with a dying HDD or requiring assistance to
troubleshoot its constant rebooting

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:23
posted:9/18/2012
language:English
pages:18