Professional Documents
Culture Documents
Background
Started in 2008
Benchmarks in South Africa and Schengen China Capacity Building was carried out as the GDC was being implemented The Facility is located 20 km from the City Centre in highly secure environment Investment from a concession loan from the Peoples Republic of China
Architecture
GCCN
Internet
Core Router Core Router Core Router Firewall Firewall Firewall Load Balance Load Balance Aggregation Switch Aggregation Switch IDS Load Balance Aggregation Switch IDS Load Balance Aggregation Switch Aggregation Switch IDS Aggregation Switch Firewall Core Router 2.5G POS 2.5G Pos GE FE T3 SAN KVM
DNS
KVM Switch Access Switch
Web
Proxy
Finance Ministry
Ministry Zones
Immigration Ministry
Aggregation Switch
Aggregation Switch
Secondary DC
Storage and Backup
Firewall Key (MA5200F) Firewall Access Switch VPN Router Access Switch Firewall
Access Switch
VPN
Maintenance Area Customer Operation Remote Access Network Management System Server
Network Monitor
Page 3
Why?
Increased IT demand Increasing cost pressures Responsiveness to change
Reducing costs is increasingly a priority Power costs are rising Data center operating costs are increasing
Technology densities growing Data centers are aging Power and cooling needs
Value Proposition
Prevent Protect Manage Recover
IT Recovery
Replication/Mirroring Services
Layers of Resilience
Strategy
Crisis management process Articulated governance model Resilience used as competitive advantage Command center identified Geographic diversity of staff Defined roles and responsibilities Identify most critical processes Contingencies integrated into all critical processes Key links with external companies
Resilience Strategy
Continuity Plan
Organization
Processes
Mirroring for critical data Remote backup facilities Backups of workstation data for mobile workers / counties Server and storage virtualisation Rapid Server provisioning Specialist Recovery Expertise Govt Data Centre Disaster Recovery Construction Continued network access to MDAs
Data Management
Technology
IT Recovery
Facilities
As an analogy to its medieval predecessors, IT security requires a well-tuned and well-placed mix of different technologies. Setting conditions for information
security derived from business goals, their documentation, communication and organizational responsibilities Classification of assets; identification of threats to assets, their impacts and associated risks
Security
Policies, Org.
Risk
Definition of standards; Choice and implementation of technology, management processes and procedures
Implementation
Audit
Operation
Security education and awareness programs for end users; implementation of operational processes and procedures
Dont forget to activate the human firewall rules need to be communicated and employees need to be made aware of them and sensitized as to their content and reasoning.
Government Goals
technically feasible and practical, economically reasonable, legally required, and socially acceptable.
Questions?