BME CLEARING s Business Continuity Policy

Size: px
Start display at page:

Download "BME CLEARING s Business Continuity Policy"

Transcription

1 BME CLEARING s Business Continuity Policy

2 Contents 1. Introduction 1 2. General goals of the Continuity Policy 1 3. Scope of BME CLEARING s Business Continuity Policy 1 4. Recovery strategies 2 5. Distribution of backup capacities 2 6. Clearing Services Functions supported 3 7. Clearing Information Technology Infrastructure Central system infrastructure Clearing machines and application Telecommunication and security equipment Central communication servers Access point infrastructure Telecommunication lines Telecommunication equipment Member Infrastructure Telecommunication lines and equipment Access servers Corporate services 5 8. Environment and physical installations 5 9. Training Plan and Continuity Tests Continuity Plans Revision Audit plans 6 Annex I. Options of redundancy in member infrastructure 7 ii

3 1. Introduction According to current regulations, this Business Continuity Policy has been approved by the BME Clearing board meeting held on 26 February The CEO is responsible for the general coordination of Business Continuity. Our company has three locations, two in Madrid and the other in Barcelona. In the preparation of the BCP, every effort has been made to provide those centres with the necessary capacity and resources so that in the event of a disaster in one centre the majority of functions can be assumed from another one. This document describes the main areas of the plan providing an overview of the strategies used in order to achieve the continuity of services. It does not contain personal details of the employees or specific names of resources. 2. General goals of the Continuity Policy The global objectives of the Business Continuity Policy at BME Clearing are: Ensure the safety and physical integrity of the employees. Minimise the impact of the emergency situation on the service to our members and clients. Faced with a disaster situation in either of the two central locations, obtain a rapid recovery of the critical services in the other location. Whenever viable, protect the equipment and other partially damaged or undamaged assets from greater harm. Return to normal operations in the affected location once the disaster situation has been dealt with. Achieve effective communication both in the procedure of notifying its employees and in notifying clients and members. Comply with the requirements of current legislation. 3. Scope of BME CLEARING s Business Continuity Policy The main business processes at BME Clearing are Margin Management and Daily Settlements. For both processes, BME Clearing analyses the risks, including their impact and probability. The result of the corresponding Business Impact Analysis is a key element to develop the specific Recovery Plans of the company. The Business Continuity Policy includes actions and procedures defined in detail in the specific recovery plans for the areas of the company. For each of these areas there is a plan manager and one or more recovery plans. The areas covered in this document are: Área Responsible Clearing Services COO Information Technology Infrastructures of UNIX Systems Responsible the Clearing Department Environment and Physical installations General Services Manager - Maintenance Some of the backup capacities envisaged are automatic, whilst others require manual intervention. In the latter case, minimising the time without service is essential aim of the plan. Several disaster situations are considered. For each scenario the triggering events are defined, as well as specific protection actions and measures for each level. When defining the emergency situations we have also taken into consideration the time period in which the contingency occurs. 1

4 4. Recovery strategies The recovery strategies at BME Clearing include: Alternative premises in the same geographical area, immediately accessible. Diversified Data Processing Centers, located in zones with different geographical risk profile, supporting the recovery of all critical infrastructures and services in an objective time of 15 minutes, and always under 4h as required by the corresponding regulations. Remote access for most of the staff. Personnel trained in critical business tasks. 5. Distribution of backup capacities The central systems are replicated in two locations, Barcelona and Madrid, which are separated by more than 500 kilometres. Other systems, with less criticality are replicated in two locations in the Madrid area, separated by 15 kilometres. The following table displays the distribution of the back-up capacity and the roles of each location normally, as well as the RPO (Recovery Point Objective) and RTO (Recovery Time Objective: Service of access point (communications with clients and members) Clearing Application Services Barcelona Madrid_1 Madrid_2 RPO RTO Active Active Active T Immediate Passive Active Not available Simulation Environment Not available Active Not available T 15 <4h - - Corporate Services Not available Active Passive T 4h Web Services Not available Active Passive T 4h Technical Service Helpdesk) Clearing Service Helpdesk) Support (Technical Support (Clearing Development of Applications Department Not available Active Passive T 2h Active Active Not available Active Passive Not available - - D-1 1 day In the above context, the term passive means that in normal conditions functionality is not implemented but the necessary infrastructure is in place for it to be implemented in the case of disaster. In the cases where the role of several centres is active, the capacity exists for automatic recovery in case of disaster. For the other services, a situation of disaster would imply a period without service during which actions would be carried out until operations have been re-established. 2

5 6. Clearing Services The contingency plan for the Clearing services is conceived so that in the case of disaster in BME CLEARING main location the critical functions can be done from the passive location during the period required to get back to normal. It is envisaged the transfer of personnel from one centre to the other in case it is required. 6.1 Functions supported Confirmation of margins Communication with Banco de España Management of daily risk in real time Management of transfers Consultation of clearing from previous day Management of expirations (deliveries) Management of splits Telephonic technical support The plan includes an inventory of technical equipment (hardware, applications and data) which have been duplicated in another location. In addition the tasks are defined and the frequency with which they would have to be executed to achieve that the plan functions correctly. The plan is reviewed each year. It is updated with each entry of new services or modification. 7. Clearing Information Technology Infrastructure The recovery plan for Clearing Information Technology covers the procedures of supervision, detection, notification, restoration and reestablishment after a disaster situation arises that can have an impact on hardware, telecommunication services and critical applications. As part of the program, training has also been included of technicians that manage the lines and communication equipment, the security systems and market applications. As general criteria, duplication of all elements is sought to avoid single points of failure, be it in the Member installations, in the access points or in the central locations. The most important components to protect are listed below and the mechanisms that would be implemented in the case of partial or complete disaster: 7.1 Central system infrastructure In the central installations automatic redundancy has been configured taking advantage of the duplication of equipment, in many cases with high availability configurations Clearing machines and application The hardware on which the clearing application runs is made up of the system hosts of clearing, the disk arrays and the removable storage units. The disk arrays are configured for tolerance to failures and maximum velocity in access using the RAID 5 system. At the Madrid site there are two of these machines with a local replication mechanism. In a normal state, the clearing application that runs in the machines in Madrid is the application that has the active role. The Barcelona machine is passive. Clearing information is stored in a database on a cluster in Madrid. An additional hot-standby replica of the database is located in Barcelona Telecommunication and security equipment Switches, routers and central firewalls. Systems duplicated on site and equipped with options 3

6 of automatic redundancy with additional backup at the other geographical location. The failure of an individual component would be completely transparent for the services. A contingency situation in one of the locations would trigger the switch to the equipment of the other central site Central communication servers They are the communication servers for systems used by members, quote vendors and internal personnel of the clearing support department. They have redundant connections with the clearing machines at both geographical locations, being able to switch from one to the other in the event of a hardware failure. 7.2 Access point infrastructure There are two access points in each one of the following cities: Barcelona, Bilbao, Madrid. The location of one of those nodes in Barcelona and one of the nodes in Madrid are those of the central hosts Telecommunication lines The two nodes in each city are interconnected. They are also connected with one of the nodes in Madrid, so that there are always two paths to access from any node to the central hosts. The telecommunication providers have been combined in order to avoid the dependence on a single provider for both paths Telecommunication equipment The routers use redundancy mechanisms based on HSRP whereby, should a fault occur in one of them, the other will take over the former s functions to ensure continuity of service. Switches are also replicated. The connections of access servers to the switches are distributed so that the failure of one of the switches does not imply a severe impact on the service as the servers connected to the other continue to function normally. Each member is assigned several access servers for third-party applications (API GATE) in different access points. The client application can implement automatic switchover mechanisms in case of problems accessing a node. 7.3 Member Infrastructure The components of the standard Member installation are duplicated, whereby in the event of failure of any device or line the Member can continue the operation without the need for intervention Telecommunication lines and equipment Two telecommunication lines are connected to two different access points and are contracted using distinct service providers whenever possible. Each line is connected to one of the routers. The routing protocol is configured so that the situations of a line failure are automatically solved. Switches and routers at the members sites have the same redundancy options as an access node Access servers The communications server Access establishes a TCP/IP connection with the access points through which it exchanges messages with the central systems. The Access server maintains a list of access points with a preference of connections associated to each one. The software of this communications server has the capacity to detect connection problems with its main access point and, if necessary, use the next access point on its list. 4

7 7.4 Corporate services In the context of this document, corporate services are those which, although they cannot be classified as extremely critical for the operation of the Clearing processes, could have an impact on the efficient response of employees to Members and clients if they were affected. Examples of these services would be: system Antivirus systems Access to corporate file servers Access to Internet navigation Access to databases and corporate programs Internal computer services: DNS, DHCP, Intranet The corporate network of BME has a single internal domain with various servers that act as domain controllers (DCs) and which are found in the central sites. The domain services like the Active Directory, DNS, DHCP and WEB are also distributed. The Contingency Plan for corporate services contains the events and conditions of failure that would trigger the procedures of actions under the specific continuity plan for this area, as well as information on the employees assigned management functions and responsible for activating the recovery program. 8. Environment and physical installations The facilities security group maintains the Emergency and Evacuation Plan and manages the technical means necessary to detect a disaster situation. The staff in charge of the Facilities Security maintains the control of the procedures describing the procedures to be done in case of a disaster situation, including the mechanisms for notifying the other plan managers and the links with the public authorities (police, fire service and local government). 9. Training Plan and Continuity Tests Conducting regular continuity tests helps ensure that the contingency plans are updated and effective whilst ensuring that all members of the recovery team are familiar with the plans. The testing program sets out how and when to test each element of the plan. Training in continuity procedures and execution of continuity tests follow the following criteria: The staff must be appropriately trained before executing the tests. Staff should rotate so that all members of the departments involved participate in the tests. Contingency tests cannot put at risk the normal operation of the systems. There will be a documented Contingency Test Plan. The contingency tests will be done at least once a year for all elements supporting critical business components. The test results will be appropriately documented. The test program covers the following: Individual components. They are tested with greater frequency. Examples: Electrical systems, central firewall equipment. Simulations to train personnel that manage the crisis in their respective roles. Tests of resources and service providers. Example: Tests with telecommunication lines. 5

8 10. Continuity Plans Revision The continuity plan in BME CLEARING is a continuous process that develops with the introduction of new technologies, the results of disaster simulations, the experience of its technical personnel and management, and through the on-going training of employees involved in the plan. The plans must be reviewed: Every time there is a significant change in any of the Business Critical Services. When new risks are identified in the Business Impact Analysis. At least once a year a review of the recovery plans will be performed. After Continuity Plan audits, in case there are recommendations. The responsible for the plan will report to the CEO any revision made to the plans. 11. Audit plans The administrative aspects of the processes included in BME CLEARING S BCP such as the structure, content, measures and the documentation concerning control procedures are audited each year. These reviews are carried out by an independent firm. 6

9 Annex I. Options of redundancy in member infrastructure Access Point 1 Prefered: BAS 1 Backup: BAS 2 MEFF Site 1 6 Member Site 1 Member Network MEFF Network at Member Premises 5 Exchange Clients Ethernet Link Router A Leased Line Access Point Server 1 (APS 1) Backend Access Server 1 (BAS 1) Exchange Clients HSRP Protocol (Virtual IP Address) Ethernet Link Router B Leased Line Access Point 2 Prefered: BAS 2 Backup: BAS 1 MEFF Site 2 Access Point Server 2 (APS 2) Backend Access Server 2 (BAS 2) 1. Redundant links with the Member network and only one virtual IP address as port of link to the MEFF network 2. Routers duplicated 3. Lines duplicated, different suppliers and connected to different access points 4. Line between access points allows communication with the backup central system in the case of failure on the line that connects with the main centre 5. The Exchange Clients in Member installation can connect to any of the servers of the access points 6. The Back-end servers are replicated in separate central sites 7. Duplicated high speed lines provided by different suppliers between the central sites. 7

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity Security+ Guide to Network Security Fundamentals, Third Edition Chapter 13 Business Continuity Objectives Define business continuity Describe the components of redundancy planning List disaster recovery

More information

INFORMATION SECURITY- DISASTER RECOVERY

INFORMATION SECURITY- DISASTER RECOVERY Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy

More information

SAMPLE REPORT. Business Continuity Gap Analysis Report. Prepared for XYZ Business by CSC Business Continuity Services Date: xx/xx/xxxx

SAMPLE REPORT. Business Continuity Gap Analysis Report. Prepared for XYZ Business by CSC Business Continuity Services Date: xx/xx/xxxx SAMPLE REPORT Business Continuity Gap Analysis Report Prepared for XYZ Business by CSC Business Continuity Services Date: xx/xx/xxxx COMMERCIAL-IN-CONFIDENCE PAGE 1 OF 11 Contact Details CSC Contacts CSC

More information

Introduction to Business continuity Planning

Introduction to Business continuity Planning Week - 06 Introduction to Business continuity Planning 1 Introduction The purpose of this lecture is to give an overview of what is Business Continuity Planning and provide some guidance and resources

More information

IT CONTINUITY, BACKUP AND RECOVERY POLICY

IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption

More information

L18: Integrate Control Disciplines to Increase Control and Save Money

L18: Integrate Control Disciplines to Increase Control and Save Money L18: Integrate Control Disciplines to Increase Control and Save Money Kathleen Lucey, FBCI Montague Risk kalucey@montaguetm.com tel: 1.516.676.9234 Connections Information Security (computer security,

More information

DISASTER RECOVERY PRIMER

DISASTER RECOVERY PRIMER DISASTER RECOVERY PRIMER 1 Site Faliure Occurs Power Faliure / Virus Outbreak / ISP / Ransomware / Multiple Servers Sample Disaster Recovery Process Site Faliure Data Centre 1: Primary Data Centre Data

More information

Rediffmail Enterprise High Availability Architecture

Rediffmail Enterprise High Availability Architecture Rediffmail Enterprise High Availability Architecture Introduction Rediffmail Enterprise has proven track record of 99.9%+ service availability. Multifold increase in number of users and introduction of

More information

BCM Program Development

BCM Program Development BCM Program Development Course Description: The BCM Program Development course provides you with knowledge to develop an auditable and actionable business continuity program for your organization. This

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting

More information

I. PURPOSE III. PROCEDURE

I. PURPOSE III. PROCEDURE A.R. Number: 2.11 Effective Date: 2/1/2009 Page: 1 of 5 I. PURPOSE This policy outlines the procedures that third party organizations must follow when connecting to the City of Richmond (COR) networks

More information

Module 4 STORAGE NETWORK BACKUP & RECOVERY

Module 4 STORAGE NETWORK BACKUP & RECOVERY Module 4 STORAGE NETWORK BACKUP & RECOVERY BC Terminology, BC Planning Lifecycle General Conditions for Backup, Recovery Considerations Network Backup, Services Performance Bottlenecks of Network Backup,

More information

April Appendix 3. IA System Security. Sida 1 (8)

April Appendix 3. IA System Security. Sida 1 (8) IA System Security Sida 1 (8) Table of Contents 1 Introduction... 3 2 Regulatory documents... 3 3 Organisation... 3 4 Personnel security... 3 5 Asset management... 4 6 Access control... 4 6.1 Within AFA

More information

1 Data Center Requirements

1 Data Center Requirements 1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider

More information

WHITE PAPER- Managed Services Security Practices

WHITE PAPER- Managed Services Security Practices WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to

More information

Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) Cloud Services

Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) Cloud Services 9628-08 Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) 9628-808 Cloud Services Sample question paper Duration: 60 minutes Candidate s name: Candidate s

More information

DATA BACKUP AND RECOVERY POLICY

DATA BACKUP AND RECOVERY POLICY DATA BACKUP AND RECOVERY POLICY 4ITP04 Revision 01 TABLE OF CONTENTS 1. REVISION RECORD... 3 2. PURPOSE... 4 3. SCOPE AND APPLICABILITY... 4 4. DEFINITIONS AND ABBREVIATIONS... 4 5. POLICY STATEMENTS...

More information

BUSINESS CONTINUITY. Topics covered in this checklist include: General Planning

BUSINESS CONTINUITY. Topics covered in this checklist include: General Planning BUSINESS CONTINUITY Natural and manmade disasters are happening with alarming regularity. If your organization doesn t have a great business continuity plan the repercussions will range from guaranteed

More information

APNIC DNSSEC APNIC DNSSEC. Policy and Practice Statement. DNSSEC Policy and Practice Statement Page 1 of 12

APNIC DNSSEC APNIC DNSSEC. Policy and Practice Statement. DNSSEC Policy and Practice Statement Page 1 of 12 APNIC DNSSEC Policy and Practice Statement DNSSEC Policy and Practice Statement Page 1 of 12 Table of Contents Overview 4 Document name and identification 4 Community and applicability 4 Specification

More information

SAS SOLUTIONS ONDEMAND

SAS SOLUTIONS ONDEMAND DECEMBER 4, 2013 Gary T. Ciampa SAS Solutions OnDemand Advanced Analytics Lab Birmingham Users Group, 2013 OVERVIEW SAS Solutions OnDemand Started in 2000 SAS Advanced Analytics Lab (AAL) Created in 2007

More information

Information. Technology. Annual Report

Information. Technology. Annual Report Information 2016 Technology Annual Report Information Technology Table of Contents Division Personnel 2 Mission Statement & Core Values 2 Technical Support 3 System Integration 4 Infrastructure 4-6 WARCOG

More information

Business Continuity Management Standards A Side-by-Side Comparison

Business Continuity Management Standards A Side-by-Side Comparison Business Continuity Standards A Side-by-Side Comparison By Brian Zawada (CBCP) & Jared Schwartz (CBCP) Whether your organization has begun a grassroots initiative to develop a business continuity plan

More information

Template. IT Disaster Recovery Planning: A Template

Template. IT Disaster Recovery Planning: A Template Template IT Disaster Recovery Planning: A Template When disaster strikes, business suffers. A goal of business planning is to mitigate disruption of product and services delivery to the greatest degree

More information

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business

More information

Specifications for WebDocs On-Demand

Specifications for WebDocs On-Demand Specifications for WebDocs On-Demand WebDocs On-Demand helps you find, control, optimize and protect all of your documents, including scanned paper documents, faxes, emails and electronic forms. All content

More information

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Network Security Policy

Network Security Policy Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business

More information

Infocomm Professional Development Forum 2011

Infocomm Professional Development Forum 2011 Infocomm Professional Development Forum 2011 1 Agenda Brief Introduction to CITBCM Certification Business & Technology Impact Analysis (BTIA) Workshop 2 Integrated end-to-end approach in increasing resilience

More information

Data Backup and Contingency Planning Procedure

Data Backup and Contingency Planning Procedure HIPAA Security Procedure HIPAA made Easy Data Backup and Contingency Planning Procedure Please fill in date implemented and updates for your facility: Goal: This document will serve as our back-up storage

More information

INFORMATION TECHNOLOGY ( IT ) GOVERNANCE FRAMEWORK

INFORMATION TECHNOLOGY ( IT ) GOVERNANCE FRAMEWORK INFORMATION TECHNOLOGY ( IT ) GOVERNANCE FRAMEWORK 1. INTRODUCTION The Board of Directors of the Bidvest Group Limited ( the Company ) acknowledges the need for an IT Governance Framework as recommended

More information

Network Performance, Security and Reliability Assessment

Network Performance, Security and Reliability Assessment Network Performance, Security and Reliability Assessment Presented to: CLIENT NAME OMITTED Drafted by: Verteks Consulting, Inc. 2102 SW 20 th Place, Suite 602 Ocala, Fl 34474 352-401-0909 ASSESSMENT SCORECARD

More information

Policy Document. PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy

Policy Document. PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy Policy Title: Binder Association: Author: Review Date: Pomeroy Security Principles PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy Joseph Shreve September of each year or as required Purpose:...

More information

Global Statement of Business Continuity

Global Statement of Business Continuity Business Continuity Management Version 1.0-2017 Date January 25, 2017 Status Author Business Continuity Management (BCM) Table of Contents 1. Credit Suisse Business Continuity Statement 3 2. BCM Program

More information

Disaster Recovery and Business Continuity Planning (Mile2)

Disaster Recovery and Business Continuity Planning (Mile2) Disaster Recovery and Business Continuity Planning (Mile2) Course Number: DRBCP Length: 4 Day(s) Certification Exam This course will help you prepare for the following exams: ABCP: Associate Business Continuity

More information

Information technology Security techniques Information security controls for the energy utility industry

Information technology Security techniques Information security controls for the energy utility industry INTERNATIONAL STANDARD ISO/IEC 27019 First edition 2017-10 Information technology Security techniques Information security controls for the energy utility industry Technologies de l'information Techniques

More information

EA-ISP Business Continuity Management and Planning Policy

EA-ISP Business Continuity Management and Planning Policy Technology & Information Services EA-ISP-002 - Business Continuity Management and Planning Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 06/03/2017 Document Security Level: PUBLIC Document

More information

Appendix 3 Disaster Recovery Plan

Appendix 3 Disaster Recovery Plan Appendix 3 Disaster Recovery Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A3-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision

More information

Chapter 8: IT Service Management. Topics covered: 1.1 Roles of helpdesk support staff. 1.2 Different types of helpdesk support level

Chapter 8: IT Service Management. Topics covered: 1.1 Roles of helpdesk support staff. 1.2 Different types of helpdesk support level 1 Chapter 8: IT Service Management Topics covered: 1.1 Roles of helpdesk support staff 1.2 Different types of helpdesk support level 1.3 Role of Internet Service Provider (ISP) 1.4 Change request process

More information

Business Continuity & Disaster Recovery

Business Continuity & Disaster Recovery Business Continuity & Disaster Recovery Technology and Process Alessio Di Benedetto Presales Manager Roma, 7 th of May 2010 1 Objectives The objective of this workshop is to provide: an overview of the

More information

Data Recovery Policy

Data Recovery Policy Data Recovery Policy The Marketware, Inc. Contingency Plan establishes procedures to recover Marketware, Inc. following a disruption resulting from a disaster. This Disaster Recovery Policy is maintained

More information

Introduction To IS Auditing

Introduction To IS Auditing Introduction To IS Auditing Instructor: Bryan McAtee, ASA, CISA Bryan McAtee & Associates - Brisbane, Australia * Course, Presenter and Delegate Introductions * Definition of Information Technology (IT)

More information

Business Continuity Plan Executive Overview

Business Continuity Plan Executive Overview Business Continuity Plan Executive Overview In terms of business continuity and disaster recovery planning, Harland Clarke s mission is to ensure the availability of critical business functions and Information

More information

Leveraging ITIL to improve Business Continuity and Availability. itsmf Conference 2009

Leveraging ITIL to improve Business Continuity and Availability. itsmf Conference 2009 Leveraging ITIL to improve Business Continuity and Availability Samuel Lo MBA, MSc, CDCP, PMP, CISSP, CISA Data Centre Services Manager COL Limited Strictly Business itsmf Conference 2009 25 February 2009

More information

HIPAA Compliance and OBS Online Backup

HIPAA Compliance and OBS Online Backup WHITE PAPER HIPAA Compliance and OBS Online Backup Table of Contents Table of Contents 2 HIPAA Compliance and the Office Backup Solutions 3 Introduction 3 More about the HIPAA Security Rule 3 HIPAA Security

More information

BME CO-LOCATION SERVICE DESCRIPTION

BME CO-LOCATION SERVICE DESCRIPTION BME CO-LOCATION SERVICE DESCRIPTION January 2018 Co-Location is an optimized solution for collocating trading applications, built and managed by BME. o Available space The BME Data Center meets the highest

More information

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable?

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable? Introduction Controlling Information Systems When computer systems fail to work as required, firms that depend heavily on them experience a serious loss of business function. M7011 Peter Lo 2005 1 M7011

More information

INFORMATION TECHNOLOGY Annual Report

INFORMATION TECHNOLOGY Annual Report INFORMATION TECHNOLOGY 2014 Annual Report Information Technology Table of Contents Department Personnel 2 Mission Statement & Core Values 2 Technical Support 3 System Integration 4 Infrastructure 4-6 Web

More information

Business Continuity Plan (BCP) in Case of an Emergency

Business Continuity Plan (BCP) in Case of an Emergency Business Continuity Plan (BCP) in Case of an Emergency As of December 22, 2016 Japan Securities Clearing Corporation In order to fulfill our roles as a cross-market clearing organization in Japan, JSCC

More information

HIPAA Security and Privacy Policies & Procedures

HIPAA Security and Privacy Policies & Procedures Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400

More information

Information Technology Disaster Recovery Planning Audit Redacted Public Report

Information Technology Disaster Recovery Planning Audit Redacted Public Report 1200, Scotia Place, Tower 1 10060 Jasper Avenue Edmonton, Alberta T5J 3R8 edmonton.ca/auditor Information Technology Disaster Recovery Planning Audit Redacted Public Report June 12, 2018 City of Edmonton

More information

Disaster Recovery Planning: Weighing your customer s options

Disaster Recovery Planning: Weighing your customer s options Disaster Recovery Planning: Weighing your Even though backing up data and developing a plan to restore it isn't the first step in business continuity planning (BCP), it's still a cornerstone. Without a

More information

Canada Life Cyber Security Statement 2018

Canada Life Cyber Security Statement 2018 Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability

More information

CITY OF MONTEBELLO SYSTEMS MANAGER

CITY OF MONTEBELLO SYSTEMS MANAGER CITY OF MONTEBELLO 109A DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

After the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning

After the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning After the Attack Business Continuity Week 6 Part 2 Staying in Business Disaster Recovery Planning and Testing Steps Business continuity is a organization s ability to maintain operations after a disruptive

More information

Table of Contents. Sample

Table of Contents. Sample TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 4 1.1 GOALS AND OBJECTIVES... 5 1.2 REQUIRED REVIEW... 5 1.3 APPLICABILITY... 5 1.4 ROLES AND RESPONSIBILITIES SENIOR MANAGEMENT AND BOARD OF DIRECTORS...

More information

Policy and Procedure: SDM Guidance for HIPAA Business Associates

Policy and Procedure: SDM Guidance for HIPAA Business Associates Policy and Procedure: SDM Guidance for HIPAA Business (Adapted from UPMC s Guidance for Business at http://www.upmc.com/aboutupmc/supplychainmanagement/documents/guidanceforbusinessassociates.pdf) Effective:

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated

More information

White Paper. How to select a cloud disaster recovery method that meets your requirements.

White Paper. How to select a cloud disaster recovery method that meets your requirements. How to select a cloud disaster recovery method that meets your requirements. VS Table of contents Table of contents Page 2 Executive Summary Page 3 Introduction Page 3 Disaster Recovery Methodologies Page

More information

ZyLAB delivers a SaaS solution through its partner data center provided by Interoute and through Microsoft Azure.

ZyLAB delivers a SaaS solution through its partner data center provided by Interoute and through Microsoft Azure. Security In today s world, the requirement to focus on building secure solutions and infrastructure has become an important part of the value that businesses deliver to customers and resellers. This document

More information

3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007

3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007 3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007 Fault tolerance refers to the capability of a computer or network to continue to function when some component fails. Disk fault tolerance refers

More information

Continuity of Business

Continuity of Business White Paper Continuity of Business SAS Continuity of Business initiative reflects our commitment to our employees, to our customers, and to all of the stakeholders in our global business community to be

More information

Network Code on Emergency and Restoration - Implementation Guide for the Communication Systems Requirements. Final VERSION

Network Code on Emergency and Restoration - Implementation Guide for the Communication Systems Requirements. Final VERSION Network Code on Emergency and Restoration - Implementation Guide for the Communication Systems Requirements Final VERSION September 2018 1 TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 COMMUNICATION SYSTEM

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2 APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,

More information

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC

More information

Cisco Secure Ops Solution

Cisco Secure Ops Solution Brochure Cisco Secure Ops Solution Cisco Secure Ops Solution supports cyber-security risk management and compliance for industrial automation environments. It is a combination of on premise technology,

More information

Cybersecurity Overview

Cybersecurity Overview Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where

More information

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare INFORMATION SECURITY A briefing on the information security controls at Computershare One line heading > One line subheading INTRODUCTION Information is critical to all of our clients and is therefore

More information

Data Center Operations Guide

Data Center Operations Guide Data Center Operations Guide SM When you utilize Dude Solutions Software as a Service (SaaS) applications, your data is hosted in an independently audited data center certified to meet the highest standards

More information

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies: ESF Coordinator: Homeland Security/National Protection and Programs/Cybersecurity and Communications Primary Agencies: Homeland Security/National Protection and Programs/Cybersecurity and Communications

More information

EMC CLARiiON CX3-40. Reference Architecture. Enterprise Solutions for Microsoft Exchange 2007

EMC CLARiiON CX3-40. Reference Architecture. Enterprise Solutions for Microsoft Exchange 2007 Enterprise Solutions for Microsoft Exchange 2007 EMC CLARiiON CX3-40 Metropolitan Exchange Recovery (MER) for Exchange Server Enabled by MirrorView/S and Replication Manager Reference Architecture EMC

More information

PretaGov Australia SaaS Hosting with Fully Managed Services, Support and Maintenance

PretaGov Australia SaaS Hosting with Fully Managed Services, Support and Maintenance PretaGov Australia SaaS Hosting with Fully Managed Services, Support and Maintenance Introduction to PretaGov PretaGov operates a Government Community Plone CMS (content management system) SaaS Cloud exclusively

More information

DATABASE ADMINISTRATOR

DATABASE ADMINISTRATOR DATABASE ADMINISTRATOR Department FLSA Status Reports To Supervises Information Technology Exempt IT Director N/A DISTINGUISHING CHARACTERISTICS: The principal function of an employee in this class is

More information

REPORT 2015/149 INTERNAL AUDIT DIVISION

REPORT 2015/149 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results

More information

2 ESF 2 Communications

2 ESF 2 Communications 2 ESF 2 Communications THIS PAGE LEFT BLANK INTENTIONALLY Table of Contents 1 Introduction... 1 1.1 Purpose and Scope... 1 1.2 Relationship to Other ESF Annexes... 1 1.3 Policies and Agreements... 1 2

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

Business Continuity Plan

Business Continuity Plan Business Continuity Plan Business & Organizational Chart Boursa Investment Advisors Inc. (BRSA) is a fully disclosed broker-dealer registered in the state of California, Minnesota, Nevada & Washington.

More information

Business continuity management and cyber resiliency

Business continuity management and cyber resiliency Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Business continuity management and cyber resiliency Introductions Eric Wunderlich,

More information

MassMutual Business Continuity Disclosure Statement

MassMutual Business Continuity Disclosure Statement MassMutual Business Continuity Disclosure Statement Overview Resiliency is a high priority at Massachusetts Mutual Life Insurance Company ( MassMutual or the Company ). To that end, significant investments

More information

The Project Charter. Date of Issue Author Description. Revision Number. Version 0.9 October 27 th, 2014 Moe Yousof Initial Draft

The Project Charter. Date of Issue Author Description. Revision Number. Version 0.9 October 27 th, 2014 Moe Yousof Initial Draft The Project Charter Project Title: VDI Data Center Design and Build Project Sponsor: South Alberta Data Centers Inc. (SADC Inc.) Project Customer: The City of Calgary Project Manager: Moe Yousof Document

More information

ISO/IEC TR TECHNICAL REPORT

ISO/IEC TR TECHNICAL REPORT TECHNICAL REPORT ISO/IEC TR 27019 First edition 2013-07-15 Information technology Security techniques Information security management guidelines based on ISO/IEC 27002 for process control systems specific

More information

Business Resiliency in the Cloud: Reality or Hype?

Business Resiliency in the Cloud: Reality or Hype? Business Resiliency in the Cloud: Reality or Hype? Karen Jaworski Senior Director, Product Marketing EVault, a Seagate Company 8/10/2012 2012 EVault, Inc. All Rights Reserved 1 Who is EVault? Cloud-Connected

More information

Ensure that all windows servers are patched and virus checked to the correct levels and that changes are made in line with ISO standards

Ensure that all windows servers are patched and virus checked to the correct levels and that changes are made in line with ISO standards Job description and person specification Senior ICT Officer Reports to: ICT Manager Purpose This role supports the provision of a high quality and measurable ICT infrastructure support service whilst delivering

More information

CANVAS DISASTER RECOVERY PLAN AND PROCEDURES

CANVAS DISASTER RECOVERY PLAN AND PROCEDURES CANVAS DISASTER RECOVERY PLAN AND PROCEDURES Instructure Security, Engineering, and Operations INSTRUCTURE, INC. 6330 South 3000 East Salt Lake City, Utah 84121 Table of Contents Disaster Plan and Procedures...

More information

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

Disaster Recovery Planning: Is Your Plan in Place? Presented by: Steve Shofner, CISA, CGEIT

Disaster Recovery Planning: Is Your Plan in Place? Presented by: Steve Shofner, CISA, CGEIT Disaster Recovery Planning: Is Your Plan in Place? Presented by: Steve Shofner, CISA, CGEIT 1 The material appearing in this presentation is for informational purposes only and is not legal or accounting

More information

SIMATIC PCS 7 V6.1 + SP1. Redundancy and fault tolerance with PCS 7. Redundancy and fault tolerance with PCS 7. Topics

SIMATIC PCS 7 V6.1 + SP1. Redundancy and fault tolerance with PCS 7. Redundancy and fault tolerance with PCS 7. Topics SIMATIC PCS 7 V6.1 + SP1 Redundancy and fault tolerance with PCS 7 SIMATIC PCS 7 V6.1 + SP1 Siemens AG Slide 1 Introduction and Overview Process control systems are responsible for controlling, monitoring

More information

NEN The Education Network

NEN The Education Network NEN The Education Network School e-security Checklist This checklist sets out 20 e-security controls that, if implemented effectively, will help to ensure that school networks are kept secure and protected

More information

WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY

WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY White Paper 2 Why Building Security Systems Need Continuous Availability Always On Is the Only Option. If All Systems Go Down, How Can You React

More information

Natural Disaster Preparation Checklist

Natural Disaster Preparation Checklist Natural Disaster Preparation Checklist Weather patterns are clearly changing and natural disasters are becoming more frequent. In 2017, Hurricanes Harvey, Irma, and Maria devastated areas in the United

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

Severn Trent Water. Telecommunications Policy and Access Procedure

Severn Trent Water. Telecommunications Policy and Access Procedure Severn Trent Water Telecommunications Policy and Access Procedure Contents STW Telecommunications Policy: 5-12 Health and Safety: 13-18 Access Procedures:19-30 2 STW LSH Sites Access Policy [Controlled

More information

Physical and Environmental Security Standards

Physical and Environmental Security Standards Physical and Environmental Security Standards Table of Contents 1. SECURE AREAS... 2 1.1 PHYSICAL SECURITY PERIMETER... 2 1.2 PHYSICAL ENTRY CONTROLS... 3 1.3 SECURING OFFICES, ROOMS AND FACILITIES...

More information

Disaster Recovery Webinar August 11, 2015

Disaster Recovery Webinar August 11, 2015 Disaster Recovery Webinar August 11, 2015 SPEAKERS Marcelo Oliveira, Product Director, Cable & Wireless Marcelo has several years of experience in Information Technology, having worked with organizations

More information

ADIENT VENDOR SECURITY STANDARD

ADIENT VENDOR SECURITY STANDARD Contents 1. Scope and General Considerations... 1 2. Definitions... 1 3. Governance... 2 3.1 Personnel... 2 3.2 Sub-Contractors... 2 3.3. Development of Applications... 2 4. Technical and Organizational

More information

Dude Solutions Business Continuity Overview

Dude Solutions Business Continuity Overview Dude Solutions Business Continuity Overview Table of Contents Overview.... 2 Primary and Disaster Recovery Data Centers.... 2 Network Infrastructure.... 3 Emergency Processes.... 3 Power and Cooling Systems....

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information