Table of Contents Chapter 12: Segregation of Duties Chapter 14: Network Security
Chapter 13: Disaster Recovery

1. Introduction

2. Policy Statement

3. Standards 4. Objective 5. Responsibilities 6. The Disaster Recovery Plan
7. Backup and Data Recovery 8. Testing and Maintaining the Plan 9. Communication/
Awareness/Distribution
10.Alternate Sites 11.Service Providers 12.Risk Analysis
13.Existing Systems 14.New Systems

Introduction

Disaster Recovery Planning involves the advance planning and arrangements necessary to minimize risk by ensuring the ability to recover time sensitive systems, applications, information, and business functions in the event of an interruption or disaster. Disaster Recovery Planning also involves defining, recommending, implementing, testing and administering recovery strategies.


Policy Statement

It is the ultimate responsibility of the owner of business information to ensure that the recovery and contingent processing of such data is possible through tested and effective backup procedures, recovery planning and contingency processing capabilities. This will increase the ability to recover critical processes and restore critical data in a timely and cost effective manner.


Standards

Individual Business Recovery Plans must exist for all information processing systems that support critical business functions. Location management must test the plan annually. Location management is also responsible for reviewing and maintaining the plan on an annual basis or when any major change(s) occurs within the IT systems or configurations. The plan(s) must address a situation from partial to total loss (worst case) of a location to ensure the ability to recover and restore IT information as well as critical business information. The extent of detail required for each plan will depend on each of the location's critical functions and system restoration capabilities.


Objective

The objective of this policy is to:


Responsibilities

Location Managers

Managers are responsible for business continuity controls and must ensure a secure, recoverable environment that protects IT assets, and provides continuity for the critical business functions that they support. They will approve the recovery plans for their business needs once developed, and thereafter each time the plan is updated.


The Disaster Recovery Plan

The plan should address the following:

1. Response (initial action following a disastrous event).

2. Resumption (establishing the alternative processing site and set up for resumption of business).

3. Recovery (resume processing for time-sensitive business functions).

4. Restoration (returning to the original processing site).

Additionally, the plan should include the following information:


Backup and Data Recovery

Backup and recovery procedures and practices provide a means to save and restore data for all data processing systems including mainframes, servers and workstations. It is the ultimate responsibility of the owner of the data and the systems support staff to ensure that the backup/recovery process is accurate, effective and well documented for recovery purposes. Failure to do so could result in the unrecoverable loss of critical information if a disruptive event occurs.

The frequency of backup information should be determined based on the criticality of the data, the system, location and departmental needs.

A routine schedule for off-site rotation of backup information must be established. Depending on the threat of a regional disaster, the off-site location should be outside of the regional area to avoid total loss of information.

The following backup information should always be available in current status to business users:

Non-system related backup information that is very important, and should be held at off-site locations, includes, but is not limited to:

Backup requirements and recovery strategies for transmitted and received data (electronic media) must be considered.

Review and updating of all items maintained in an off-site storage area should take place on an annual basis.


Testing and Maintaining the Plan

It is essential that Disaster Recovery Plans be tested on an annual basis. If an agreement exists for an alternative site, it is desirable that exercising the plan takes place utilizing the actual recovery facility. After an exercise, all recovery personnel are responsible for submitting a written report indicating problems encountered and plans for resolution. The plan should be updated to reflect those recommendations.

A management review of the plan should take place at least annually or more frequently when significant changes are made to the applications, hardware or software at a location.


Communication / Awareness / Distribution

Each employee should be aware of their role and responsibilities in a recovery effort and should participate in plan tests when possible.

All primary and alternate key personnel responsible for participation in the business recovery should maintain a copy of the plan, both at work and at home. (Depending on their assigned roles, it may not be necessary to distribute the entire plan to all individuals.)

True Value’s Internal Audit will also maintain a current copy of all Disaster Recovery Plans in the corporation.


Alternate Sites

In the event that a facility is damaged and inaccessible or a business interruption occurs that requires relocation of the business, then alternative locations would be required. The capacity of an alternate location/recovery site should meet the minimum needs required to address critical processing functions. These needs would be based on the alternative processing strategy, the time required to recover the critical business functions and options for alternate/recovery sites.


Service Providers

Where no corporate strategy exists and it is beyond reasonable cost to justify redundancies, agreements must be made with vendors who offer services such as temporary and permanent hardware/software replacement, office space and furniture, and supplies, etc., in advance. This will guarantee quick response in a disaster situation. The distance of recovery sites from a True Value location is important to consider since key employees are expected to be present for both actual recovery and testing.

Annually, a review of recovery service vendor contracts must be done to ensure compatibility. Testing system recovery will ensure present system configurations are recoverable at the alternate computer site and that operating systems and business function software is appropriately backed up. In addition, the number of workspace areas should be analyzed to avoid deficiencies at time of need. Other contractual considerations that must be given are options to void contracts when special circumstances exist, i.e. acquisitions, sale of existing business, etc.


Risk Analysis

A risk analysis is the process of identifying risks, assessing the critical functions necessary to continue operations, defining the controls that are in place to reduce exposure, and evaluating the cost for such controls. The risk analysis often involves an evaluation of the likelihood of an occurrence, the risk analysis will be performed on computer/network environments to identify and evaluate risks and determine any disaster mitigation requirements. The risk analysis is generally a collaborative effort of various departments including IT, Facilities Management, Infrastructure Management, General Management, Internal Audit, along with any public utilities and services which support the corporation.


Existing Systems

Evaluations of existing systems to determine whether the system complies with the corporate policy will be performed by True Value’s Internal Audit. If not in compliance, the location is responsible for determining recovery strategies and documenting a recovery plan that must be tested and maintained annually.


New Systems

Recovery considerations must be provided within the project charter for all new/upgraded IT systems intended for critical business functions. True Value’s Internal Audit, along with business units and IT development areas, will ensure that any system/application being considered for purchase is evaluated for' compliance this policy.


BACK TO TOP

Table of Contents Chapter 12: Segregation of Duties Chapter 14: Network Security