HackPathHackPath
CoursesRoadmapPracticePricing
>_
HackerPath

Foundations of Information Security

0%
Lessons
Introduction
01The Architecture of Information Security
12 min
02Fundamental Security Principles
14 min
InfoSec Domains
03Network Security Fundamentals
13 min
04Application Security Principles
15 min
05Operational Security (OpSec) Concepts
13 min
06Business Continuity and Disaster Recovery
14 min
07Cloud Security Essentials
13 min
08Physical Security Mechanisms
12 min
09Mobile Device Security Foundations
13 min
10Security in Internet of Things (IoT) Environments
12 min
Threats
11Distributed Denial-of-Service (DDoS) Attacks
11 min
12Ransomware Threat Landscape
13 min
13Social Engineering Tactics
12 min
14Internal Threat Actors
13 min
15Advanced Persistent Threat (APT) Campaigns
14 min
Cybersecurity Teams
16Adversaries and Threat Profiles
12 min
17Red Team Operations & Offensive Security
14 min
18Blue Team Defensive Operations
13 min
19Purple Team Collaboration Framework
12 min

Lesson 06

Business Continuity and Disaster Recovery

Learn how organizations plan for and recover from disruptions. Understand the difference between Disaster Recovery and Business Continuity, explore recovery objectives, and discover how planning and testing ensure organizations survive crises.

Cybersecurity Fundamentals/Business Continuity and Disaster Recovery

Why Organizations Must Plan for Disruption

Every organization faces a simple reality: Disruptions will happen. A cyberattack could paralyze systems. A natural disaster could destroy infrastructure. A major system failure could stop all operations. The question isn't whether a crisis will occur, but when.

Disaster Recovery (DR) and Business Continuity (BC) are an organization's plan to survive these disruptions. Together, they form a resilience strategy—a structured approach to keeping the business alive when things go wrong.

While the terms are often used together, they address different aspects of survival. Understanding the distinction is important for building robust plans.

Key concept

For penetration testers: DR and BC plans are tested to reveal vulnerabilities. You may be asked to validate whether recovery procedures actually work, test failover systems, or identify security gaps in backup infrastructure. This requires both technical skill and understanding of business operations.

Disaster Recovery: Getting Critical Systems Back Online

Disaster Recovery focuses on the technical and operational response to a catastrophic event. It answers the question: "How do we restore our critical systems and data?"

Disasters can take many forms:

Natural Disasters — Earthquakes, floods, hurricanes, and fires destroy physical infrastructure and data centers.

Technological Failures — Major system crashes, database corruption, hardware failures, or network outages disable operations.

Cyberattacks — Ransomware encrypts critical data, malware destroys systems, or attackers steal and delete information.

Human Error — An administrator accidentally deletes a critical database, or misconfigured security settings expose systems.

Infrastructure Failures — Power outages, internet connectivity loss, or cooling system failures in data centers.

The Core of Disaster Recovery: Backups and Redundancy

DR relies on two fundamental practices:

Data Backups — Regular copies of critical data stored separately from production systems. If production data is corrupted or deleted, backups allow restoration. Backups must be:

  • Regular — Frequent enough that minimal data is lost
  • Tested — Periodically restored to verify they work
  • Offsite — Stored geographically separate from primary systems so a local disaster doesn't destroy both

System Redundancy — Critical systems aren't single points of failure. Redundancy ensures that if one system fails, another immediately takes over:

  • Database replication — Multiple database copies synchronized so if one fails, others continue
  • Server clustering — Multiple servers share workload; if one fails, others absorb the traffic
  • Geographic distribution — Critical systems run in multiple data centers or cloud regions so a local disaster affects only one location
  • Failover — Automatic or manual switching to backup systems when primary systems fail

Without backups and redundancy, a disaster becomes a permanent loss.

Recovery Time Objective (RTO) and Recovery Point Objective (RPO)

DR plans define two critical metrics:

Recovery Time Objective (RTO) is the maximum acceptable time to restore a system after a disaster. If a web application's RTO is 4 hours, the organization can tolerate up to 4 hours of downtime. After that, the business loses unacceptable revenue or customer trust.

Recovery Point Objective (RPO) is the maximum acceptable data loss. If a database's RPO is 1 hour, losing more than 1 hour of data is unacceptable. This defines how frequently backups must occur.

Diagram comparing RTO (time to recover) and RPO (acceptable data loss window), illustrating that different systems have different targets based on business impact.
Set objectives per system, then design backups and redundancy to meet them.

Consider an e-commerce business:

  • Website RTO: 1 hour (every hour offline costs significant revenue)
  • Website RPO: 30 minutes (can lose up to 30 minutes of transactions)
  • Customer database RTO: 4 hours (customers can wait; the business is still functioning)
  • Customer database RPO: 2 hours (some transaction loss is acceptable)

Different systems have different RTOs and RPOs based on business impact. A DR plan allocates resources to meet these objectives.

DR in Practice: Recovery Steps

When a disaster occurs, a trained team follows documented procedures:

  1. Declare the disaster — Confirm that recovery procedures are needed
  2. Activate the DR plan — Notify the DR team, gather resources
  3. Assess damage — Determine what's affected and what must be recovered first
  4. Restore critical systems — Failover to backup systems or rebuild from backups, prioritizing by business impact
  5. Verify recovery — Test that restored systems are operational and data is intact
  6. Communicate status — Keep stakeholders informed of recovery progress
  7. Full restoration — Continue restoring non-critical systems until everything is recovered
  8. Return to normal — Transition back to primary systems when safe to do so
  9. Post-incident review — Document what happened, what worked, what didn't, and improvements needed

Business Continuity: Keeping the Business Running

Business Continuity takes a broader view. It answers: "How do we maintain essential business functions during and after a disruption, even if we can't immediately restore all systems?"

Where Disaster Recovery is technical ("restore the database"), Business Continuity is operational ("keep the business generating revenue").

The Business Continuity Approach

During a major cyberattack, restoring all systems might take days. But the business doesn't stop operating for days. A BC plan keeps critical functions running through the outage:

Alternative Processes — If the order management system is down, use manual processes: employees take orders by phone and enter them in a spreadsheet until the system recovers.

Remote Work — If the office is damaged, employees work from home, maintaining business operations from a distance.

Alternate Locations — If the primary facility is destroyed, move operations to a secondary office or co-working space.

Alternative Suppliers — If a critical supplier is affected by the same disaster, pre-arranged alternate suppliers ensure supply chain continuity.

Partial Operations — Focus on the most critical business functions. A manufacturer might continue shipping existing inventory even if the production line is down, maintaining some revenue.

Key Business Continuity Planning Elements

Identify Critical Functions — Which business functions must continue? A retailer's online ordering system is critical; the company newsletter is not. Prioritize by business impact.

Cross-Training — If one employee is irreplaceable, the business is vulnerable. Cross-training ensures someone else can perform critical functions if the primary person is unavailable.

Supply Chain Resilience — Identify critical suppliers. Pre-arrange alternate suppliers so if the primary is affected, you have a backup.

Communication Plans — During a crisis, everyone needs to know what's happening. BC plans include how to quickly communicate with employees, customers, and stakeholders.

Decision-Making Authority — Who has authority to declare the crisis over and restore normal operations? Clear authority prevents decision paralysis.

DR and BC: Different but Complementary

These concepts overlap but focus on Different timescales:

AspectDisaster RecoveryBusiness Continuity
FocusRestoring systems and dataMaintaining operations
TimeframeHours to days (recovery period)Minutes to hours (during disruption)
Key ToolBackups, redundancy, failoverAlternative processes, remote work, manual procedures
Success MetricHow quickly systems are restoredHow long business functions continue

A complete resilience strategy uses both. BC keeps the business alive while DR restores systems. They work together.

Building a DR/BC Program: Key Responsibilities

Creating effective plans requires multiple perspectives and expertise.

Business Continuity Manager leads the program, coordinating across teams, setting RTOs and RPOs, and maintaining plans. This role often reports to executive leadership, reflecting the organization-wide importance.

IT Team designs and implements technical DR solutions: backup systems, redundant infrastructure, failover procedures, and recovery testing.

Operations Team develops BC procedures for maintaining critical business functions during outages: alternative processes, manual workflows, and alternative facilities.

Executive Leadership allocates resources for DR/BC investment, approves critical decisions like moving to alternate locations, and ensures the program aligns with business strategy.

Department Leaders identify critical functions, train staff on their roles, and participate in testing exercises.

Security Team ensures that DR and BC plans include security controls. Backups must be protected. Recovered systems must be secured. Alternate locations must meet security standards.

Key concept

For penetration testers: You may assess whether: - Backup systems are properly secured and isolated - Failover procedures maintain security (recovered systems aren't more vulnerable than originals) - Recovered data hasn't been tampered with - Alternate locations meet security standards - Communication systems used during recovery are secure

Testing: Verification That Plans Work

A well-documented DR/BC plan is only valuable if it actually Works. Testing reveals gaps before a real disaster.

Types of DR/BC Tests

Tabletop Exercises — Team members sit around a table and walk through a simulated scenario: "The main data center goes offline. What do we do?" Discussion reveals gaps and unclear procedures without actually disrupting operations.

Failover Testing — Actually trigger failover to backup systems to verify they work. This tests both technical failover and team procedures in a controlled environment.

Full-Scale Simulations — Simulate the entire disaster and recovery process as realistically as possible. Employees work from alternate locations, use backup systems, and follow BC procedures. This is disruptive but reveals true readiness.

Partial Tests — Test specific components (e.g., "Can we restore the customer database from backups?") rather than the entire system.

Testing frequency depends on organization size and risk tolerance, but annual testing is common. After testing, organizations document lessons learned and update plans.

What Testing Reveals

Testing answers critical questions:

  • Do backup systems actually work?
  • Can employees access systems from remote locations?
  • Are procedures clear and complete?
  • Do staff know their roles?
  • How long does actual recovery take?
  • Are there security gaps in backup systems?
  • Can alternate locations operate effectively?
  • Are communication systems functional?

Without testing, organizations often discover their plans don't work when an actual disaster strikes—too late to fix.

The Business Case for DR and BC

Investing in DR and BC requires significant resources: backup systems, redundant infrastructure, testing, and personnel. Why do organizations do it?

Financial Protection — Downtime costs money. An hour of outage might cost thousands or millions depending on the business. DR and BC investments pay for themselves by preventing extended downtime.

Regulatory Compliance — Many regulations require organizations to have DR and BC plans. Financial institutions, healthcare providers, and government agencies all face mandates.

Customer Trust — Customers want to work with reliable companies. Organizations that can survive disasters and maintain service build customer loyalty.

Competitive Advantage — In a disaster, competitors without good DR/BC plans fail. Companies with robust plans continue operating, gaining market share.

Reputation Protection — A company that recovers quickly from a disaster suffers less reputational damage than one that suffers extended outages.

DR and BC aren't insurance—they're essential business infrastructure.


Flashcards
Flashcards
Flashcard

What is Disaster Recovery?

Flashcard

What is Business Continuity?

Flashcard

What is RTO and why does it matter?

Flashcard

What is RPO and how does it differ from RTO?

Flashcard

What are the two core technical elements of Disaster Recovery?

Flashcard

Name three Business Continuity tactics for maintaining operations during an outage.

Flashcard

What is the difference between a tabletop exercise and a failover test?

Flashcard

Why is regular DR/BC testing essential?

Flashcard

Why would a penetration tester be involved in DR/BC testing?

Flashcard

What is the relationship between DR and BC in a complete resilience strategy?

Exercises

Exercise 1 — Define RTO/RPO for two critical systems

Pick two systems (e.g., customer website and internal email) and define:

  • RTO (how fast it must be restored)
  • RPO (how much data loss is acceptable)
  • One backup/recovery approach for each

Open questions

Question 1 — What’s the difference between Business Continuity and Disaster Recovery?

Next Lesson

Now that you understand how organizations prepare for disruptions, it's time to explore the physical layer—protecting the hardware, facilities, and infrastructure that store and process data.

Next: Physical Security Mechanisms

Sign in to track your progress.

Sign in to validate →