Disaster Management Checklist For Cloud Computing Customers

Disaster Management Checklist

Last week I covered some aspects of disaster management on the cloud. I will continue where I left off and cover more details on the disaster planning part. Here is a checklist of things you must have for disaster planning and recovery.

  1. What are the emergency contact number and email addresse(s) of the cloud service provider (CSP)?
  2. Is there a backup account with another CSP? How soon can the backups be activated to restore services?
  3. Are the data and applications in the backup regularly updated?
  4. What is the minimum working subset that should be run until the system is fully restored? If this is an e-commerce website, then a tool to track customers’ existing purchases and a static page that states the website is down for maintenance could form the minimum working subset.
  5. Have you identified the contacts in various departments who will spearhead the disaster recovery process? For instance, the IT person identified in the list would start working on getting the backup servers activated, the HR contact would calm down the employees and appraise the situation, while the PR contact would start working on the press strategy in order to weather the storm. The people on this list should have undergone relevant training and should be able to handle the situation. This can reduce the chaos during major disruptions.
  6. Is there a stakeholder list that details who will be affected when each of the different cloud services goes down? For instance, if your email service goes down, then employees are the primary victims, while if your corporate website goes down, your customers are the primary victims. For each service, you need to prepare a list of stakeholders who will be impacted.
  7. Do you have a list of contacts at partner firms who must be alerted if the cloud service goes down? If you use multiple cloud services, have a separate contact list for each category of service.
  8. Are the customer service personnel prepared to handle such emergencies? The training could include providing standard responses without causing further panic, the ability to handle a barrage of questions from angry customers, and providing customers with alternative ways to do something, where applicable.
  9. Is the PR department ready for the emergency? Are they kept in the loop? Ideally, the PR team should work to calm down the atmosphere, by updating the press and customers, and dispelling any rumors.
  10. Are the communication tools to reach customers setup and maintained? It could be Twitter/Email/phone.

Do let us know what else would you have in your disaster planning checklist.

By Balaji Viswanathan

Sorry, comments are closed for this post.

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…