Sample Availability Protection Standard:: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
No edit summary
 
Line 41: Line 41:
Image:Availability Protection Standard(7).png|Availability Protection Standard page eight of eight.
Image:Availability Protection Standard(7).png|Availability Protection Standard page eight of eight.
</gallery>
</gallery>
[[file:Availability Protection Standard.png]]
[[file:Availability Protection Standard(1).png]]
[[file:Availability Protection Standard(2).png]]
[[file:Availability Protection Standard(3).png]]
[[file:Availability Protection Standard(4).png]]
[[file:Availability Protection Standard(5).png]]
[[file:Availability Protection Standard(6).png]]
[[file:Availability Protection Standard(7).png]]

Latest revision as of 21:03, 15 January 2014

Objectives

  1. General
    1. Appropriate controls based on the availability classification of the information must be defined and incorporated into development and production processes and procedures to ensure that information assets are consistently available to conduct business and support business operations.
    2. System and network failures should be reported immediately to the Information Technology Director or designated IT operations manager.
    3. Users shall be notified of scheduled outages (for example, for system maintenance) that require any period of downtime. This notification should specify the date and time of the system maintenance, expected duration, and anticipated system or service resumption time.
    4. An inventory of Mission Critical Resources and list of administrative items should be maintained, in accordance with the System Development Life Cycle Standard, to aid in the event of system failure, recovery, or reconfiguration.
    5. Prior to production use, each new or significantly modified business application must include a Security Impact Statement and Business Impact Analysis.
    6. Capacity management and load balancing techniques should be used, as deemed necessary, to help minimize the risk and impact of system failures.
  2. Data Backup
    1. All sensitive information shall be stored on network servers.
    2. Full backups of Mission Critical Resources must be performed on at least a weekly basis.
    3. Incremental backups for Mission Critical Resources must be performed on at least a daily basis.
    4. Backups and associated media shall be maintained online for a minimum of thirty (30) days and retained for at least one (1) year and in accordance with legal and regulatory requirements.
    5. Backup media shall be stored and protected in accordance with the Physical Access Standard and Information Handling Standard.
  3. Redundancy and Fail-over
    1. The network infrastructure that supports Mission Critical Resources should have system-level redundancy such as redundant power supplies and system fail-over. Spares should be maintained for critical core components such as routers and switches and service level arrangements should allow for parts replacement within twenty-four (24) hours.
    2. Servers that support Mission Critical Resources should have redundant power supplies and network interface cards. Spares should be maintained and service level arrangements should allow for parts replacement within twenty-four (24) hours.
    3. Servers that have been classified as High availability should use disk mirroring.
  4. Business Continuity Plans
    1. Recovery Time and Data Loss Limits for each Availability Classification category are defined in the following table:
    2. Business Continuity Plans must be developed to support the Recovery Time Requirements and Data Loss Limits.
    3. Business Continuity Plans should specifically identify the Company and/or external Mission Critical Resources, personnel, resources, and necessary corrective actions required for continued availability in the event of an unexpected interruption to normal business operations.
    4. Business Continuity Plans must be written to detail specific responsibilities and tasks for use in responding to emergencies and resuming business operations.
    5. Business Continuity Plans must adhere to all applicable legal and regulatory requirements.
    6. Business Continuity Plans are considered "Restricted" information and must be stored and protected in accordance with the Information Handling Standard.
    7. Business Continuity Plans must be reviewed and revised, as necessary, on a quarterly basis.
    8. Business Continuity Plans must be tested semi-annually for reliable and reproducible results.


Document Examples

Use these samples as a guide for your policy development. Fully customizable versions are available from The Policy Machine.