Disaster recovery – preparedness for emergencies

Earthquakes, floods, pandemics, lightning strikes – the list goes on and on. Events like these are a disaster for companies because they can bring business grinding to a halt. Disaster recovery is about being prepared for incidents like these and minimising damage when things go south. 

The facts in a nutshell 

  • Disaster recovery is the process of maintaining operations in the event of a disaster, and it always follows a similar procedure.  
  • The steps a company takes in the event of a disaster are defined in its disaster recovery plan.  
  • In a business impact assessment, you first define the most serious potential disasters that could bring your company to a standstill and then set out the respective procedure for each.  
  • Disaster recovery is also mentioned in ISO 27001. As such, it is a mandatory prerequisite for certification. 

What does disaster recovery mean?  

Disaster recovery covers the entire process of maintaining or re-establishing operations in the event of a disaster. While this often includes recovering lost data, a step known as the data recovery, disaster recovery overall encompasses a much wider field. 

Take the COVID-19 pandemic, for example. That is a clear example of what amounted to a disaster for many companies but one that did not involve data loss. Instead, companies faced the challenge of keeping business up and running even when most of the workforce was out on sick leave. So, disaster recovery is not limited to IT systems.  

Disaster recovery is the responsibility of the Disaster Recovery Board, which usually consists of: 

The most common disaster recovery methods include:  

  • Backups 
  • Hot standby (i.e., redundant infrastructure that switches over automatically when components fail) 
  • Cold standby (i.e. redundant infrastructure that does not switch over automatically)  
  • Dedicated staff 
  • Emergency kits 
  • A backup computer centre (i.e., one contained in a lorry) 
  • Emergency generators 

Disaster recovery in 6 steps 

No matter what disaster hits, disaster recovery always roughly follows the same process:   

Step 1: Disaster detection by the responsible staff 

A possible disaster is detected and brought to the attention of the Disaster Recovery Board, who classifies it accordingly.  

Step 2: Containment 

The disaster is contained. In the event of a hacker attack, for example, containment could consist of taking the entire IT infrastructure off the grid.  

Step 3: Immediate measures  

This step includes any measures capable of restoring operations in the short term; for example, recovering data from backups.  

Step 4: Long-term measures 

Some disasters, such as the COVID-19 pandemic, can last for months. Ransomware attacks can also cripple companies or administrations for weeks, as was the case when the Austrian state of Carinthia was paralysed by hackers. Long-term measures are about keeping the business up and running even in the face of a prolonged disaster. An example here is buying new servers on short notice.   

Step 5: Post-disaster clean-up 

Eventually, every disaster passes and normal business can resume. The post-disaster step is like cleaning up after a party: get an overview, clean up, repair. 

Step 6: Lessons learned  

The first task here is to determine what caused the disaster. Many emergencies, such as natural disasters, are unavoidable, even with the best risk management strategy in place. So in the lessons learned step, it is a question of finding out how to improve your reaction the next time around. However, sometimes a disaster can be traced back to a gap in risk management. If this is the case, the gap needs to be located and closed. 

How to set up a disaster recovery process  

If you want to set up a disaster recovery process in your company from zero, it is advisable to first perform what is known as a business impact assessment. In it, you’ll look into the fifteen to twenty basic risks that could bring your company to its knees. These include natural events such as earthquakes, floods, or lightning strikes, but also IT incidents such as ransomware attacks. Depending on your company’s location and the industry you are active in, you might need to include political events such as civil war in the list as well. 

For each scenario you define in the business impact assessment, you should develop a plan that would allow you to ‘stick it out’, i.e., to keep your business processes running, until the disaster passes. Taken together, the described measures are your disaster recovery plan. 

The disaster recovery plan: the essence for disaster preparedness  

By making a disaster recovery plan, you are drafting your most crucial document for dealing with disasters. Because it is unclear whether there will even be an Internet connection in the event of an emergency, you should make sure your disaster recovery plan is available in both digital and paper form.  

A disaster recovery plan consists of: 

  • The business impact assessment with the most important 15–20 scenarios that could have a serious impact on your company,  
  • A description of the infrastructure and data recovery measures already in place (such as a redundant data centre, firewalls, etc.),  
  • The general procedure in the event of a disaster, and  
  • A description of the specific procedure for each scenario, including a flow chart. 

Your plan should also include the contact details of senior management. Now, print your disaster recovery plan and add it to your company’s emergency kits.  

Finally, actual physical cases containing your emergency kit should be hidden in various locations. In addition to your disaster recovery plan, a telephone, credit card, laptop, notepad, and pen are standard equipment for an emergency kit.  

Disaster recovery in the ISO 27001 standard 

Implementing a disaster recovery plan is a good idea for any business. It minimises the likelihood that a business will have to discontinue business operations due to an unexpected incident and declare bankruptcy. In short: disaster recovery is how you prepare for the worst case. 

And if you want to have your information security management system (ISMS) certified according to ISO 27001, there is no avoiding implementing a disaster recovery plan in your company.  

Annex A.17 of ISO 27001 outlines concrete requirements for business continuity management (BCM), i.e. your company’s ability to maintain business operations in, as the standard calls it, ‘adverse situations’. (In the new version of the standard, ISO 27001:2022, the BCM requirements are found in Annex A.5.30.)  

Disaster recovery software makes it easier to prepare for disasters 

By documenting the interdependencies of your company’s information assets, disaster recovery software reveals the vulnerabilities you face. For example, the situation is critical if too many employees need to access the same server for work. If the server goes down, it may paralyse your business.  

Disaster recovery software can also help determine the cause of a disaster after an incident occurs by locating the component that failed. However, while inarguably useful, disaster recovery software is also quite expensive.

Conclusion  

Planning is half the battle. And disaster recovery simply means planning for the worst case. Disaster can strike any company or organisation – at any time and without warning. To avoid knee-jerk reactions and panic, disaster recovery defines in advance the steps your company will take in the event of an emergency.  

Are you working on setting up your disaster recovery plan? Or you are planning to get certified according to ISO 27001 or TISAX? We are happy to help you achieve your goals! 

Book a demo

 

 

About the author

Contact Sales

See what DataGuard can do for you.

Find out how our Privacy, InfoSec and Compliance solutions can help you boost trust, reduce risks and drive revenue.

  • 100% success in ISO 27001 audits to date 
  • 40% total cost of ownership (TCO) reduction
  • A scalable easy-to-use web-based platform
  • Actionable business advice from in-house experts

Trusted by customers

Canon  Logo Contact Hyatt Logo Contact Holiday Inn  Logo Contact Unicef  Logo Contact Veganz Logo Contact Burger King  Logo Contact First Group Logo Contact TOCA Social Logo Contact Arri Logo Contact K Line  Logo Contact

Get to know DataGuard

Simplify compliance

  • External data protection officer
  • Audit of your privacy status-quo
  • Ongoing GDPR support from a industry experts
  • Automate repetitive privacy tasks
  • Priority support during breaches and emergencies
  • Get a defensible GDPR position - fast!

Trusted by customers

Canon  Logo Contact Hyatt Logo Contact Holiday Inn  Logo Contact Unicef  Logo Contact Veganz Logo Contact Burger King  Logo Contact First Group Logo Contact TOCA Social Logo Contact Arri Logo Contact K Line  Logo Contact

Get to know DataGuard

Simplify compliance

  • Continuous support on your journey towards the certifications on ISO 27001 and TISAX®️, as well as NIS2 Compliance.
  • Benefit from 1:1 consulting
  • Set up an easy-to-use ISMS with our Info-Sec platform
  • Automatically generate mandatory policies
Certified-Icon

100% success in ISO 27001 audits to date

 

 

TISAX® is a registered trademark of the ENX Association. DataGuard is not affiliated with the ENX Association. We provide consultation and support for the assessment on TISAX® only. The ENX Association does not take any responsibility for any content shown on DataGuard's website.

Trusted by customers

Canon  Logo Contact Hyatt Logo Contact Holiday Inn  Logo Contact Unicef  Logo Contact Veganz Logo Contact Burger King  Logo Contact First Group Logo Contact TOCA Social Logo Contact Arri Logo Contact K Line  Logo Contact

Get to know DataGuard

Simplify compliance

  • Proactive support
  • Create essential documents and policies
  • Staff compliance training
  • Advice from industry experts

Trusted by customers

Canon  Logo Contact Hyatt Logo Contact Holiday Inn  Logo Contact Unicef  Logo Contact Veganz Logo Contact Burger King  Logo Contact First Group Logo Contact TOCA Social Logo Contact Arri Logo Contact K Line  Logo Contact

Get to know DataGuard

Simplify compliance

  • Comply with the EU Whistleblowing Directive
  • Centralised digital whistleblowing system
  • Fast implementation
  • Guidance from compliance experts
  • Transparent reporting

Trusted by customers

Canon  Logo Contact Hyatt Logo Contact Holiday Inn  Logo Contact Unicef  Logo Contact Veganz Logo Contact Burger King  Logo Contact First Group Logo Contact TOCA Social Logo Contact Arri Logo Contact K Line  Logo Contact

Let's talk