Disaster Recovery


Disaster Recovery is the ability of an organization to minimize the effects of a disaster that would disrupt normal business operations.

To minimize development disruption during a disaster, a proper SCM DR Plan is required.


The purpose of this page is to establish a standard for DR for systems, applications and their configurations.

By classifying each system and application into one of four categories.

These categories are Vital, Critical, Important and Deferred.

Management Commitment

A sound DR (Business Continuity) plan is essential to ensure an organization survives a disaster.

This cannot really be over emphasized.

Yet many companies still side step the issue or hold plans which are clearly out of date or inadequate.

High Availability

High Availability, HA, is considered a system that up 100% of the time.

Now, no system is operational 100% of the time.

So, a commonly believed standard of availability is "five 9s", 99.999%.

DR Matrix

Step Description
Risk Analysis Create a thorough risk analysis of your computer systems

  • Define outage threats
  • Prioritize the threats
  • Categorize the threats into low, medium and high
  • Determine your DR Budget It is typically considered that for every dollar spent in prevention, will be $10 spent in recovery

  • Determine where your prevention money will be best spent
  • DR budgets usually run between 2-8% of a companies overall IT budget
  • Best Practices usually state that well run IT shops spend 15% on DR
  • Develop a DR Plan When must the business be up and running after a disaster

  • Most businesses assume they need to be up and running 24 to 48 hours after an incident
  • The plan should be a detailed description of what everyone needs to do to accomplish the recovery
  • Do not forget about cross-team communication during the recovery
  • Test Once you have the DR Plan defined, Test, Test and Retest!

  • This is where you will find defects, bad assumptions and gaps in your Disaster Recovery Plan
  • It should be tested yearly

  • Links

    Definition of Information Technology Table of Contents

    Definition of Information Technology Definition of Information Technology describes the primary function of Information Technology. Along with the scope of IT Services and Technologies provides to the Information Technology Services Customers.

    Cloud Computing Cloud Computing is the use of Internet computer and software technologies to provide a variety of computer services. It is more than virtual servers. It is a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. The name Cloud comes from the common diagram of the Internet as it is often depicted in computer network diagrams.

    Disaster Recovery The purpose of this page is to establish a standard for disaster recovery for systems, applications and their configurations.

    ITIL ITIL, Information Technology Infrastructure Library, is a set of best practices that support the delivery of Information Technology Services.

    ITIL V3 ITIL v3, Information Technology Infrastructure Library, is a set of best practices that support the delivery of Information Technology Services.

    Six Sigma Six Sigma seeks to identify and resolve the causes of defects and errors in engineering and business processes. It uses a set of quality management methods, including statistical methods, and creates a special infrastructure of people within the organization who are experts in these methods. Each Six Sigma project carried out within an organization follows a defined sequence of steps and has quantified financial targets.

    SOA Strategies SOA Strategies, the importance of IT articulating the value of its technology strategy to corporate decision makers, the correlation between architecture and successful business-driven initiatives such as cloud computing and software as a service, and how to avoid common architecture mistakes.

    SOX SOX, Sarbanes Oxley, reporting and testing requirements are mandating formal approvals and reviews of people who have access to application source code.

    SOX Source Code SOX Source Code how to maintain a SOX audit for source code control, you must maintain access control and provide an audit trail of access.

    SCMWise Software Configuration Management SCMWise is dedicated to SCM. This site is a central repository for the collection of best practices, processes, methodologies and tools that surround SCM.

    SCMWise Configuration Spec

    © Copyright 2007 - 2017
    Powered by Site Build It!
    Page copy protected against web site content infringement by Copyscape's Privacy Policy
    ADD TO YOUR SOCIAL BOOKMARKS: add to BlinkBlink add to add to DiggDigg
    add to FurlFurl add to GoogleGoogle add to SimpySimpy add to SpurlSpurl Bookmark at TechnoratiTechnorati add to YahooY! MyWeb