Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

3/9/2011
02:55 PM
George Crump
George Crump
Commentary
50%
50%

Establishing Tiered Recovery Points

Our last entry introduced the concept of tiered recovery points. In this entry we will go into more detail about tiered recovery points. There are typically three types of recovery points you want; instant or close to it, also know as high availability. Within a few hours via some sort of disk or tape backup and finally recovering something old, an archive. Each of these tiers need to be established and

Our last entry introduced the concept of tiered recovery points. In this entry we will go into more detail about tiered recovery points. There are typically three types of recovery points you want; instant or close to it, also know as high availability. Within a few hours via some sort of disk or tape backup and finally recovering something old, an archive. Each of these tiers need to be established and understood when they should be used.These three tiers of recovery; high availability (HA), backup and archive should have almost equal priority with each other and each needs to be established for all data sets and applications. High availability can range from seconds to a few minutes to less than an hour. It depends on when that application or service is expected to be returned to the user and how important it is to the organization.

The primary requirement of an HA solution is to have the capability of returning an application to production rapidly, without a data transfer. This does not require clustering to accomplish however. Clustering is often thought of as expensive and complicated. Third party application availability and replication products can provide this as well. The important component is that the data is in a secondary disk system in a live (not backup format) state. As we discuss in our recent article "Achieving Application Aware Availability" the need for high availability is broader what it used to be. The problem is that applications can't be down for the few hours it may take to transfer data, because of its size, from the backup device (disk or tape) back into production.

To accomplish transfer less recovery, HA requires mirroring or at least very fast replication of data. In some cases this means that data corruption or deletion can occur on primary storage, be mirrored or replicated to the secondary device before someone realizes that the corruption or deletion has occurred. While some HA solutions also take snapshots of data on the target side not all do, and even if they do the snapshots may get corrupted as well before you realize that corruption or accidental deletion has occurred. In other words we need a second tier of data protection in case something happens to the mirrored or replicated data.

While transfer times may cause you to not meet your ideal recovery time objective, faced with the alternative, total data loss, you'll be glad to have the secondary recovery tier. This tier is typically going to be some form of backup application and device. A backup is designed to store many versions of a data set that will exceed the versioning capabilities of most replication technologies. Also backups happen less frequently so the potential of corruption sneaking into multiple backup data sets is less likely. Still this second tier of backup needs to be focused on rapid recovery. Most often this means a disk based recovery on a high speed network.

Finally there is the archive, often tape based but also disk based. Ideally this is not a "when all else has failed" recovery tier. This recovery tier should more often be used to recover old versions of data as part of a legal action or when a project is re-activated. However, if the two prior tiers have failed it is good to know that this tier is available for a last ditch recovery effort.

Moving data between these tiers can be a challenge as well. In an upcoming entry we will discuss some options to automate that movement and to minimize redundant data copies.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This gives a new meaning to blind leading the blind.
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-30550
PUBLISHED: 2021-06-15
Use after free in Accessibility in Google Chrome prior to 91.0.4472.101 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-30551
PUBLISHED: 2021-06-15
Type confusion in V8 in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-30552
PUBLISHED: 2021-06-15
Use after free in Extensions in Google Chrome prior to 91.0.4472.101 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-30553
PUBLISHED: 2021-06-15
Use after free in Network service in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-24037
PUBLISHED: 2021-06-15
A use after free in hermes, while emitting certain error messages, prior to commit d86e185e485b6330216dee8e854455c694e3a36e allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untruste...