Data Backup and Restoration Policy
Data Backup and Restoration Policy
General Overview
One of the most critical functions any I.T. organization can undertake is ensuring a structured and highly
formalized data backup policy and procedures are in place. After all, an organization without its data – or
the inability to retrieve and restore such data in a complete, accurate, and timely manner – faces serious
issues as a viable entity. Backups are a must, especially considering today’s growing regulatory
compliance mandates and the ever-increasing cyber security threats for which business face on a daily
basis. Yet even without compliance mandates, a well-though out, efficient, and reliable backup and
recovery plan is a must for ensuring the confidentiality, integrity, and availability of (CIA) critical data.
As for data backups or the process of “backing up”, it’s essentially the copying, storing – and possible
restore and recovery – of computer data. Simply stated, data, in whatever format it may be in, should be
regularly copied, then stored and archived accordingly, and available for possible restore and recovery, if
necessary. Sounds straightforward – and it is – yet organizations struggle immensely with putting in
place best practices such as these for backups.
Data Backup and Recovery Policy and Procedures
Date TBD
Language English
Individual and/or Department [Family Care Medical Laboratory] Information Technology Department
Responsible for Distribution of
Document
[Crelio Health]
Developed by:
Data Backup and Recovery (Restoration)
Subject
TBD
Approval Date
To implement comprehensive data backup and recovery policies, procedures, and practices whereby all employees
Purpose of Document and other intended parties are readily aware of the organization’s data backup initiatives.
Disbursed to all employees of [Family Care Medical Laboratory] and available by request to all other intended parties.
Distribution of Document
1.0 Overview
In accordance with mandated organizational security requirements set forth and approved by
management, [Family Care Medical Laboratory] has established a formal Data Backup and Recovery
policy and supporting procedures.This policy is to be implemented immediately along with all relevant
and applicable procedures. Additionally, this policy is to be evaluated on a(n) [annual, semi-annual,
quarterly] basis for ensuring its adequacy and relevancy regarding [Family Care Medical Laboratory]'s
needs and goals.
1.0 Purpose
This policy and supporting procedures are designed to provide [Family Care Medical Laboratory] with a
documented and formalized Data Backup and Recovery policy that is to be adhered to and utilized throughout
the organization at all times. Compliance with the stated policy and supporting procedures helps ensure the
safety and security of [Family Care Medical Laboratory] I.T. system resources and all supporting assets.
Backups are a critical process for any organization, especially considering today’s growing regulatory
compliance mandates and the ever-increasing cyber security threats for which business face on a daily
basis. Yet even without compliance mandates, a well-though out, efficient, and reliable backup and recovery is
a must for ensuring the confidentiality, integrity, and availability (CIA) of critical data.
1.0 Scope
This policy and supporting procedures encompass all system resources and supporting assets that are
owned, operated, maintained, and controlled by [Family Care Medical Laboratory] and all other system
resources, both internally and externally, that interact with these systems.
• Internal system resources are those owned, operated, maintained, and controlled by [Family Care
Medical Laboratory] and include all network devices (firewalls, routers, switches, load balancers,
other network devices), servers (and the operating systems and applications that reside on them, both
physical
and virtual servers) and any other system resources and supporting assets deemed in scope.
• External system resources are those owned, operated, maintained, and controlled by any entity
other than [Family Care Medical Laboratory], but for which these very resources may impact
the confidentiality, integrity, and availability (CIA) of [Family Care Medical Laboratory]
system resources and supporting assets.
1.0 Policy
[Family Care Medical Laboratory] is to ensure that the Data Backup and Recovery policy adheres to the
following conditions for purposes of complying with the mandated organizational security requirements
set forth and approved by management:
Backup environments
A critical component of any data backup and recovery initiatives is to properly identify all environments –
and the associated data – that required backup procedures. While critical environments, such as those
relating to production, development, and staging require backups, it’s the platforms and the supporting
systems within these environments that are to be identified, with applicable backup procedures in place.
This would include, but not limited to, the following platforms and supporting systems:
• Network device backups, such as configuration file, rulesets, and other critical data.
• Servers, (both virtual and physical stand-alone) such as all operating systems, and associated
applications (i.e., databases, web server applications, etc.) for all Microsoft Windows, UNIX, Linux,
and any other type of other operating systems.
• Critical servers, such as all production facing servers, DNS servers, email servers, FTP servers,
and all other systems associated with such servers.
• Voicemail, PBX, Telephone Systems
• Backup software
• Backup tapes and tape devices
• Backup library
• Backup disks
• Hard drives
• CDs
• DVDs
• Compact flash drives, SD
• Dynamic Random Access Memory (DRAM)
• Read-Only Memory (ROM and the different variations thereof)
• Random Access Memory (RAM)
• Flash cards
• USB drives, removable media, memory sticks
As for the backup processes performed, the following are considered acceptable by [Family Care Medical
Laboratory] when conducting backups of all necessary data:
• Manual – Manual backups are those performed by choosing what data to back up, when to backup,
and to what device – all in a manual process. Though it creates great flexibility and customization, it’s
not recommended as a viable long-term solution for any type of environment.
• Semi-Automated – Semi automated backups are those performed using backup tools and
software, but still require somebody to initiate and launch the backup process itself. The
disadvantage of these backups is that there prone to human error, such as missing a critical time
for backups, etc.
• Completely Automated – Completely automated backup processes have fast become the norm in
many environments, as they effectively ensure the backup process is run on a regular scheduled
time, complete with reporting metrics and other critical information.
• Full – A full backup is simply a complete backup of all data. It’s the most comprehensive and
time-consuming type of data, yet it ensure a complete backup of everything has been undertaken.
• Differential - A differential backup provides a backup of files that have effectively changed since
the last full backup was performed. A differential backup typically saves only the files that are
different or new since the actual last full backup, but this can vary in different backup platforms.
• Incremental – An incremental backup is essentially a backup of all the files, or parts of files that
have changed since the previous backups was conducted, regardless of the type of backup (Full,
differential, or incremental).
Additionally, backup activities for full, differential, and incremental are to take place on an as-needed
basis, such as in the following manner:
Backup Exceptions
Any exceptions to the types of backups and the default backup scheduling are to be approved by
authorized personnel, with a valid and justified reason. Additionally, such exceptions – which are
ultimately changes to the backup process – are to be submitted with a formal change request, reviewed
and approved by authorized personnel. Furthermore, changes to any of the tools and utilities used for the
backup process also require the use of a documented change request, initiated by select personnel only.
The backup platform is a critical component of the organization’s information technology infrastructure,
thus great care and due diligence must be enacted when involving changes to its process.
• E-mails confirming the current status and final result – such as success or failure – of the backup.
• Reports generated confirming the current status and final result – such as success or failure – of
the backup.
• Portals for which authorized employees can log into for reviewing and confirming the current
status and final result – such as success or failure – of the backup.
Backups that are successful are to be recorded as such, yet backup failures an exceptions are to be
handled immediately, with all appropriate steps undertaken for ensuring the timely backup of such data.
Failures and exceptions are delivered via email reports or metrics from the backup utilities notifying
authorized employees of such issues. Depending on the nature, severity, and urgency of the backup itself
and the resolution for correcting the issue, a thorough and analysis is to be undertaken for correcting the
issue in a timely manner and for helping mitigate the issue in the future.
Either in manual form or electronic format, the following information is to be recorded regarding
backups:
o
Purpose
o
Name of individual requesting backup
o
Intended destination
o
Date of release
o
Date of return
o
Any other information deemed relevant
As for quality control initiatives, backups are to be used until they reach a point far before in which the
quality of the data may come into question, ultimately to avoid media failures. At any time, if the quality
of media becomes an issue, the data is to be immediately removed to another medium, with the
compromised medium being disposed in accordance with company policy.
Transporting of Media
Transporting backup media is vital for ensuring its safety and security at all times during movement. The
following best practices are to be adhered to at all times, when applicable:
• Backup media is to be properly packed and stored for ensuring its safety during movement, which
means using approved cases and other protective devices.
• Backup media is to be kept away from extreme temperatures, both heat and cold, during
movement.
• Backup media is never to be left alone or unsupervised during transportation.
• Only approved transport methods and vehicles are to be utilized.
• Transport is to be in a direct manner as possible, with no unnecessary stops or deviations from the
intended route.
• When necessary, transport of media is to also include additional security precautions as required.
• Disintegration
• Shredding (disk grinding device)
• Incineration by a licensed incinerator
• Pulverization
Please note that prior to physically destroying any of the actual devices used for storing data, all data must
be electronically removed (i.e., wiped, formatted, etc.) as the primary layer of security before being
destroyed.
1.0 Procedures
[Family Care Medical Laboratory] has developed and implemented a comprehensive data backup and
recovery process, which encompasses the following categories and supporting activities listed below.
These policy directives will be fully enforced by [Family Care Medical Laboratory] for ensuring the data
backup and recovery initiatives are executed in a formal manner and on a consistent basis for all specified
systems.
Additional Information
General Notes | Comments: