Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

3/9/2011
02:55 PM
George Crump
George Crump
Commentary
50%
50%

Establishing Tiered Recovery Points

Our last entry introduced the concept of tiered recovery points. In this entry we will go into more detail about tiered recovery points. There are typically three types of recovery points you want; instant or close to it, also know as high availability. Within a few hours via some sort of disk or tape backup and finally recovering something old, an archive. Each of these tiers need to be established and

Our last entry introduced the concept of tiered recovery points. In this entry we will go into more detail about tiered recovery points. There are typically three types of recovery points you want; instant or close to it, also know as high availability. Within a few hours via some sort of disk or tape backup and finally recovering something old, an archive. Each of these tiers need to be established and understood when they should be used.These three tiers of recovery; high availability (HA), backup and archive should have almost equal priority with each other and each needs to be established for all data sets and applications. High availability can range from seconds to a few minutes to less than an hour. It depends on when that application or service is expected to be returned to the user and how important it is to the organization.

The primary requirement of an HA solution is to have the capability of returning an application to production rapidly, without a data transfer. This does not require clustering to accomplish however. Clustering is often thought of as expensive and complicated. Third party application availability and replication products can provide this as well. The important component is that the data is in a secondary disk system in a live (not backup format) state. As we discuss in our recent article "Achieving Application Aware Availability" the need for high availability is broader what it used to be. The problem is that applications can't be down for the few hours it may take to transfer data, because of its size, from the backup device (disk or tape) back into production.

To accomplish transfer less recovery, HA requires mirroring or at least very fast replication of data. In some cases this means that data corruption or deletion can occur on primary storage, be mirrored or replicated to the secondary device before someone realizes that the corruption or deletion has occurred. While some HA solutions also take snapshots of data on the target side not all do, and even if they do the snapshots may get corrupted as well before you realize that corruption or accidental deletion has occurred. In other words we need a second tier of data protection in case something happens to the mirrored or replicated data.

While transfer times may cause you to not meet your ideal recovery time objective, faced with the alternative, total data loss, you'll be glad to have the secondary recovery tier. This tier is typically going to be some form of backup application and device. A backup is designed to store many versions of a data set that will exceed the versioning capabilities of most replication technologies. Also backups happen less frequently so the potential of corruption sneaking into multiple backup data sets is less likely. Still this second tier of backup needs to be focused on rapid recovery. Most often this means a disk based recovery on a high speed network.

Finally there is the archive, often tape based but also disk based. Ideally this is not a "when all else has failed" recovery tier. This recovery tier should more often be used to recover old versions of data as part of a legal action or when a project is re-activated. However, if the two prior tiers have failed it is good to know that this tier is available for a last ditch recovery effort.

Moving data between these tiers can be a challenge as well. In an upcoming entry we will discuss some options to automate that movement and to minimize redundant data copies.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16860
PUBLISHED: 2019-11-19
Code42 app through version 7.0.2 for Windows has an Untrusted Search Path. In certain situations, a non-administrative attacker on the local machine could create or modify a dynamic-link library (DLL). The Code42 service could then load it at runtime, and potentially execute arbitrary code at an ele...
CVE-2019-16861
PUBLISHED: 2019-11-19
Code42 server through 7.0.2 for Windows has an Untrusted Search Path. In certain situations, a non-administrative attacker on the local server could create or modify a dynamic-link library (DLL). The Code42 service could then load it at runtime, and potentially execute arbitrary code at an elevated ...
CVE-2014-5118
PUBLISHED: 2019-11-18
A Security Bypass Vulnerability exists in TBOOT before 1.8.2 in the boot loader module when measuring commandline parameters.
CVE-2019-12422
PUBLISHED: 2019-11-18
Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack.
CVE-2012-4441
PUBLISHED: 2019-11-18
Cross-site Scripting (XSS) in Jenkins main before 1.482 and LTS before 1.466.2 allows remote attackers to inject arbitrary web script or HTML in the CI game plugin.