{"id":3546,"date":"2012-01-31T06:05:24","date_gmt":"2012-01-30T20:05:24","guid":{"rendered":"http:\/\/nsrd.info\/blog\/?p=3546"},"modified":"2012-01-31T06:05:24","modified_gmt":"2012-01-30T20:05:24","slug":"check-in-new-years-resolutions","status":"publish","type":"post","link":"https:\/\/nsrd.info\/blog\/2012\/01\/31\/check-in-new-years-resolutions\/","title":{"rendered":"Check in &#8211; New Years Resolutions"},"content":{"rendered":"<p><a href=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/01\/Resolutions.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3547\" title=\"Resolutions Check-in\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/01\/Resolutions.png\" alt=\"Resolutions Check-in\" width=\"348\" height=\"483\" srcset=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/01\/Resolutions.png 348w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/01\/Resolutions-216x300.png 216w\" sizes=\"auto, (max-width: 348px) 100vw, 348px\" \/><\/a><\/p>\n<p>In December last year I posted &#8220;7 new years backup resolutions for companies&#8221;. Since it&#8217;s the end of January 2012, I thought I&#8217;d check in on those resolutions and suggest where a company should be up to on them, as well as offering some next steps.<\/p>\n<ol>\n<li><strong>Testing<\/strong> \u2013 The first resolution related to ensuring backups are tested. By now at least an informal testing plan should be in place if none were before. The next step will be to deal with some of the aspects below so as to allow a group to own the duty of generating an official data protection test plan, and then formalise that plan.<\/li>\n<li><strong>Duplication<\/strong> \u2013 There should be documented details of what <em>is<\/em>\u00a0and what <em>isn&#8217;t<\/em>\u00a0duplicated within the backup environment. Are only production systems duplicated? Are only production Tier 1 systems duplicated? The first step towards achieving satisfactory duplication\/cloning of backups is to note the current level of protection and expand outwards from that. The next step will be to develop tier guidelines to allow a specification of what type of backup receives what level of duplication. If there are already service tiers in the environment, this can serve as a starting point, slotting existing architecture and capability onto those tiers. Where existing architecture is insufficient, it should be noted and budgets\/plans should be developed next to deal with these short-falls.<\/li>\n<li><strong>Documentation<\/strong> \u2013 As I mentioned before, the backup environment should be documented. Each team that is involved in the backup process should have assigned at least one individual to write documentation relating to their sections (e.g., Unix system administrators would write Unix backup and recovery guidelines, etc., Windows system administrators would do the same for Windows, and so on). This should actually include 3 people: the writer, the peer reviewer, and the manager or team leader who accepts the documentation as sufficiently complete. The next step after this will be to handover documentation to the backup administrator(s) who will be responsible for collation, contribution of their sections, and periodic re-issuing of the documents for updates.<\/li>\n<li><strong>Training<\/strong> \u2013 If staff (specifically administrators and operators) had previously not been trained in backup administration, a training programme should be in the works. The next step, of course, will be to arrange budget for that training.<\/li>\n<li><strong>Implementing a zero error policy<\/strong> \u2013 First step in implementing a zero error policy is to build the requisite documents: an issues register, an exceptions register, and an escalations register. Next step will be to adjust the work schedules of the administrators involved to allow for additional time taken to resolve the &#8216;niggly&#8217; backup problems that have been in the environment for some time as the switchover to a zero error policy is enacted.<\/li>\n<li><strong>Appointing a Data Protection Advocate<\/strong> \u2013 The call should have gone out for personnel (particularly backup and\/or system administrators) to nominate themselves for the role of DPA within the organisation, or if it is a multi-site organisation, one DPA per site. By now, the organisation should be in a position to decide <em>who<\/em>\u00a0becomes the DPA for each site.<\/li>\n<li><strong>Assembling an Information Protection Advisory Council (IPAC)<\/strong> \u2013 Getting the IPAC in place is a little more effort because it&#8217;s going to involve more groups. However, by now there should be formal recognition of the need for this council, and an informal council membership. The next step will be to have the first formal meeting of the council, where the structure of the group and the roles of the individuals within the group are formalised. Additionally, the IPAC may very well need to make the final decision on who is the DPA for each site, since that DPA will report to them on data protection activities.<\/li>\n<\/ol>\n<p>It&#8217;s worth remembering at this point that while these tasks may seem arduous at first, they&#8217;re absolutely essential to a well running backup system that actually meshes with the needs of the business. In essence: the longer they&#8217;re put off, the more painful they&#8217;ll be.<\/p>\n<p>How are you going?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In December last year I posted &#8220;7 new years backup resolutions for companies&#8221;. Since it&#8217;s the end of January 2012,&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[3,5],"tags":[228,339,342,348,496,994,1017,1127],"class_list":["post-3546","post","type-post","status-publish","format-standard","hentry","category-architecture","category-backup-theory","tag-cloning","tag-documentation","tag-dpa","tag-duplication","tag-ipac","tag-testing","tag-training","tag-zero-error-policy"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pKpIN-Vc","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/3546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/comments?post=3546"}],"version-history":[{"count":0,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/3546\/revisions"}],"wp:attachment":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/media?parent=3546"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/categories?post=3546"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/tags?post=3546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}