Learning Library

← Back to Library

Disaster Recovery vs Operational Resilience

Key Points

  • Disaster recovery (DR) traditionally focuses on natural events like tornadoes, floods, and power outages that cause localized, short‑term damage to data centers.
  • Operational resilience expands DR by addressing persistent, intelligent threats from black‑hat actors who can infiltrate systems for weeks or months and undermine recovery efforts.
  • Ransomware groups typically seek monetary gain and may return data for payment, whereas nation‑state actors aim for widespread data destruction, requiring even stronger preparedness.
  • Backups are crucial for recovery, but sophisticated attackers may compromise those backups before striking, so resilience strategies must protect both primary systems and backup copies.

Full Transcript

# Disaster Recovery vs Operational Resilience **Source:** [https://www.youtube.com/watch?v=kr6fc869Ugs](https://www.youtube.com/watch?v=kr6fc869Ugs) **Duration:** 00:07:11 ## Summary - Disaster recovery (DR) traditionally focuses on natural events like tornadoes, floods, and power outages that cause localized, short‑term damage to data centers. - Operational resilience expands DR by addressing persistent, intelligent threats from black‑hat actors who can infiltrate systems for weeks or months and undermine recovery efforts. - Ransomware groups typically seek monetary gain and may return data for payment, whereas nation‑state actors aim for widespread data destruction, requiring even stronger preparedness. - Backups are crucial for recovery, but sophisticated attackers may compromise those backups before striking, so resilience strategies must protect both primary systems and backup copies. ## Sections - [00:00:00](https://www.youtube.com/watch?v=kr6fc869Ugs&t=0s) **From Disaster Recovery to Operational Resilience** - The speaker contrasts traditional disaster recovery, which addresses natural catastrophes, with operational resilience, which expands protection to include persistent cyber threats such as black‑hat hackers. - [00:03:15](https://www.youtube.com/watch?v=kr6fc869Ugs&t=195s) **Backup Infection and Immutable Recovery** - The speaker warns that ransomware can compromise backups, emphasizing the need for immutable snapshots and clear RPO/RTO objectives to ensure a reliable, uncompromised recovery point. - [00:06:36](https://www.youtube.com/watch?v=kr6fc869Ugs&t=396s) **Beyond Disaster Recovery: Operational Resilience** - The speaker stresses that while disaster recovery is essential, organizations must also develop true operational resilience to withstand both predictable disruptions and sophisticated attacks from malicious actors. ## Full Transcript
0:00Today, we are talking about tornadoes, earthquakes, floods, and black hat hackers. 0:08Now, why are we talking about these things? 0:10Well, we have disaster recovery and operational resilience as two kind of pillars of 0:18frameworks that people have when they're thinking about protecting their data. 0:22Now, the traditional column is disaster recovery. 0:24And like I was saying, this is your tornadoes, this is your floods, this is, you know, all 0:32the things that are natural disasters that can wreak havoc on a data center, or have a power outage, things like that, 0:39that are, you know, the bread and butter of what most people 0:42have had their DR plans focused around since data centers became a thing. 0:47Now on the other side is operational resilience. 0:50So this is taking disaster recovery and adding in the ever-growing and extremely present threat. 0:58of our favorite people, these black hat actors. 1:05Now, these folks are different from tornadoes, different from hurricanes, 1:09even though they are considered damage creators, they have a brain. 1:14And as opposed to these natural disasters who just roll in, destroy what they're gonna destroy, and then they're out, 1:21this person can be living in your system for weeks, months, maybe years, trying to 1:28entangle themselves in your systems so much so that 1:31when you get hit with a ransomware email saying that you've been attacked, 1:34you have no way of recovering your data effectively 1:39unless you have operational resilience as the goal that you're trying to achieve. 1:45So, the scope of these two, well tornadoes affect just one place at a time and they come and go. 1:54So we'll call this local. 1:58Now, on the other side of things, we'll call this global because these folks can live anywhere. 2:03I mean, a lot of times ransomware attacks will hit the United States from Russia, China, all over the world. 2:10Now these also can be broken down into state actors and just kind of ransomware groups, 2:14and the state actors kind of play a different game than the ransomware organizations 2:18in that they are in it for just widespread destruction of your data. 2:23The ransomware folks, they want money. 2:25Sometimes people pay the ransom and they get their data back. 2:28Not the best idea because there's caveats to that, obviously, 2:31but if you're dealing with a nation state attacking you, it's not gonna end up good. 2:36Your data's gonna be destroyed, so you need to be extra prepared for that. 2:40Now, the other part of it is backups. 2:43Everybody says, okay, I got hit. 2:45Well, I'll just recover from my backups. 2:48Well, in a disaster recovery paradigm where a flood hits you, that's completely fine. 2:53Now, yeah, backups affected, no, let's say no to that. 2:59This is a big yes on this side, 3:01because you can imagine if you were a smart hacker, you would have in your mind the thought of, 3:08okay, I wanna do as much damage as I can do before and kind of make myself sticky in their system before I announce myself. 3:15And that often is the way that people know that they've been affected. 3:19So they will come into your backups, affect your backups with infections and they will then hit your production, 3:27and once they hit production, a lot of people will just trigger their backup to 3:31recover in, and then they're in for an even worse nightmare than they already were in. 3:36So, local, global. 3:39Backups affected, no. 3:41Backups affected, very much so, and it's almost the cornerstone of their strategy. 3:45Now, the recovery objectives also are important with this. 3:50Once again, much more simple on this side, you have an RPO and an RTO. 3:55basically the SLAs for how you want your organization to be able to recover from these natural disasters. 4:03Now, this also applies over here. 4:04So RPO, RTO are perfectly appropriate to apply to this side, 4:11but you need the combination of these things plus immutable snapshots, 4:17because since this is a thinking actor, they can get into your backups and they want to get into your backups, 4:24and you need to make sure that not only can they not change anything, they shouldn't be able to see your backups. 4:31This should be a, instead of a worm, this should be more of like a warn. 4:35Read once, write once, read never, unless you're the right person. 4:40So RPO and RTO is all good, but if you don't have a known good copy to recover from, 4:45it's kind of a moot point because you just keep on reinfecting yourself and you're back to square one. 4:50So duration is another thing. 4:53This is, you know, the floods will recede and you'll kind of be left with the damage, 4:58and this is basically maybe hours to days. 5:05On the other side of this, this is very dependent on how prepared you are for the event. 5:11Now the industry average on recovering, once you know that you've been infected, is 23 days. 5:16That's getting close to a month, so let's call this months 5:22slash months. 5:25This is so important to understand because you have a real ability to control this 5:29with how well you have prepared for this contingency of a threat actor getting into your system. 5:36If you have your infrastructure set up in a way that is able to detect quickly and also recover quickly that known good copy, 5:44you can shrink this month down to a day, a shift, however you like to call it. 5:51It all is in how prepared you are. 5:53Now the last piece for these two columns to distinguish them is likelihood. 5:59Now, everybody has a DR plan. 6:01It's important to note that not everybody tests their DR plan, which is important, but everybody has a DR plan. 6:07Now, the likelihood that a tornado's gonna hit your data center, even though tornadoes happen every year, it's still very low. 6:14So, low odds that this is gonna be happening to your organization specifically, but everyone's prepared for it. 6:21On the other side, This is a very high likelihood 6:24because threat actors are constantly trying to penetrate as many systems as they can 6:30to either wreak havoc, so political discord, or make some money most likely. 6:36Now this is the one everyone's prepared for. 6:39This is the one that people don't really realize that being ready for this side does not make you immediately ready for this side. 6:45So big impact more likely to happen bad guys thinking about 6:51the worst ways they can affect you versus very predictable things that you can plan on. 6:57So while you wanna have disaster recovery as the foundation of your planning, 7:01you really wanna extend that over to be truly operationally resilient, 7:06which allows you to handle all the tornadoes, but also handle all these bad guys in the black hats.