Bhakra Beas Management Board

Bhakra Beas Management Board
Search

Contingency Management Plan

This plan ensures business continuity and rapid recovery from unforeseen disruptions, maintaining 24x7 service delivery.

Objectives:

  • Minimize downtime and ensure continuous availability.
  • Establish clear procedures for incident response and recovery.
  • Safeguard data integrity and prevent loss of critical information.

Defacement Response Plan:

  • 1. Detection & Notification :Web Information Manager is immediately informed by monitoring teams or NIC Cyber Security Division via phone and email.
  • 2. Containment & Analysis: Server Administrator assesses severity may stop/partially continue the site. Log files are analysed to identify and block the source of defacement.
  • 3. Restoration Procedures: Affected content and the site are restored from the latest clean backup. Identified vulnerabilities are fixed, and the application is re-audited. Restoration aims for a few hours, depending on the extent of defacement.

Data Corruption & Hardware/Software Crash Response:

Immediate assessment and restoration from the most recent, reliable backup are prioritized to minimize disruption.

Natural Calamity Response Plan:

  • 1. Declaration of Calamity: In-charge of the National Data Centre formally declares a natural calamity if the primary data center is destroyed or ceases to exit.
  • 2. DR Site Activation: Instructions are issued to activate and start services from the designated Disaster Recovery (DR) site.
  • 3. Geographical Separation: Our hosting service provider ensures the primary Data Centre (DC) and Disaster Recovery Center (DRC) are geographically distant, ideally in different seismic zones.

Data Backup and Restoration Procedures:

  • A comprehensive backup solution is implemented to securely store all data and system configurations.
  • Backups are periodic and automated for consistency and reliability.
  • Backups are stored off-site, not on the same server, using secure custody with restricted and logged access.
  • Backups are stored off-site, not on the same server, using secure custody with restricted and logged access.
  • The recovery system is regularly tested to ensure data can be successfully restored.
Back to Top