123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Business >> View Article

Guidelines For Designing Security For Backup And Recovery Operations

Profile Picture
By Author: Shirley Green
Total Articles: 129
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The elements of good backup operations are easy: back up the data MCSE 2003 exams to sound media, store it in a safe place, do these two things frequently, and audit the practice. But the elements of securing the backup process are much broader, and more choices must be made. Follow these guidelines when designing security for backup and recovery operations:
Ensure that personnel who perform backup are trained and understand their job.Audit their activity to ensure the job is being done correctly and securely.
Ensure secure storage, both off-site and on-site, for storage media.
Ensure that only authorized individuals can bring backup media on-site. This prevents a malicious or unqualified individual from using the media to restore old data over new, or from using backups to build new servers and then provide themselves access to sensitive data.
Ensure that media is transported in a comptia security+ secure fashion. Media should be permanently labeled. Media should be transported in locked containers.
Develop ...
... backup and restore strategies and test them.
Separate the user rights of backup and restore. By default, the Backup Operators group has both privileges. By separating these rights, you make sure that the person who backs up the data does not have privileges to restore the data. In this manner, you prevent a disgruntled employee from restoring old data over new.
Back up data on system and boot volumes and system state.Create an Automated System Recovery (ASR) data set backup when the operating system changes. Operating system changes include the addition of hardware and drivers and the installation of a service pack. If you have an ASR backup set,recovery will be easier. ASR protects only the system—a backup of data at th same time is required.
Create and use a backup log. Keep information on the date, media, any errors encountered, the results, and so forth.
Test backup processes by doing a trial restore. Restore to test machines in case recovery fails.
Do not disable the default volume shadow copy backup Network+ certification method. If you do, open files will not be backed up.

Total Views: 398Word Count: 339See All articles From Author

Add Comment

Business Articles

1. Unveiling The Material Characteristics Of Plastic Parts
Author: adam.xu

2. Top 5 Beach View Resorts In Chennai For A Memorable Getaway
Author: greenmeadows resort

3. Relationship Counselling Den Haag Brings The Best Chance To Understand Each Other’s Needs!
Author: Angelika Matthias

4. Web Development Company: Guide For Hiring The Best
Author: Sagar Tech

5. Make A Business Website To Get Started Online
Author: Sagar Tech

6. Elevate Your Software Quality With Agile Advisors: Premier Software Testing Consultancy In Dubai, Uae
Author: kohan

7. Affordable Polyester Pleated Mesh From Top Manufacturers
Author: pavitra

8. Empowering Sustainable Development: Agile Advisors As Your Trusted Leed Certification Consultant In Dubai And Uae
Author: kohan

9. Buy Cats Eye Gemstone Online In Ahmedabad
Author: rishabhjains

10. Why Data Destruction And Sanitisation Are Important
Author: Destruction and Sanitisation

11. Stock Market Update: शेयर बाजार में लगातार चौथे हफ्ते बढ़त: क्या तेजी बरकरार रहेगी? जाने इस हफ्ते किन महत्वपूर्ण पहलुओं पर ध्यान देना चाहिए
Author: M Ratlami

12. Perfect Happy New Year Gift For Your Girlfriend Thoughtful Ideas For 2024
Author: MyFlowerTree

13. China Valmax Valve Co., Ltd
Author: China Valmax Valve Co., Ltd.

14. Mastering Clipping Path In Photoshop: A Guide To Precision Editing
Author: Sam

15. Expert Emergency And Cosmetic Dental Care Services For Families And Individuals In St. Louis
Author: Jessica Williams

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: