3 Unknown Risks in Your Resiliency Armor
Check your disaster recovery practices to help optimize your team's performance.
By Rebecca Levesque01/01/2019
Everyone knows hardware is resilient and reliable, but only a small percentage of outages are true disasters. What about operational recovery? What about applications? Resiliency and recovery have made tremendous strides in the past 25 years. Yet with some applications, especially batch jobs, practitioners still follow 25-year-old backup and recovery methods. Who has the tribal knowledge to understand this now?
In our digital world, we expect everything to operate like a utility. If I flip the light switch I expect light to come on immediately. Yet, business resumption and resiliency plans do not operate at that speed. Recovery will take time that your business can’t afford. Why is any of this important? Time to data. Time is the most expensive, nonrenewable resource, and consumers in 2018 expect immediate service.
Here are 3 chinks in your resiliency armor:
- Remote recovery is not enough. Storage remote replication (e.g., Metro/Global Mirror, SRDF, HUR, etc.) only provides a single, point-in-time copy of your data for recovery. After investing in a remotely replicated environment for disaster recovery, management and application owners often think they’re recoverable from a corruption event that affects batch. Remote replication by itself does not provide protection. A corruption in a batch file will get replicated to the remote site in a few seconds or less.
- Tribal knowledge automation. Time to recovery depends on understanding the intricate data interdependencies known by the original application owner. We must take advantage of automation tools to speed and simplify recovery for our critical batch applications to meet business service-level agreement expectations.
- IT compliance and regulations. Understanding regulations that apply to your company is paramount to avoiding financial penalties for noncompliance. I often see two common mistakes: Sharing production and non-production data puts you at risk for Payment Card Industry noncompliance and not having a complete inventory of backups puts you at risk for Gramm-Leach-Bliley Act noncompliance.
My goal is bringing awareness and the ability to manage ever-increasing storage, close the gap in batch processing and make the mainframe practitioners’ job easier.