ebook img

Data Protection: Ensuring Data Availability PDF

423 Pages·2017·6.316 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Data Protection: Ensuring Data Availability

Data Protection Ensuring Data Availability Data Protection Ensuring Data Availability Preston de Guise CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2017 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed on acid-free paper Version Date: 20161123 International Standard Book Number-13: 978-1-4822-4415-1 This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have also attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com Dedication For Daz Contents Preface....................................................................................................................xvii Acknowledgments ...................................................................................................xix Author .....................................................................................................................xxi Chapter 1 Introduction ..........................................................................................1 1.1 T he Lay of the Land ..................................................................2 1.2 W hat Are You Doing Here? ......................................................2 1.3 W hat’s Changed in the Datacenter? ..........................................3 1.4 W hat Is Data Protection? ...........................................................4 1.5 K ey Challenges ..........................................................................5 1.5.1 Rise of Unstructured Data ............................................5 1.5.2 Big Data ........................................................................7 1.5.3 Cloud ............................................................................7 1.5.4 Virtualization ...............................................................8 1.5.5 The Law ........................................................................8 1.5.6 Crime ............................................................................9 1.6 A Brief History of Data Protection ...........................................9 1.7 T he Miserly Hoarder ...............................................................14 Chapter 2 Contextualizing Data Protection ........................................................17 2.1 I ntroduction .............................................................................17 2.2 D ata Classification ...................................................................18 2.2.1 What Is the Data? .......................................................19 2.2.2 Where Is the Data? .....................................................21 2.2.3 Who Uses the Data? ...................................................22 2.2.4 When Is the Data Used? .............................................22 2.2.5 How Is the Data Used? ...............................................23 2.3 P rotection Methodology ..........................................................24 2.4 P rotection versus Regeneration ...............................................24 2.5 O rganizational Change ............................................................25 2.6 S ummary .................................................................................26 Chapter 3 Data Life Cycle ...................................................................................27 3.1 I ntroduction .............................................................................27 3.2 A rchiving and Deleting ...........................................................29 3.3 S ummary .................................................................................37 vii viii Contents Chapter 4 Elements of a Protection System ........................................................39 4.1 Introduction .............................................................................39 4.2 People ......................................................................................39 4.2.1 Designers ....................................................................40 4.2.2 Operators ....................................................................40 4.2.3 End Users ...................................................................41 4.2.4 Data Protection Team .................................................42 4.3 Training ...................................................................................42 4.4 Documentation and Processes .................................................43 4.4.1 Design .........................................................................44 4.4.2 Implementation ...........................................................45 4.4.2.1 System Configuration Guide .......................45 4.4.2.2 System Map ................................................46 4.5 Testing .....................................................................................50 4.5.1 Type Testing ...............................................................50 4.5.2 Informal versus Formal ..............................................52 4.5.2.1 Test Procedure ............................................53 4.5.2.2 Test Register................................................53 4.5.2.3 Test Schedule ..............................................53 4.5.3 Performance Testing ...................................................54 4.5.4 Test Risks ...................................................................57 4.5.5 What Is a Test? ...........................................................58 4.6 Service Level Agreements .......................................................58 4.7 Technology ..............................................................................59 4.8 Summary .................................................................................60 Chapter 5 IT Governance and Data Protection ...................................................61 5.1 Introduction .............................................................................61 5.2 Architecture .............................................................................61 5.2.1 Integrity ......................................................................62 5.2.2 Reliability ...................................................................63 5.2.3 Recoverability ............................................................64 5.2.4 Data Protection Advocate ...........................................64 5.3 Service Transition ....................................................................66 5.4 Change Management ...............................................................69 5.5 Summary .................................................................................70 Chapter 6 Monitoring and Reporting ..................................................................71 6.1 Overview .................................................................................71 6.2 Monitoring ...............................................................................73 6.2.1 Health .........................................................................74 6.2.1.1 Drive Failures and Recovery Time .............74 6.2.1.2 Broader Uses of MTBF and MTTR ...........75 Contents ix 6.2.2 Capacity ......................................................................75 6.2.2.1 RAID/Data Storage ....................................75 6.2.2.2 Snapshots ....................................................77 6.2.2.3 Replication ..................................................77 6.2.2.4 Backup and Recovery .................................78 6.2.3 Performance ...............................................................80 6.3 Reporting .................................................................................80 6.3.1 Reporting as Monitoring Aggregation .......................80 6.3.2 Reporting for Trending and Predictive Planning .......81 6.3.3 Automated Reporting .................................................85 6.4 Monitoring and Reporting SLA Compliance ..........................85 6.5 Summary .................................................................................86 Chapter 7 Business Continuity ............................................................................87 7.1 Introduction .............................................................................87 7.2 Business versus IT Functions ..................................................87 7.3 Risk versus Cost ......................................................................88 7.4 Planning Data Protection Strategies and Service Level Objectives ................................................................................90 7.5 Summary .................................................................................94 Chapter 8 Data Discovery ...................................................................................95 8.1 Introduction .............................................................................95 8.2 What Will Be Protected? .........................................................96 8.3 Shades of Data .........................................................................98 8.4 Indexing ...................................................................................99 8.5 Closing Remarks ...................................................................100 Chapter 9 Continuous Availability and Replication .........................................101 9.1 Introduction ...........................................................................101 9.1.1 What’s a Few Nines between Friends? .....................101 9.1.2 Data Protection and Availability ..............................103 9.2 Continuous Availability .........................................................104 9.2.1 Clustering .................................................................104 9.2.2 Continuous Availability as a Virtualization Function ....................................................................105 9.2.3 Continuous Availability as a Storage Function ........107 9.2.4 A Combined Approach to Continuous Availability ....108 9.3 Replication .............................................................................109 9.3.1 Synchronous Replication ..........................................112 9.3.2 Asynchronous Replication .......................................113 9.4 Summary ...............................................................................116

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.