Date Published: April 2002
Author(s)
William Burr (NIST), Joan Hash (NIST)
The key asset in Federal agencies today is the information and data used to implement, sustain and maintain critical government programs and operations. Current efforts in ensuring that the United States can recover and restore activities which have great impact on the physical and economic health and safety of the American public are dependent upon the ability to quickly reinstate information systems and the data required to run those systems. Effective Homeland security is dependent upon an extensive amount of corroboration and data sharing. It is essential that those managing information technology (IT) security programs ensure that they have put contingencies in place for quick restoration of IT resources. A Business Impact Analysis should be completed. As part of this process, mission critical operations should be identified along with the supporting data and systems. Subsequent to identification of these critical assets, methods for recovery of data and systems due to error or attack must be included in the overall Business Continuity Plan. This ITL Bulletin focuses on techniques for addressing this important component of contingency planning. The intent is to provide users with a quick reference primer on methods for data and system recovery.
The key asset in Federal agencies today is the information and data used to implement, sustain and maintain critical government programs and operations. Current efforts in ensuring that the United States can recover and restore activities which have great impact on the physical and economic health...
See full abstract
The key asset in Federal agencies today is the information and data used to implement, sustain and maintain critical government programs and operations. Current efforts in ensuring that the United States can recover and restore activities which have great impact on the physical and economic health and safety of the American public are dependent upon the ability to quickly reinstate information systems and the data required to run those systems. Effective Homeland security is dependent upon an extensive amount of corroboration and data sharing. It is essential that those managing information technology (IT) security programs ensure that they have put contingencies in place for quick restoration of IT resources. A Business Impact Analysis should be completed. As part of this process, mission critical operations should be identified along with the supporting data and systems. Subsequent to identification of these critical assets, methods for recovery of data and systems due to error or attack must be included in the overall Business Continuity Plan. This ITL Bulletin focuses on techniques for addressing this important component of contingency planning. The intent is to provide users with a quick reference primer on methods for data and system recovery.
Hide full abstract
Keywords
authentication; backup; contingency; data availability; encryption; encryption keys; key recovery
Control Families
None selected