SlideShare uma empresa Scribd logo
1 de 45
Disaster Recovery Center (DRC) &
Disaster Recovery Plan (DRP)
Oleh: Farid Ridho, Nugroho P Yudho, Robby Hasan P
Disaster Recovery Center (DRC)
Pendahuluan
Pendahuluan
   Disaster Recovery Center : kemampuan infrastruktur
    untuk melakukan kembali operasi secepatnya pada
    saat terjadi gangguan yang signifikan seperti bencana
    besar yang tidak dapat diduga sebelumnya
   Contohnya adalah ketika terjadi malapetaka yang
    menimpa sejumlah perusahaan besar dunia yang
    bermarkas di World Trade Center tetap dapat
    beroperasi (segera pulih kegiatan operasionalnya
    dalam waktu cepat), karena mereka telah
    mempersiapkan sejumlah DRC untuk mengantisipasi
    bencana yang tidak dikehendaki tersebut.
Fungsi DRC
 Meminimalisasi kerugian finansial dan
  nonfinansial dalam meghadapi kekacauan
  bisnis atau bencana alam meliputi fisik dan
  informasi berupa data penting perusahaan
 Meningkatkan rasa aman di antara personel,
  supplier, investor, dan pelanggan
Infratruktur
   Infrastruktur disaster recovery mencakup
    fasilitas data center, wide area network
    (WAN) atau telekomunikasi, local area
    network (LAN), hardware, dan aplikasi. Dari
    tiap bagian ini kita harus menentukan
    strategi disaster recovery yang paling tepat
    agar dapat memberikan solusi yang efektif
    dan sesuai dengan kebutuhan perusahaan.
Arsitektur
Lokasi DRC
 Minimum >40 km dari data center
 Berada di luar radius mitigasi bencana
  (gunung berapi, Tsunami, Banjir dll)
 Tidak berada pada jalur patahan geologi
 Indeks Rawan Bencana Rendah di Indonesia
  Kalteng (Sumber: Indeks Rawan Bencana
  Indonesia BNPB, 2011)
 Akses jaringan internet memadai
 Mudah dijangkau
Disaster Recovery Data Center
Configuration
Data Center Active Warm Standby
Data Center Failed Warm Standby
Warm Standby
   Advantages
    •   Simple design, typical Phase I deployment
    •   Easy to build and maintain
    •   Simple configuration
   Disadvantages
    •   Under utilization of resources
    •   Delay in failover with manual switchover
    •   No load sharing
Data Center Active Hot Standby
Data Center Failed Hot Standby
Hot Standby
   Advantages
    •   Good use of resources due to load sharing
    •   Ease of management
   Disadvantages
    •   Complex, typical Phase II deployment
    •   Data mirroring in both directions
    •   Managing two active data centers
Metode Backup
Why back up data?
 Disaster
 Hardware failure
 Theft
 Data corruption
 Malicious attack
 Virus or worm
 Human error
Metode Backup
 Full Backup
 Differential Backup
 Incremental Backup
Full Backup
Full Backup
 Backup seluruh data dalam setiap waktu
 Waktu untuk backup lama
 Waktu untuk recovery cepat
Differential Backup
Differential Backup
 Dilakukan setelah full backup, tiap terjadi
  perubahan data
 Full backup tetap dilakukan, tapi ada jarak
  waktu
 Waktu backup tidak terlalu lama
 Saat recovery: recovery full backup dan
  differential backup terakhir
Incremental Backup
Incremental Backup
 Backup dilakukan setiap terjadi perubahan
  data
 Waktu backup relatif cepat
 Waktu recovery lama, karena harus
  recovery full backup terakhir dan masing-
  masing incremental backup
Kriteria backup data yg baik
 Off-site backup
 Scheduled backup
 Daily notification
 Sufficient space
 Data availability at all time
 Adequate security
 Guarantee from provider
 Tested regularly
Backup techniques
 Disk mirroring
   - Synchronous mirroring
   - Asynchronous mirroring
 Snapshots
   - Copy-on-write snapshot
   - Split-mirror snapshot
 Continuous Data Protection
 Parity Protection
Backup schedules
 Intraday data protection
   data are backed up several times during
the day
 Weekend and nightly backup
   data are backed up every night and week
Challenges in Backup and
Recovery
 Increased complexity and burden
 Limited capabilities of conventional solutions
 Time requirements
 Reliability
 Size of data
 Expensive new technologies
 Lack of a simple disaster recovery process
 Maintenance
Strategi implementasi backup dan
recovery
Offline backup
   backup data ke offline media / external
storage, misal tape
   - disk to tape deployment
   - disk to disk to tape deployment
Offline backup
   Disk to Tape Deployment
Offline backup
   Disk to Disk to Tape Deployment
Strategi implementasi backup dan
recovery (2)
   Online data protection
     remote site disaster recovery
     - active/passive
     - active/active
     - multisite topologies
Online Data Protection
   Active / passive
Online Data Protection
   Active / active
Online Data Protection
   Multisite topologies
Disaster Recovery Planning (DRP)
Pengertian
 Terminologi yang dikenal luas dalam
  perusahaan-perusahaan berbasis bisnis TI
 Menjelaskan bagaimana suatu organisasi
  akan menghadapi bencana potensial yang
  dapat menimbulkan masalah pada fungsi-
  fungsi normal sistem
 Langkah-langkah pemulihan yang diambil
  jika terjadi bencana
Business Continuity Plan

Business Continuity Plan:
 Business Resumption Plan, it focuses on preventative measures and
   after the dust settles
 Occupant Emergency Plan, it focuses on reducing personel risk
 Continuity of Operations Plan, it focuses during emergency
 Incident Management Plan, it focuses on cyber attacks
 Disaster Recovery Plan, it focusess on IT infrastructure
(Business Resumption, Occupant Emergency, and Continuity of
Operations Plans) do not deal with the IT infrastructure
Incident Management Plan (IMP) does deal with the IT infrastructure, but
since it establishes structure and procedures to address cyber attacks
against an organization’s IT systems
The Disaster Recovery Plan as the only BCP component of interest to IT
Komponen-Komponen DRP
   Bussines Impact Analysis
          Bagian dimana suatu bisnis menganalisa sejauh mana ketergantungannya
          terhadap penggunaan TI
   Risk Assesment
          Bagian ini mengidentifikasi semua ancaman yang datang yang dapat menimbulkan
          kerusakan
   Recovery Strategy
          Kegiatan mendefinisikan strategi pemulihan yang mencakup penyediaan fasilitas
          fisik maupun teknologi-teknologi pendukung
   Disaster Recovery Organization
          Model dan struktur organisasi yang berwenang dalam semua kegiatan pemulihan
          bencana
   Disaster Recovery Procedures
          Prosedur-prosedur standar yang mengatur semua aktifitas sebagai respon
          terjadinya bencana hingga pemulihan kembali
   Disaster Recovery Center
          Komponen terpenting dalam DRP yang mendefinisikan kebutuhan dan spesifikasi
          teknis dari DRP
Hubungan BCP, DRP, dan DRC

     BCP
            DRP


                  DRC
Konsep-Konsep Pemulihan (1)
   Recovery Point Objective (RPO)
         the age of files that must be recovered from backup storage for normal
         operations to resume if a computer, system, or network goes down as a
         result of a Major Incident (MI)

         Nilai yang mengindikasikan waktu seberapa lama suatu perusahaan
         dapat menoleransi hilangnya data

   Recovery Time Objective (RTO)
         time within which a business process must be restored

         Nilai yang mengindikasikan seberapa lama infrastruktur teknologi
         informasi akan dipulihkan
Konsep-Konsep Pemulihan (2)
   Maximum Tolerable Downtime (MTD) atau Maximum Allowable Outage
    (MAO)
        Nilai yang mengidentifikasikan berapa lama suatu perusahaan
        mampu kehilangan sebuah proses bisnis

   Work Recovery Time (WRT)
        Batasan waktu yang diperlukan untuk:
        - Memulihkan data back-up ke dalam aplikasi
        - Memasukkan kembali semua data hasil backlog ke dalam
        aplikasi
        - Memasukkan kembali semua data yang muncul selama kedua
        proses di atas berlangsung ke dalam aplikasi
RPO dan RTO
Planning Process
   Obtain Top Management Commitment
   Establish a planning committee
   Perform a risk assessment
   Establish priorities for processing and
    operations
   Determine Recovery Strategies
   Perform Data Collection
   Organize and document a written plan
   Develop testing criteria and procedures
   Test the Plan
   Approve the plan
Strategi Pemulihan
 Identifikasi obyek-obyek pemulihan, sistem
  dan infrastruktur TI apa saja yang akan
  dipulihkan, data apa saja yang akan
  dipulihkan
 Memilih dan mengembangkan opsi-opsi
  setiap obyek pemilihan
 Menyusun laporan strategi pemulihan
 Mendiskusikan serta menyesuaikan laporan
  strategi pemulihan dengan pihak bisnis dan
  manajemen organisasi

Mais conteúdo relacionado

Mais procurados

Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMElasticsearch
 
How to write an IT DR plan
How to write an IT DR planHow to write an IT DR plan
How to write an IT DR planDatabarracks
 
Disaster recovery plan sample 2
Disaster recovery plan sample 2Disaster recovery plan sample 2
Disaster recovery plan sample 2AbenetAsmellash
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity PlanningDipankar Ghosh
 
Presentasi IT Master Plan
Presentasi IT Master PlanPresentasi IT Master Plan
Presentasi IT Master PlanFanky Christian
 
Best Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingBest Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingAxcient
 
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptxBUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptxJayLloyd8
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365Netskope
 
Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IThhuihhui
 
Clase Gestión de Incidentes.pdf
Clase Gestión de Incidentes.pdfClase Gestión de Incidentes.pdf
Clase Gestión de Incidentes.pdfssuser44ff1b
 
Building and deploying microservices with event sourcing, CQRS and Docker (QC...
Building and deploying microservices with event sourcing, CQRS and Docker (QC...Building and deploying microservices with event sourcing, CQRS and Docker (QC...
Building and deploying microservices with event sourcing, CQRS and Docker (QC...Chris Richardson
 
Interactive Visualization With Bokeh (SF Python Meetup)
Interactive Visualization With Bokeh (SF Python Meetup)Interactive Visualization With Bokeh (SF Python Meetup)
Interactive Visualization With Bokeh (SF Python Meetup)Peter Wang
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 
Business Continuity Planning Presentation Overview
Business Continuity Planning Presentation OverviewBusiness Continuity Planning Presentation Overview
Business Continuity Planning Presentation OverviewBob Winkler
 
Building Event Driven (Micro)services with Apache Kafka
Building Event Driven (Micro)services with Apache KafkaBuilding Event Driven (Micro)services with Apache Kafka
Building Event Driven (Micro)services with Apache KafkaGuido Schmutz
 
IT BSC and Strategic Alignment Model (SAM)
IT BSC and Strategic Alignment Model (SAM)IT BSC and Strategic Alignment Model (SAM)
IT BSC and Strategic Alignment Model (SAM)EM Nasrul
 
Saturn 2018: Managing data consistency in a microservice architecture using S...
Saturn 2018: Managing data consistency in a microservice architecture using S...Saturn 2018: Managing data consistency in a microservice architecture using S...
Saturn 2018: Managing data consistency in a microservice architecture using S...Chris Richardson
 
CQRS + Event Sourcing
CQRS + Event SourcingCQRS + Event Sourcing
CQRS + Event SourcingMike Bild
 

Mais procurados (20)

Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
 
How to write an IT DR plan
How to write an IT DR planHow to write an IT DR plan
How to write an IT DR plan
 
Disaster recovery plan sample 2
Disaster recovery plan sample 2Disaster recovery plan sample 2
Disaster recovery plan sample 2
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
DRP vs BCP
DRP vs BCPDRP vs BCP
DRP vs BCP
 
Presentasi IT Master Plan
Presentasi IT Master PlanPresentasi IT Master Plan
Presentasi IT Master Plan
 
Best Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingBest Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and Testing
 
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptxBUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365
 
Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IT
 
Clase Gestión de Incidentes.pdf
Clase Gestión de Incidentes.pdfClase Gestión de Incidentes.pdf
Clase Gestión de Incidentes.pdf
 
Bcp drp
Bcp drpBcp drp
Bcp drp
 
Building and deploying microservices with event sourcing, CQRS and Docker (QC...
Building and deploying microservices with event sourcing, CQRS and Docker (QC...Building and deploying microservices with event sourcing, CQRS and Docker (QC...
Building and deploying microservices with event sourcing, CQRS and Docker (QC...
 
Interactive Visualization With Bokeh (SF Python Meetup)
Interactive Visualization With Bokeh (SF Python Meetup)Interactive Visualization With Bokeh (SF Python Meetup)
Interactive Visualization With Bokeh (SF Python Meetup)
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Business Continuity Planning Presentation Overview
Business Continuity Planning Presentation OverviewBusiness Continuity Planning Presentation Overview
Business Continuity Planning Presentation Overview
 
Building Event Driven (Micro)services with Apache Kafka
Building Event Driven (Micro)services with Apache KafkaBuilding Event Driven (Micro)services with Apache Kafka
Building Event Driven (Micro)services with Apache Kafka
 
IT BSC and Strategic Alignment Model (SAM)
IT BSC and Strategic Alignment Model (SAM)IT BSC and Strategic Alignment Model (SAM)
IT BSC and Strategic Alignment Model (SAM)
 
Saturn 2018: Managing data consistency in a microservice architecture using S...
Saturn 2018: Managing data consistency in a microservice architecture using S...Saturn 2018: Managing data consistency in a microservice architecture using S...
Saturn 2018: Managing data consistency in a microservice architecture using S...
 
CQRS + Event Sourcing
CQRS + Event SourcingCQRS + Event Sourcing
CQRS + Event Sourcing
 

Destaque

Membangun Data Recovery Center / Disaster Recovery Center
Membangun Data Recovery Center / Disaster Recovery CenterMembangun Data Recovery Center / Disaster Recovery Center
Membangun Data Recovery Center / Disaster Recovery CenterFanky Christian
 
Application-aware Network Performance Management with OpManager
Application-aware Network Performance Management with OpManagerApplication-aware Network Performance Management with OpManager
Application-aware Network Performance Management with OpManagerManageEngine, Zoho Corporation
 
Wp data center standards (final)
Wp   data center standards (final)Wp   data center standards (final)
Wp data center standards (final)Sri Chalasani
 
disaster recovery plan
disaster recovery plandisaster recovery plan
disaster recovery planPuput Puspita
 
Disaster recovery plan
Disaster recovery planDisaster recovery plan
Disaster recovery planHelmita putri
 
Data Center Critical Infrastructure Risk and Vulnerabilities- Impact to Capit...
Data Center Critical Infrastructure Risk and Vulnerabilities- Impact to Capit...Data Center Critical Infrastructure Risk and Vulnerabilities- Impact to Capit...
Data Center Critical Infrastructure Risk and Vulnerabilities- Impact to Capit...Vincent Pelly
 
[Challenge:Future] Make up your mind to live
[Challenge:Future] Make up your mind to live[Challenge:Future] Make up your mind to live
[Challenge:Future] Make up your mind to liveChallenge:Future
 
Not the Unthinkable, But What We Didn’t Think Of: Preparing For and Recoverin...
Not the Unthinkable, But What We Didn’t Think Of: Preparing For and Recoverin...Not the Unthinkable, But What We Didn’t Think Of: Preparing For and Recoverin...
Not the Unthinkable, But What We Didn’t Think Of: Preparing For and Recoverin...Chuck Patch
 
New OpManager v12
New OpManager v12New OpManager v12
New OpManager v12Inuit AB
 
A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5Gewurtz
 
Best Practices of running PostgreSQL in Virtual Environments
Best Practices of running PostgreSQL in Virtual EnvironmentsBest Practices of running PostgreSQL in Virtual Environments
Best Practices of running PostgreSQL in Virtual EnvironmentsJignesh Shah
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIngram Micro Cloud
 
OpManager Major Features
OpManager Major FeaturesOpManager Major Features
OpManager Major Featurestecanody
 
Konsep Dasar Sistem Operasi
Konsep Dasar Sistem OperasiKonsep Dasar Sistem Operasi
Konsep Dasar Sistem Operasiaby89
 
Architecture for building scalable and highly available Postgres Cluster
Architecture for building scalable and highly available Postgres ClusterArchitecture for building scalable and highly available Postgres Cluster
Architecture for building scalable and highly available Postgres ClusterAshnikbiz
 
Progressing the Concept of Resilience in Risk Reduction and Disaster Management
Progressing the Concept of Resilience in Risk Reduction and Disaster ManagementProgressing the Concept of Resilience in Risk Reduction and Disaster Management
Progressing the Concept of Resilience in Risk Reduction and Disaster ManagementGlobal Risk Forum GRFDavos
 
Best Practices for a Complete Postgres Enterprise Architecture Setup
Best Practices for a Complete Postgres Enterprise Architecture SetupBest Practices for a Complete Postgres Enterprise Architecture Setup
Best Practices for a Complete Postgres Enterprise Architecture SetupEDB
 
High Availability PostgreSQL with Zalando Patroni
High Availability PostgreSQL with Zalando PatroniHigh Availability PostgreSQL with Zalando Patroni
High Availability PostgreSQL with Zalando PatroniZalando Technology
 

Destaque (20)

Membangun Data Recovery Center / Disaster Recovery Center
Membangun Data Recovery Center / Disaster Recovery CenterMembangun Data Recovery Center / Disaster Recovery Center
Membangun Data Recovery Center / Disaster Recovery Center
 
Application-aware Network Performance Management with OpManager
Application-aware Network Performance Management with OpManagerApplication-aware Network Performance Management with OpManager
Application-aware Network Performance Management with OpManager
 
Wp data center standards (final)
Wp   data center standards (final)Wp   data center standards (final)
Wp data center standards (final)
 
disaster recovery plan
disaster recovery plandisaster recovery plan
disaster recovery plan
 
Disaster recovery plan
Disaster recovery planDisaster recovery plan
Disaster recovery plan
 
Data Center Critical Infrastructure Risk and Vulnerabilities- Impact to Capit...
Data Center Critical Infrastructure Risk and Vulnerabilities- Impact to Capit...Data Center Critical Infrastructure Risk and Vulnerabilities- Impact to Capit...
Data Center Critical Infrastructure Risk and Vulnerabilities- Impact to Capit...
 
Microsoft
MicrosoftMicrosoft
Microsoft
 
[Challenge:Future] Make up your mind to live
[Challenge:Future] Make up your mind to live[Challenge:Future] Make up your mind to live
[Challenge:Future] Make up your mind to live
 
Not the Unthinkable, But What We Didn’t Think Of: Preparing For and Recoverin...
Not the Unthinkable, But What We Didn’t Think Of: Preparing For and Recoverin...Not the Unthinkable, But What We Didn’t Think Of: Preparing For and Recoverin...
Not the Unthinkable, But What We Didn’t Think Of: Preparing For and Recoverin...
 
New OpManager v12
New OpManager v12New OpManager v12
New OpManager v12
 
A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5
 
Best Practices of running PostgreSQL in Virtual Environments
Best Practices of running PostgreSQL in Virtual EnvironmentsBest Practices of running PostgreSQL in Virtual Environments
Best Practices of running PostgreSQL in Virtual Environments
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a Service
 
OpManager Major Features
OpManager Major FeaturesOpManager Major Features
OpManager Major Features
 
Konsep Dasar Sistem Operasi
Konsep Dasar Sistem OperasiKonsep Dasar Sistem Operasi
Konsep Dasar Sistem Operasi
 
Architecture for building scalable and highly available Postgres Cluster
Architecture for building scalable and highly available Postgres ClusterArchitecture for building scalable and highly available Postgres Cluster
Architecture for building scalable and highly available Postgres Cluster
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
 
Progressing the Concept of Resilience in Risk Reduction and Disaster Management
Progressing the Concept of Resilience in Risk Reduction and Disaster ManagementProgressing the Concept of Resilience in Risk Reduction and Disaster Management
Progressing the Concept of Resilience in Risk Reduction and Disaster Management
 
Best Practices for a Complete Postgres Enterprise Architecture Setup
Best Practices for a Complete Postgres Enterprise Architecture SetupBest Practices for a Complete Postgres Enterprise Architecture Setup
Best Practices for a Complete Postgres Enterprise Architecture Setup
 
High Availability PostgreSQL with Zalando Patroni
High Availability PostgreSQL with Zalando PatroniHigh Availability PostgreSQL with Zalando Patroni
High Availability PostgreSQL with Zalando Patroni
 

Semelhante a Disaster Recovery Center and Disaster Recovery Plan

Pertemuan 13 penanganan masalah jaringan
Pertemuan 13 penanganan masalah jaringanPertemuan 13 penanganan masalah jaringan
Pertemuan 13 penanganan masalah jaringanjumiathyasiz
 
Chapter 2 .auditing it governance controls
Chapter 2 .auditing it governance controlsChapter 2 .auditing it governance controls
Chapter 2 .auditing it governance controlsrefidelia19
 
Dokumen Template DRP - Menrisk
Dokumen Template DRP - Menrisk Dokumen Template DRP - Menrisk
Dokumen Template DRP - Menrisk Cumi Dila
 
Merancang web database_content_server
Merancang web database_content_serverMerancang web database_content_server
Merancang web database_content_serverGina Nashir
 
AUDITING IT GOVERNANCE CONTROLS
AUDITING IT GOVERNANCE CONTROLSAUDITING IT GOVERNANCE CONTROLS
AUDITING IT GOVERNANCE CONTROLSDhina Pohan
 
Bussiness continuity management
Bussiness continuity managementBussiness continuity management
Bussiness continuity managementWidayanti Ishak
 
Ets kak 5116100183
Ets kak 5116100183Ets kak 5116100183
Ets kak 5116100183NatashaVal
 
Sim, ade yayang, hafzi ali, sumber daya komputasi dan komunikasi, universitas...
Sim, ade yayang, hafzi ali, sumber daya komputasi dan komunikasi, universitas...Sim, ade yayang, hafzi ali, sumber daya komputasi dan komunikasi, universitas...
Sim, ade yayang, hafzi ali, sumber daya komputasi dan komunikasi, universitas...Ade Yayang
 
SE - Chapter 9 Pemeliharaan Perangkat Lunak
SE - Chapter 9 Pemeliharaan Perangkat LunakSE - Chapter 9 Pemeliharaan Perangkat Lunak
SE - Chapter 9 Pemeliharaan Perangkat LunakRiza Nurman
 
Sim, nurul iqbal, hapzi ali, sumber daya komputasi dan komunikasi, universita...
Sim, nurul iqbal, hapzi ali, sumber daya komputasi dan komunikasi, universita...Sim, nurul iqbal, hapzi ali, sumber daya komputasi dan komunikasi, universita...
Sim, nurul iqbal, hapzi ali, sumber daya komputasi dan komunikasi, universita...nurul iqbal
 
Handheld Terminal Project Management at PT BJTI Indonesia
Handheld Terminal Project Management at PT BJTI IndonesiaHandheld Terminal Project Management at PT BJTI Indonesia
Handheld Terminal Project Management at PT BJTI IndonesiaDion Webiaswara
 
manajemen proyek teknologi informasi
manajemen proyek teknologi informasimanajemen proyek teknologi informasi
manajemen proyek teknologi informasiOi Ruswanto
 

Semelhante a Disaster Recovery Center and Disaster Recovery Plan (20)

02-DRP-KUMHAM-2.1.pdf
02-DRP-KUMHAM-2.1.pdf02-DRP-KUMHAM-2.1.pdf
02-DRP-KUMHAM-2.1.pdf
 
Pertemuan 13 penanganan masalah jaringan
Pertemuan 13 penanganan masalah jaringanPertemuan 13 penanganan masalah jaringan
Pertemuan 13 penanganan masalah jaringan
 
Chapter 2 .auditing it governance controls
Chapter 2 .auditing it governance controlsChapter 2 .auditing it governance controls
Chapter 2 .auditing it governance controls
 
Dokumen Template DRP - Menrisk
Dokumen Template DRP - Menrisk Dokumen Template DRP - Menrisk
Dokumen Template DRP - Menrisk
 
Materi 4 bagian 1
Materi 4 bagian 1Materi 4 bagian 1
Materi 4 bagian 1
 
Slide bab 10
Slide bab 10Slide bab 10
Slide bab 10
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Angga kusuma uts_rpl20172
Angga kusuma uts_rpl20172Angga kusuma uts_rpl20172
Angga kusuma uts_rpl20172
 
Merancang web database_content_server
Merancang web database_content_serverMerancang web database_content_server
Merancang web database_content_server
 
Ets mppl aidil
Ets mppl aidilEts mppl aidil
Ets mppl aidil
 
AUDITING IT GOVERNANCE CONTROLS
AUDITING IT GOVERNANCE CONTROLSAUDITING IT GOVERNANCE CONTROLS
AUDITING IT GOVERNANCE CONTROLS
 
Template drp
Template drpTemplate drp
Template drp
 
Bussiness continuity management
Bussiness continuity managementBussiness continuity management
Bussiness continuity management
 
Ets kak 5116100183
Ets kak 5116100183Ets kak 5116100183
Ets kak 5116100183
 
Sim, ade yayang, hafzi ali, sumber daya komputasi dan komunikasi, universitas...
Sim, ade yayang, hafzi ali, sumber daya komputasi dan komunikasi, universitas...Sim, ade yayang, hafzi ali, sumber daya komputasi dan komunikasi, universitas...
Sim, ade yayang, hafzi ali, sumber daya komputasi dan komunikasi, universitas...
 
Kak
KakKak
Kak
 
SE - Chapter 9 Pemeliharaan Perangkat Lunak
SE - Chapter 9 Pemeliharaan Perangkat LunakSE - Chapter 9 Pemeliharaan Perangkat Lunak
SE - Chapter 9 Pemeliharaan Perangkat Lunak
 
Sim, nurul iqbal, hapzi ali, sumber daya komputasi dan komunikasi, universita...
Sim, nurul iqbal, hapzi ali, sumber daya komputasi dan komunikasi, universita...Sim, nurul iqbal, hapzi ali, sumber daya komputasi dan komunikasi, universita...
Sim, nurul iqbal, hapzi ali, sumber daya komputasi dan komunikasi, universita...
 
Handheld Terminal Project Management at PT BJTI Indonesia
Handheld Terminal Project Management at PT BJTI IndonesiaHandheld Terminal Project Management at PT BJTI Indonesia
Handheld Terminal Project Management at PT BJTI Indonesia
 
manajemen proyek teknologi informasi
manajemen proyek teknologi informasimanajemen proyek teknologi informasi
manajemen proyek teknologi informasi
 

Disaster Recovery Center and Disaster Recovery Plan

  • 1. Disaster Recovery Center (DRC) & Disaster Recovery Plan (DRP) Oleh: Farid Ridho, Nugroho P Yudho, Robby Hasan P
  • 4. Pendahuluan  Disaster Recovery Center : kemampuan infrastruktur untuk melakukan kembali operasi secepatnya pada saat terjadi gangguan yang signifikan seperti bencana besar yang tidak dapat diduga sebelumnya  Contohnya adalah ketika terjadi malapetaka yang menimpa sejumlah perusahaan besar dunia yang bermarkas di World Trade Center tetap dapat beroperasi (segera pulih kegiatan operasionalnya dalam waktu cepat), karena mereka telah mempersiapkan sejumlah DRC untuk mengantisipasi bencana yang tidak dikehendaki tersebut.
  • 5. Fungsi DRC  Meminimalisasi kerugian finansial dan nonfinansial dalam meghadapi kekacauan bisnis atau bencana alam meliputi fisik dan informasi berupa data penting perusahaan  Meningkatkan rasa aman di antara personel, supplier, investor, dan pelanggan
  • 6. Infratruktur  Infrastruktur disaster recovery mencakup fasilitas data center, wide area network (WAN) atau telekomunikasi, local area network (LAN), hardware, dan aplikasi. Dari tiap bagian ini kita harus menentukan strategi disaster recovery yang paling tepat agar dapat memberikan solusi yang efektif dan sesuai dengan kebutuhan perusahaan.
  • 8. Lokasi DRC  Minimum >40 km dari data center  Berada di luar radius mitigasi bencana (gunung berapi, Tsunami, Banjir dll)  Tidak berada pada jalur patahan geologi  Indeks Rawan Bencana Rendah di Indonesia Kalteng (Sumber: Indeks Rawan Bencana Indonesia BNPB, 2011)  Akses jaringan internet memadai  Mudah dijangkau
  • 9. Disaster Recovery Data Center Configuration
  • 10. Data Center Active Warm Standby
  • 11. Data Center Failed Warm Standby
  • 12. Warm Standby  Advantages • Simple design, typical Phase I deployment • Easy to build and maintain • Simple configuration  Disadvantages • Under utilization of resources • Delay in failover with manual switchover • No load sharing
  • 13. Data Center Active Hot Standby
  • 14. Data Center Failed Hot Standby
  • 15. Hot Standby  Advantages • Good use of resources due to load sharing • Ease of management  Disadvantages • Complex, typical Phase II deployment • Data mirroring in both directions • Managing two active data centers
  • 17. Why back up data?  Disaster  Hardware failure  Theft  Data corruption  Malicious attack  Virus or worm  Human error
  • 18. Metode Backup  Full Backup  Differential Backup  Incremental Backup
  • 20. Full Backup  Backup seluruh data dalam setiap waktu  Waktu untuk backup lama  Waktu untuk recovery cepat
  • 22. Differential Backup  Dilakukan setelah full backup, tiap terjadi perubahan data  Full backup tetap dilakukan, tapi ada jarak waktu  Waktu backup tidak terlalu lama  Saat recovery: recovery full backup dan differential backup terakhir
  • 24. Incremental Backup  Backup dilakukan setiap terjadi perubahan data  Waktu backup relatif cepat  Waktu recovery lama, karena harus recovery full backup terakhir dan masing- masing incremental backup
  • 25. Kriteria backup data yg baik  Off-site backup  Scheduled backup  Daily notification  Sufficient space  Data availability at all time  Adequate security  Guarantee from provider  Tested regularly
  • 26. Backup techniques  Disk mirroring - Synchronous mirroring - Asynchronous mirroring  Snapshots - Copy-on-write snapshot - Split-mirror snapshot  Continuous Data Protection  Parity Protection
  • 27. Backup schedules  Intraday data protection data are backed up several times during the day  Weekend and nightly backup data are backed up every night and week
  • 28. Challenges in Backup and Recovery  Increased complexity and burden  Limited capabilities of conventional solutions  Time requirements  Reliability  Size of data  Expensive new technologies  Lack of a simple disaster recovery process  Maintenance
  • 29. Strategi implementasi backup dan recovery Offline backup backup data ke offline media / external storage, misal tape - disk to tape deployment - disk to disk to tape deployment
  • 30. Offline backup  Disk to Tape Deployment
  • 31. Offline backup  Disk to Disk to Tape Deployment
  • 32. Strategi implementasi backup dan recovery (2)  Online data protection remote site disaster recovery - active/passive - active/active - multisite topologies
  • 33. Online Data Protection  Active / passive
  • 34. Online Data Protection  Active / active
  • 35. Online Data Protection  Multisite topologies
  • 37. Pengertian  Terminologi yang dikenal luas dalam perusahaan-perusahaan berbasis bisnis TI  Menjelaskan bagaimana suatu organisasi akan menghadapi bencana potensial yang dapat menimbulkan masalah pada fungsi- fungsi normal sistem  Langkah-langkah pemulihan yang diambil jika terjadi bencana
  • 38. Business Continuity Plan Business Continuity Plan:  Business Resumption Plan, it focuses on preventative measures and after the dust settles  Occupant Emergency Plan, it focuses on reducing personel risk  Continuity of Operations Plan, it focuses during emergency  Incident Management Plan, it focuses on cyber attacks  Disaster Recovery Plan, it focusess on IT infrastructure (Business Resumption, Occupant Emergency, and Continuity of Operations Plans) do not deal with the IT infrastructure Incident Management Plan (IMP) does deal with the IT infrastructure, but since it establishes structure and procedures to address cyber attacks against an organization’s IT systems The Disaster Recovery Plan as the only BCP component of interest to IT
  • 39. Komponen-Komponen DRP  Bussines Impact Analysis Bagian dimana suatu bisnis menganalisa sejauh mana ketergantungannya terhadap penggunaan TI  Risk Assesment Bagian ini mengidentifikasi semua ancaman yang datang yang dapat menimbulkan kerusakan  Recovery Strategy Kegiatan mendefinisikan strategi pemulihan yang mencakup penyediaan fasilitas fisik maupun teknologi-teknologi pendukung  Disaster Recovery Organization Model dan struktur organisasi yang berwenang dalam semua kegiatan pemulihan bencana  Disaster Recovery Procedures Prosedur-prosedur standar yang mengatur semua aktifitas sebagai respon terjadinya bencana hingga pemulihan kembali  Disaster Recovery Center Komponen terpenting dalam DRP yang mendefinisikan kebutuhan dan spesifikasi teknis dari DRP
  • 40. Hubungan BCP, DRP, dan DRC BCP DRP DRC
  • 41. Konsep-Konsep Pemulihan (1)  Recovery Point Objective (RPO) the age of files that must be recovered from backup storage for normal operations to resume if a computer, system, or network goes down as a result of a Major Incident (MI) Nilai yang mengindikasikan waktu seberapa lama suatu perusahaan dapat menoleransi hilangnya data  Recovery Time Objective (RTO) time within which a business process must be restored Nilai yang mengindikasikan seberapa lama infrastruktur teknologi informasi akan dipulihkan
  • 42. Konsep-Konsep Pemulihan (2)  Maximum Tolerable Downtime (MTD) atau Maximum Allowable Outage (MAO) Nilai yang mengidentifikasikan berapa lama suatu perusahaan mampu kehilangan sebuah proses bisnis  Work Recovery Time (WRT) Batasan waktu yang diperlukan untuk: - Memulihkan data back-up ke dalam aplikasi - Memasukkan kembali semua data hasil backlog ke dalam aplikasi - Memasukkan kembali semua data yang muncul selama kedua proses di atas berlangsung ke dalam aplikasi
  • 44. Planning Process  Obtain Top Management Commitment  Establish a planning committee  Perform a risk assessment  Establish priorities for processing and operations  Determine Recovery Strategies  Perform Data Collection  Organize and document a written plan  Develop testing criteria and procedures  Test the Plan  Approve the plan
  • 45. Strategi Pemulihan  Identifikasi obyek-obyek pemulihan, sistem dan infrastruktur TI apa saja yang akan dipulihkan, data apa saja yang akan dipulihkan  Memilih dan mengembangkan opsi-opsi setiap obyek pemilihan  Menyusun laporan strategi pemulihan  Mendiskusikan serta menyesuaikan laporan strategi pemulihan dengan pihak bisnis dan manajemen organisasi