{"id":36690,"date":"2021-05-24T15:33:58","date_gmt":"2021-05-24T15:33:58","guid":{"rendered":"https:\/\/www.vmengine.net\/2021\/05\/24\/disaster-recovery-how-much-is-a-contingency-plan-worth\/"},"modified":"2025-05-23T17:31:41","modified_gmt":"2025-05-23T17:31:41","slug":"disaster-recovery-how-much-is-a-contingency-plan-worth","status":"publish","type":"post","link":"http:\/\/54.220.100.23\/en\/2021\/05\/24\/disaster-recovery-how-much-is-a-contingency-plan-worth\/","title":{"rendered":"Disaster Recovery. How much is a &#8220;contingency&#8221; plan worth?"},"content":{"rendered":"<div class=\"et_pb_section et_pb_section_293 et_section_regular\" >\n<div class=\"et_pb_row et_pb_row_391\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_397  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_1071  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">Disaster Recovery and Business Continuity. Details on the different strategies to deal with a possible emergency and avoid damage to your business. <\/div>\n<\/p><\/div>\n<div class=\"et_pb_module et_pb_image et_pb_image_299 et_animated et-waypoint\">\n<p>\t\t\t\t<span class=\"et_pb_image_wrap \"><img decoding=\"async\" src=\"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2021\/05\/datacenter-hackerato-2.jpg\" alt=\"\" title=\"Endangered, hacked Server room interior in datacenter, red lights. 3D Render\"  sizes=\"(max-width: 740px) 100vw, 740px\" class=\"wp-image-33322\" \/><\/span>\n\t\t\t<\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1072  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><strong>Security<\/strong> is at the center of the great discussions of the last period, in fact in recent times we have often witnessed data leaks, hacker attacks, but above all we have witnessed the <strong>consequences<\/strong> that have generated these <strong>harmful events<\/strong>.<br \/>The continuous attacks on large and small players produce little credibility for those who provide a service, but also fear and terror in end users.<br \/>Have you ever wondered how risky a targeted attack and sudden data loss is due to <strong>human error<\/strong> or a <strong>natural event<\/strong>?<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_cta_156 et_animated et_pb_promo  et_pb_text_align_center et_pb_bg_layout_light\">\n<div class=\"et_pb_promo_description et_multi_view_hidden\"><\/div>\n<div class=\"et_pb_button_wrapper\"><a class=\"et_pb_button et_pb_promo_button\" href=\"https:\/\/temp_new.vmenginelab.com\/2021\/03\/12\/la-ovh-subisce-un-duro-colpo-incendio-in-un-datacenter-a-strasburgo\/\" target=\"_blank\">Fire at OVH&amp;apos;s datacentre<\/a><\/div>\n<\/p><\/div>\n<div class=\"et_pb_module et_pb_image et_pb_image_300 et_animated et-waypoint\">\n<p>\t\t\t\t<span class=\"et_pb_image_wrap \"><img decoding=\"async\" src=\"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2021\/05\/Screenshot-region-1-2.jpg\" alt=\"\" title=\"Screenshot region\"  sizes=\"(max-width: 740px) 100vw, 740px\" class=\"wp-image-33320\" \/><\/span>\n\t\t\t<\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1073  et_pb_text_align_center et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><strong>AWS CONNECTION<\/strong><\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1074  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><a href=\"https:\/\/aws.amazon.com\/it\/\">Amazon Web Services<\/a>, a leader in the world of cloud computing and in the provision of on-demand services, allows companies to study and identify customized solutions by achieving desired levels <strong>of data<\/strong> and application recovery <strong>with recovery times<\/strong> indicated by the customer.<br \/>At the heart of <strong>AWS&#8217;s<\/strong> strategy is the protection and defense of data, guaranteed above all by the global distribution network created by the Cloud giant.<\/p>\n<p>To ensure maximum durability, the AWS Cloud has established a distribution network that operates in 95<strong> Availability Zones<\/strong>, spread across 25 geographic <strong>regions<\/strong> around the world.<\/p>\n<p>Availability Zones, also known as <strong>Availability Zones<\/strong> (<strong>AZs<\/strong>), are a collection of data centers with redundant power, networking, and connectivity in an AWS Region.<\/p>\n<p>The AZs are <strong>interconnected<\/strong> via a high-bandwidth, low-latency network, on a dedicated fully redundant metropolitan fiber that distributes high-throughput, low-latency networks between them.<br \/>The<strong> distance<\/strong> between the AZs is a maximum of 100 km from each other, and the route between the zones is encrypted.<\/p>\n<p>Thanks to redundancy, AZs allow end customers to <strong>distribute workloads<\/strong> and protection from any unforeseen events such as blackouts, lightning, tornadoes, earthquakes, etc.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_cta_157 et_animated et_pb_promo  et_pb_text_align_center et_pb_bg_layout_light\">\n<div class=\"et_pb_promo_description et_multi_view_hidden\"><\/div>\n<div class=\"et_pb_button_wrapper\"><a class=\"et_pb_button et_pb_promo_button\" href=\"https:\/\/aws.amazon.com\/it\/about-aws\/global-infrastructure\/regions_az\/?p=ngi=2\" target=\"_blank\">Learn more about AVAILABILITY ZONES  <\/a><\/div>\n<\/p><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1075  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>However, AWS provides a proposal for an &#8220;Emergency Plan&#8221; precisely to intervene in the best possible way and limit the damage in different cases.<br \/>The <strong>Disaster Recovery<\/strong> strategy is divided into various levels, starting from a low to a high approach. Four different types of strategies, ranging from a lower cost and low complexity of creating backups to more complex strategies using multiple active regions.<\/p>\n<p>The first solution proposal is based on &#8220;<strong>Backup  Restore<\/strong>&#8221; approaches that take advantage of the durability and availability characteristics of AWS Storage services such as Amazon S3 and Amazon Storage Gateway. &#8220;Backup  Restore&#8221; accommodates low-priority use cases, is associated with hours-long amounts of data lost (RPO) and recovery times (RTOs), and has low costs.<\/p>\n<p>The &#8220;<strong>Pilot Light<\/strong>&#8221; is based on the possibility of keeping online on the Disaster Recovery Region or AZ only the resources necessary for data replication and starting and scaling the Compute resources only in the event of a disaster event. Pilot Light offers RPOs in the order of minutes and RTOs in the order of hours at slightly higher costs than in the previous case.<\/p>\n<p>The third &#8220;<strong>Warm Standby<\/strong>&#8221; approach uses a combination of Compute and AWS Storage resources kept online but sized to lower specifications than Production, ready to scale up in the event of a disaster. Warm StandBy is a strategy that offers RPOs in the order of seconds and RTOs in the order of minutes.<\/p>\n<p>The &#8220;highest&#8221; level is represented by &#8220;<strong>Hot StandBy<\/strong>&#8221; or &#8220;<strong>Multi-site Active-Active&#8221;<\/strong> solutions that adapt to <strong>Business Critical<\/strong> applications, implement synchronous data replication logics, keep the DR site online and sized identically to Production, in order to achieve a Multi-Site Auto-Failover on the AWS platform in the face of disaster. These strategies offer near-zero RPO and potentially very close to zero RTOs.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_cta_158 et_animated et_pb_promo  et_pb_text_align_center et_pb_bg_layout_dark\">\n<div class=\"et_pb_promo_description\">\n<h2 class=\"et_pb_module_header\">Have you ever thought about a Disaster Recovery plan?<\/h2>\n<\/div>\n<div class=\"et_pb_button_wrapper\"><a class=\"et_pb_button et_pb_promo_button\" href=\"https:\/\/temp_new.vmenginelab.com\/backup-disaster-recovery-ed-archiviazione-dati\/\" target=\"_blank\">Explore VMEngine Solutions<\/a><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Disaster Recovery and Business Continuity. Details on the different strategies to deal with a possible emergency.  <\/p>\n","protected":false},"author":6,"featured_media":33325,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[97,3574],"tags":[132,133,3948,4591,4592,4394],"class_list":["post-36690","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","category-in-evidence","tag-amazon-web-services-en","tag-aws-en","tag-cloud-data-security","tag-contingency-plan","tag-disaster-recovery-plan-en","tag-safety"],"aioseo_notices":[],"jetpack_featured_media_url":"http:\/\/54.220.100.23\/wp-content\/uploads\/2021\/05\/gif-disaster-recovery-1.gif","amp_enabled":true,"_links":{"self":[{"href":"http:\/\/54.220.100.23\/en\/wp-json\/wp\/v2\/posts\/36690","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/54.220.100.23\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/54.220.100.23\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/54.220.100.23\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"http:\/\/54.220.100.23\/en\/wp-json\/wp\/v2\/comments?post=36690"}],"version-history":[{"count":1,"href":"http:\/\/54.220.100.23\/en\/wp-json\/wp\/v2\/posts\/36690\/revisions"}],"predecessor-version":[{"id":41600,"href":"http:\/\/54.220.100.23\/en\/wp-json\/wp\/v2\/posts\/36690\/revisions\/41600"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/54.220.100.23\/en\/wp-json\/wp\/v2\/media\/33325"}],"wp:attachment":[{"href":"http:\/\/54.220.100.23\/en\/wp-json\/wp\/v2\/media?parent=36690"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/54.220.100.23\/en\/wp-json\/wp\/v2\/categories?post=36690"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/54.220.100.23\/en\/wp-json\/wp\/v2\/tags?post=36690"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}