{"id":1273,"date":"2009-11-10T04:35:50","date_gmt":"2009-11-09T18:35:50","guid":{"rendered":"http:\/\/nsrd.wordpress.com\/?p=1273"},"modified":"2018-12-12T15:21:41","modified_gmt":"2018-12-12T05:21:41","slug":"5-golden-rules-of-recovery","status":"publish","type":"post","link":"https:\/\/nsrd.info\/blog\/2009\/11\/10\/5-golden-rules-of-recovery\/","title":{"rendered":"The 5 Golden Rules of Recovery"},"content":{"rendered":"<p>You might think, given that I wrote an article awhile ago about the <a title=\"The 7 Procedural Obligations of Backup Administrators\" href=\"https:\/\/nsrd.info\/blog\/2009\/09\/16\/7-procedural-obliations\/\" target=\"_blank\">Procedural Obligations of Backup Administrators<\/a> that it wouldn&#8217;t be necessary to explicitly spell out any recovery rules \u2013 but this isn&#8217;t quite the case. It&#8217;s handy to have a &#8220;must follow&#8221; list of rules for recovery as well.<\/p>\n<p>In their simplest form, these rules are:<\/p>\n<ol>\n<li>How<\/li>\n<li>Why<\/li>\n<li>Where<\/li>\n<li>When<\/li>\n<li>Who<\/li>\n<\/ol>\n<p>Let&#8217;s look at each one in more detail:<\/p>\n<ol>\n<li>How \u2013 Know <strong>how<\/strong> to do a recovery, <em>before<\/em> you need to do it. The worst forms of data loss typically occur when a backup routine is put in place that is untried on the assumption that it will work. If a new <em>type<\/em> of backup is added to an environment, it must be tested before it is relied on. In testing, it must be documented by those doing the recovery. In being documented, it must be referenced by operational procedures*.<\/li>\n<li>Why \u2013 Know <strong>why<\/strong> you are doing a recovery. This directly affects the required resources. Are you recovering a production system, or a test system? Is it for the purposes of legal discovery, or because a database collapsed?<\/li>\n<li>Where \u2013 Know <strong>where<\/strong> you are recovering <em>from<\/em> and <em>to<\/em>. If you don&#8217;t know this, <em>don&#8217;t do the recovery<\/em>. You do <em>not<\/em> make assumptions about data locality in recovery situations.<a title=\"Recovery Locality\" href=\"https:\/\/nsrd.info\/blog\/2009\/07\/31\/my-worst-recovery-ever\/\" target=\"_blank\"><br \/>\n<\/a><\/li>\n<li>When \u2013 Know <strong>when<\/strong> the recovery needs to be completed by. This isn&#8217;t always answered by the <em>why<\/em> factor &#8211; you actually need to know both in order to fully schedule and prioritise recoveries.<\/li>\n<li>Who \u2013 Know <strong>who<\/strong> requested the recovery is <em>authorised<\/em> to do so. (In order to know this, there should be operational recovery procedures \u2013 forms and company policies \u2013 that indicate authorisation.)<\/li>\n<\/ol>\n<p>If you know the how, why, where, when and who, you&#8217;re following the golden rules of recovery.<\/p>\n<p>&#8212;<br \/>\n* Or to put it another way \u2013 documentation is useless if you don&#8217;t know it exists, or you can&#8217;t find it!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You might think, given that I wrote an article awhile ago about the Procedural Obligations of Backup Administrators that it&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[5,16,17],"tags":[688,1250,761,1252,847],"class_list":["post-1273","post","type-post","status-publish","format-standard","hentry","category-backup-theory","category-networker","category-policies","tag-obligations","tag-policies","tag-procedures","tag-recovery","tag-rules"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pKpIN-kx","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/1273","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/comments?post=1273"}],"version-history":[{"count":2,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/1273\/revisions"}],"predecessor-version":[{"id":7592,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/1273\/revisions\/7592"}],"wp:attachment":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/media?parent=1273"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/categories?post=1273"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/tags?post=1273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}