{"id":3605,"date":"2012-03-07T21:25:58","date_gmt":"2012-03-07T11:25:58","guid":{"rendered":"http:\/\/nsrd.info\/blog\/?p=3605"},"modified":"2018-12-11T14:38:06","modified_gmt":"2018-12-11T04:38:06","slug":"10-things-still-wrong-with-data-protection-attitudes","status":"publish","type":"post","link":"https:\/\/nsrd.info\/blog\/2012\/03\/07\/10-things-still-wrong-with-data-protection-attitudes\/","title":{"rendered":"10 Things Still Wrong with Data Protection Attitudes"},"content":{"rendered":"<p>When I first started working with backup and recovery systems in 1996, one of the more frustrating statements I&#8217;d hear was &#8220;we don&#8217;t need to backup&#8221;.<\/p>\n<p>These days, that sort of attitude is extremely rare \u2013 it was a hold-out from the days where computers were often considered non-essential to ongoing business operations. Now, unless you&#8217;re a tradesperson who does all your work as cash in hand jobs, the chances of a business <em>not<\/em>&nbsp;relying on computers in some form or another is practically unheard of. And with that change has come the recognition that backups are, indeed, required.<\/p>\n<p>Yet, there&#8217;s improvements that can be made to data protection attitudes within many organisations, and I wanted to outline things that can still be done incorrectly within organisations in relation to backup and recovery.<\/p>\n<p><a href=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/03\/10.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3628\" title=\"10\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/03\/10.jpg\" alt=\"\" width=\"178\" height=\"120\"><\/a><strong>Backups aren&#8217;t protected<\/strong><\/p>\n<p>Many businesses now clone, duplicate or replicate their backups \u2013 but not all of them.<\/p>\n<p>What&#8217;s more, occasionally businesses will still design backup to disk strategies around non-RAID protected drives. This may seem like an excellent means of storage capacity optimisation, but it leaves a gaping hole in the data protection process for a business, and can result in catastrophic data loss.<\/p>\n<p>Assembling a data protection strategy that involves unprotected backups is like configuring primary production storage without RAID or some other form of redundancy. Sure, technically it works &#8230; but you only need one error and suddenly your life is full of chaos.<\/p>\n<p><a href=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/03\/9.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3630\" title=\"9\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/03\/9.jpg\" alt=\"\" width=\"125\" height=\"103\"><\/a><strong>Backups not aligned to business requirements<\/strong><\/p>\n<p>The old superstition was that backups were a waste of money \u2013 we do them every day, sometimes more frequently, and hope that we never have to recover from them. That&#8217;s no more a waste of money than an insurance policy that doesn&#8217;t get claimed on is.<\/p>\n<p>However, what <strong>is<\/strong>&nbsp;a waste of money so much of the time is a backup strategy that&#8217;s unaligned to actual business requirements. Common mistakes in this area include:<\/p>\n<ul>\n<li>Assigning arbitrary backup start times for systems without discussing with system owners, application administrators, etc.;<\/li>\n<li>Service Level Agreements not established (including Recovery Time Objective and Recovery Point Objective);<\/li>\n<li>Retention policies not set for business practice and legal\/audit requirements.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/03\/8.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3633\" title=\"8\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/03\/8.jpg\" alt=\"\" width=\"115\" height=\"105\"><\/a><strong>Databases insufficiently integrated into the backup strategy<\/strong><\/p>\n<p>To put it bluntly, many DBAs get quite precious about the data they&#8217;re tasked with administering and protecting. And thats entirely fair, too \u2013 structured data often represents a significant percentage of mission critical functionality within businesses.<\/p>\n<p>However, there&#8217;s nothing <em>special<\/em>&nbsp;about databases any more when it comes to data protection. They <em>should<\/em>&nbsp;be integrated into the data protection strategy. When they&#8217;re not, bad things can happen, such as:<\/p>\n<ul>\n<li>Database backups completing after filesystem backups have started, potentially resulting in database dumps not being adequately captured by the centralised backup product;<\/li>\n<li>Significantly higher amounts of primary storage being utilised to hold multiple copies of database dumps that could easily be stored in the backup system instead;<\/li>\n<li>When <em>cold<\/em>&nbsp;database backups are run, scheduled database restarts may result in data corruption if the filesystem backup has been slower than anticipated;<\/li>\n<li>Human error resulting in production databases not being protected for days, weeks or even months at a time.<\/li>\n<\/ul>\n<p>When you think about it, practically <em>all<\/em>&nbsp;data within an environment is special in some way or another. Mail data is special. Filesystem data is special. Archive data is special. Yet, in practically no organisation will administrators of those specific systems get such free reign over the data protection <em>activities<\/em>, keeping them silo&#8217;d off from the rest of the organisation.<\/p>\n<p><a href=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/03\/7.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3634\" title=\"7\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/03\/7.jpg\" alt=\"\" width=\"105\" height=\"114\"><\/a><strong>Growth not forecast<\/strong><\/p>\n<p>Backup systems are rarely static within an organisation. As primary data grows, so to does the backup system. As archive grows, the impact on the backup system can be a little more subtle, but there remains an impact.<\/p>\n<p>Some of the worst mistakes I&#8217;ve seen made in backup systems planning is assuming what is bought <em>today<\/em>&nbsp;for backup will be equally suitable for <em>next year<\/em>&nbsp;or a period of 3-5 years from now.<\/p>\n<p>Growth must not only be forecast for long-term planning within a backup environment, but regularly reassessed. It&#8217;s not possible, after all, to assume a linear growth pattern will remain constantly accurate; there will be spikes and troughs caused by new projects or business initiatives and decommissioning of systems.<\/p>\n<p><a href=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/03\/6.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3635\" title=\"6\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/03\/6.jpg\" alt=\"\" width=\"106\" height=\"115\"><\/a><strong>Zero error policies aren&#8217;t implemented<\/strong><\/p>\n<p>If you don&#8217;t have a zero error policy in place within your organisation for backups, you don&#8217;t actually have a backup <em>system<\/em>. You&#8217;ve just got a collection of backups that may or may not have worked.<\/p>\n<p>Zero error policies rigorously and reliably capture failures within the environment and maintain a structure for ensuring they are resolved, catalogued and documented for future reference.<\/p>\n<p><a href=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/03\/5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3638\" title=\"5\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/03\/5.jpg\" alt=\"\" width=\"109\" height=\"132\"><\/a><strong>Backups seen as a substitute for Disaster Recovery<\/strong><\/p>\n<p>Backups are <em>not<\/em>&nbsp;in themselves disaster recovery strategies; their processes without a doubt play into disaster recovery planning and a fairly important part, too.<\/p>\n<p>But having a backup system in place doesn&#8217;t mean you&#8217;ve got a disaster recovery strategy in place.<\/p>\n<p>The technology side of disaster recovery \u2013 particularly when we extend to full business continuity \u2013 doesn&#8217;t even approach <em>half<\/em>&nbsp;of what&#8217;s involved in disaster recovery.<\/p>\n<p><a href=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/03\/4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3639\" title=\"4\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/03\/4.jpg\" alt=\"\" width=\"97\" height=\"108\"><\/a><strong>New systems deployment not factoring in backups<\/strong><\/p>\n<p>One could argue this is an extension of growth and capacity forecasting, but in reality it&#8217;s more the case that these two issues will usually have a degree of overlap.<\/p>\n<p>As this is typically exemplified by organisations that don&#8217;t have formalised procedures, the easiest way to ensure new systems deployment allows for inclusion into backup strategies is to have build forms \u2013 where staff would not only request storage, RAM and user access, but also backup.<\/p>\n<p>To put it quite simply &#8211; no new system should be deployed within an organisation without at least <em>consideration<\/em>&nbsp;for backup.<\/p>\n<p><a href=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/03\/3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3640\" title=\"3\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/03\/3.jpg\" alt=\"\" width=\"92\" height=\"111\"><\/a><strong>No formalised media ageing policies<\/strong><\/p>\n<p>Particularly in environments that still have a lot of tape (either legacy or active), a backup system will have more physical components than just about everything else in the datacentre put together \u2013 i.e., all the media.<\/p>\n<p>In such scenarios, a regrettably common mistake is a lack of policies for dealing with cartridges as they age. In particular:<\/p>\n<ul>\n<li>Batch tracking;<\/li>\n<li>Periodic backup verification;<\/li>\n<li>Migration to new media as\/when required;<\/li>\n<li>Migration to new formats of media as\/when required.<\/li>\n<\/ul>\n<p>These tasks aren&#8217;t particularly enjoyable \u2013 there&#8217;s no doubt about that. However, they can be reasonably automated, and failure to do so can cause headaches for administrators down the road. Sometimes I suspect these policies aren&#8217;t enacted because in many organisations they represent a timeframe beyond the service time of the backup administrator. However, even if this <em>is<\/em>&nbsp;the case, it&#8217;s not an excuse, and in fact should point to a requirement quite the opposite.<\/p>\n<p>Failure to track media ageing is probably akin to deciding not to ever service your car. For a while, you&#8217;ll get away with it. As time goes on, you&#8217;re likely to run into bigger and bigger problems until something goes horribly wrong.<\/p>\n<p><a href=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/03\/2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3642\" title=\"2\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/03\/2.jpg\" alt=\"\" width=\"107\" height=\"115\"><\/a><strong>Backup is confused with archive<\/strong><\/p>\n<p>Backup is not archive.<\/p>\n<p>Archive is not backup.<\/p>\n<p>Treating the backup system as a substitute for archive is a headache for the simple reason that archive is about extending primary storage, whereas backup is about taking <em>copies<\/em>&nbsp;of primary storage data.<\/p>\n<p><a href=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/03\/1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3643\" title=\"1\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2012\/03\/1.jpg\" alt=\"\" width=\"101\" height=\"118\"><\/a><strong>Backup is seen as an IT function<\/strong><\/p>\n<p>While backup is undoubtedly managed and administered by IT staff, it remains a core business function. Like corporate insurance, it belongs to the central business, not only for budgetary reasons, but also continuance and alignment. If this isn&#8217;t the case yet, initial steps towards that shift can be achieved initially by ensuring there&#8217;s an information protection advisory council within the business \u2013 a grouping of IT staff <em>and<\/em>&nbsp;core business staff.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When I first started working with backup and recovery systems in 1996, one of the more frustrating statements I&#8217;d hear&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[3,5,16],"tags":[106,119,124,187,195,228,287,328,343,348,389,415,579,1250,767,844,846,896,945,1023,1127],"class_list":["post-3605","post","type-post","status-publish","format-standard","hentry","category-architecture","category-backup-theory","category-networker","tag-alignment","tag-archive","tag-attitudes","tag-business-continuity","tag-capacity","tag-cloning","tag-databases-2","tag-disaster-recovery","tag-dr","tag-duplication","tag-forecast","tag-growth","tag-media","tag-policies","tag-protection","tag-rpo","tag-rto","tag-sla","tag-strategies","tag-trending","tag-zero-error-policy"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pKpIN-W9","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/3605","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/comments?post=3605"}],"version-history":[{"count":1,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/3605\/revisions"}],"predecessor-version":[{"id":7484,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/3605\/revisions\/7484"}],"wp:attachment":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/media?parent=3605"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/categories?post=3605"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/tags?post=3605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}