|
 |
|
|
|
±Û | ±èÁ¤ÀÏ úÞ IBM ±Û·Î¹úÅ×Å©³î·ÎÁö¼ºñ½º »ó¹« úÞ ¼Ò¹æ¹æÀçû ±â¾÷Àç³°ü¸®Á¤Ã¥ ÀÚ¹®À§¿ø ï¡ ¹Ì±¹ ¸Þ¸±¸°Ä¡Áõ±Ç Global Contingency Program ÃѰýºÎ»çÀå |
|
|
À§±â°ü¸®¿Í BCP¿¡ ´ëÇÑ »ç·Ê´Â ¸¹Áö¸¸ ½Ç¹«ÀÚµéÀÌ ½ÇÀü¿¡ Àû¿ëÇÒ ¼ö ÀÖ´Â ½Ç¹«ÁöħÀ̳ª ü°èÀûÀÎ ±³Àç¿Í ±³À°ÀÌ ¹ÌÈíÇÑ °ÍÀÌ Çö½ÇÀÌ´Ù. ÀÌ¿¡ µû¶ó º»Áö´Â Áö³ 8¿ùºÎÅÍ 4ȸ¿¡ °ÉÃÄ ‘±â¾÷À§±â°ü¸®¿Í BCP’¸¦ ÁÖÁ¦·Î µ¶ÀÚµéÀ» À§ÇÑ ¿¬À縦 ±âȹÇß´Ù. À̹ø È£¿¡´Â ±×µ¿¾È ±âȹ¿¬Àç ÇÑ ÁÖÁ¦¿¡¼ ´Ù·çÁö ¸øÇß´ø ITºÎºÐ¿¡ ´ëÇÑ Á¶¾ðÀ» ÁÖ°íÀÚ ÇÑ´Ù. ÇÇÇÒ ¼ö ¾ø´Â À§±â »óȲ¿¡µµ ²ô¶±¾øÀÌ ºñÁî´Ï½º Ȱµ¿À» ¿µÀ§ÇÒ ¼ö ÀÖµµ·Ï ±â¾÷µéÀÌ »çÀü¿¡ öÀúÈ÷ ´ëºñÇϰí ÀûÀýÇÑ IT ȯ°æÀ» ±¸ÃàÇÏ´Â °ÍÀº ´ç¿¬ÇÑ ÀÏÀÌ´Ù.
ºñÁî´Ï½º¿¡ ±â¿ì(Ñ£éØ)¶õ ÀÖÀ» ¼ö ¾ø±â ¶§¹®ÀÌ´Ù. ÀÌó·³ Àç³ÀçÇØ³ª Å×·¯ »óȲ¿¡¼µµ ȸ»çÀÇ ÇÙ½É ¾÷¹«°¡ Àç°³µÉ ¼ö ÀÖ´Â ±â¾÷ÀÇ À§±â°ü¸® ´É·ÂÀÇ ±âÁذú ÁöÇ¥·Î¼ ±¹³»¿¡ ¼Ò°³µÈ °ÍÀÌ BCP/BCM(Business Continuity Planning/ Management, ºñÁî´Ï½º¿¬¼Ó¼º°ü¸®)ÀÌ´Ù. BCP/BCMÀº “Á¶Á÷(±â¾÷)À» À§ÇùÇÏ´Â ÀáÀ翵ÇâÀ» ÆÄ¾ÇÇϰí, ÁÖ¿ä ÀÌÇØ °ü°èÀÚÀÇ ÀÌÀÍ, Á¶Á÷ÀÇ ÆòÆÇ, ºê·£µå ¹× °¡Ä¡Ã¢ÃâȰµ¿À» È¿°úÀûÀ¸·Î º¸È£Çϱâ À§ÇØ ÇÊ¿äÇÑ ´ëÀÀ ¹× º¹¿ø¿ª·® È®º¸¸¦ °¡´ÉÄÉ ÇØÁִ ü°è Á¦°øÀÇ ÅëÇÕ °æ¿µ ÇÁ·Î¼¼½º”·Î Á¤ÀÇµÉ ¼ö ÀÖ´Ù.
21¼¼±â ±â¾÷ȯ°æÀº IT¾øÀÌ ºñÁî´Ï½º ¿î¿µÀ» ³íÇÏ´Â °ÍÀÌ Àý´ë ºÒ°¡´ÉÇÒ Á¤µµ·Î ±â¾÷ ³»¿¡¼ IT°¡ Â÷ÁöÇÏ´Â ºñÁß°ú ÀÇÁ¸µµ°¡ ¸Å¿ì ³ô´Ù. ¾Õ¿¡¼ Á¤ÀÇÇÑ BCP/BCM ÇÁ·Î±×·¥¿¡¼ IT DR(Disaster Recovery, ÁÖ·Î Á¤º¸½Ã½ºÅÛ ÀçÇØº¹±¸¸¦ ÀǹÌ)ÀÌ Â÷ÁöÇÏ´Â Á߿伺Àº ¸Å¿ì ³ôÁö¸¸ ÀÌ¿¡ ºñÇØ ½ÇÁ¦·Î´Â »ó¼¼ÇÑ ÁöħÀ̳ª ³»¿ëÀ» °¡À̵åÇϰí ÀÖÁö ¸øÇÏ´Ù. ÀÌ´Â IT DR °èȹ¼ö¸³°ú DR½Ã½ºÅÛ ±¸Ãà µî¿¡ °ü·ÃµÈ ³»¿ëÀÌ »ó´çÈ÷ ±â¼úÀûÀ̱⿡ ÀÌ ÁÖÁ¦ ÀÚü¸¸À¸·Îµµ ¾ð±ÞÇÏ°í ´Ù·ï¾ß ÇÒ ¿ä¼Ò°¡ »ó´çÈ÷ ¹æ´ëÇϱ⠶§¹®À̱⵵ ÇÏ´Ù.
°í¹«ÀûÀÎ °ÍÀº ÇöÀç BCP/BCM ÇÁ·Î±×·¥ Å׵θ® ³»¿¡¼ IT ½Ã½ºÅÛÀÇ ¿¬¼Ó¼ºÀ» ƯÈÇÑ ³»¿ë¿¡ ´ëÇÑ Ç¥ÁØÈÀÛ¾÷ÀÌ °è¼Ó ÀÌ·ïÁö°í ÀÖÀ¸¸ç, ¿ÃÇØ ¾È¿¡ BS 25777·Î ¸í¸íµÈ IT ½Ã½ºÅÛ¿¡ ´ëÇÑ ¿¬¼Ó¼º °ü¸® ±Ô°ÝÀÌ ¹ßÇ¥µÉ ¿¹Á¤À̶ó´Â °ÍÀÌ´Ù. ÇÑÆí, Á¤º¸º¸¾È(Information Security) ¿µ¿ª¿¡¼ ¼¼ºÐȵŠBS 24762¶ó°í ÇÏ´Â ‘Guidelines for Information and Communications Technology Disaster Recovery Services’ ±Ô°Ýµµ ¿Ã 2¿ù¿¡ ¹ßÇ¥µÈ ¹Ù ÀÖ´Ù.
IT ÀçÇØº¹±¸°èȹ¼ö¸³ ½Ã °í·ÁÇØ¾ß ÇÏ´Â »çÇ×(ºÐ¼®, Å×½ºÆ® ¹× À¯Áöº¸¼ö, ½Ã½ºÅÛ±¸Ãà Ȱµ¿ µîÀº Á¦¿Ü)µéÀ» Ãß·Áº¸¾Ò´Ù. À̸¦ ÅëÇØ IT DR °èȹ°ú ü°è¼ö¸³ ¹× ±â¼úÀû¿ë¿¡ ÀÖ¾î¼ °í·ÁÇØ¾ß ÇÒ »çÇ×µéÀ» Á¤¸®ÇØ º¼ ¼ö ÀÖÀ» °ÍÀÌ´Ù.
1) ºñÁî´Ï½º±â´É°ú Á¤º¸½Ã½ºÅÛÀÇ ¸ÅÇÎ(Mapping Business Functions to Infrastructure) ¡Ý Çϵå¿þ¾îÀÚ»ê(hardware asset), ¼ÒÇÁÆ®¿þ¾î(software), ÀÀ¿ëÇÁ·Î±×·¥(business applications) ¿¡ ´ëÇÑ ÇöȲÆÄ¾Ç(inventory) ¡Ý µ¥ÀÌÅÍÈ帧(data flow)°ú ½ºÅ丮Áö(storage) ¹× ÀÎÇÁ¶óȯ°æ¿¡ ´ëÇÑ »óÀ§¼öÁØ ¾ÆÅ°ÅØÃ³ (high-level architecture) ÆÄ¾Ç ¡Ý ½Ã½ºÅÛ°£ÀÇ ÀÇÁ¸µµ(dependencies between systems) ÆÄ¾Ç- ½Ã½ºÅÛ, ³×Æ®¿öÅ© ¼ºñ½º, º¸¾È, ÀÀ¿ëÇÁ·Î±×·¥ µî¿¡ ´ëÇÑ ½Ã½ºÅÛ °£(inter-system) ÀÇÁ¸µµ ¹× ÀÀ¿ëÇÁ·Î±×·¥, ¼ºñ½ºÀÇ ´ë¿Ü(external) ÀÇÁ¸µµ
2) »ç¿ëÀÚ º¹±¸ °èȹ¼ö¸³(Planning User Recovery) ¡Ý (ÃÖÁ¾)»ç¿ëÀÚ ÄÄÇ»ÅÍ(end-user computing) ¿ëµµÆÄ¾Ç(´Ü¼ø À¥ ºê¶ó¿ìÀú, ÁÖ¿ä½Ã½ºÅÛ Á¢±ÙÀ» À§ÇÑ Å͹̳Î, OS ¿î¿µ½Ã½ºÅÛ µî) ¹× ÀÌ¿¡ µû¸¥ ´ëÀÀ¹æ¾È ¸¶·Ã ¡Ý »ç¿ëÀÚ ÀÇ»ç¼ÒÅëä³Î(end-user communications) ¿ä°Ç(À½¼ºÅë½Å/»ç¼ÇÔ, À̸ÞÀÏ, ÆÑ½º, ¹®ÀÚ ¸Þ½ÃÁöÀü¼Û µî) ÆÄ¾Ç ¹× ´ëÀÀ¹æ¾È ¸¶·Ã
3) ½Ã¼³(ÁÖ·Î Àü»ê½Ç/¼¾ÅÍ) º¸È£ ¹× º¹±¸°èȹ¼ö¸³(Planning Facilities Protection and Recovery) ¡Ý Àü»ê½Ç °ü·Ã ½Ã¼³(processing facilities) º¸È£ (¹°¸®ÀûÀÎ Á¢±ÙÅëÁ¦, Àü·Â°ø±Þ, ¼Ò¹æ, ÈÇÐ/À¯Çع°Áú °ü¸®, ħ¼ö ´ëÀÀ) ¹æ¾È ¸¶·Ã ¡Ý ´ëüÀå¼Ò ¸¶·Ã(alternate processing site)- ÇÖ, Äݵå, ¿ú»çÀÌÆ®¿¡ ´ëÇÑ ÀÇ»ç°áÁ¤ ¹× ÁÖ Àü»ê½Ã¼³°úÀÇ À§Ä¡, ¹é¾÷¹æ½Ä µî ¼±Á¤ ¹× ±¸Çö
4) ½Ã½ºÅÛ°ú ³×Æ®¿öÅ© º¹±¸ °èȹ¼ö¸³(Planning System and Network Recovery) ¡Ý ½Ã½ºÅÛ(server computing) ¿î¿µ/º¹±¸- ¸ñÇ¥º¹±¸¼öÁØ(RTO, RPO µî) °áÁ¤, ½Ã½ºÅÛ¾ÆÅ°ÅØÃ³/±¸¼º(H/W, OS, ¸®¼Ò½º, ³×Æ®¿öÅ©, º¸¾È, ±ÇÇÑ/Á¢±Ù°ü¸® µî) °áÁ¤, ½Å±Ô½Ã½ºÅÛ ±¸Ã࿪·® °í·Á/È®º¸, ºÐ»ê½Ã½ºÅÛȯ°æ °í·Á, ÀÀ¿ëÇÁ·Î±×·¥ ¾ÆÅ°ÅØÃ³ °í·Á, ½Ã½ºÅÛÅëÇÕ À̽´ ¡Ý ³×Æ®¿öÅ©(Network Infrastructure) ¿î¿µ/º¹±¸- ÀÀ¿ëÇÁ·Î±×·¥ ÀÎÅÍÆäÀ̽º ¾÷±×·¹À̵å, Ŭ·¯½ºÅÍ(server clustering- active/active, active/passive, geographically distributed clusters) ±¸Çö ¹× Ŭ·¯½ºÅÍ/½ºÅ丮Áö ¾ÆÅ°ÅØÃ³ °í·Á, À½¼ºÅë½Å(voice communications) ³×Æ®¿öÅ© °í·Á
5) µ¥ÀÌÅÍ º¹±¸ °èȹ¼ö¸³(Planning Data Recovery) ¡Ý ÀÀ¿ëÇÁ·Î±×·¥ µ¥ÀÌÅÍ º¹±¸ ¹æ¹ý(¹é¾÷, ½ºÅ丮Áö, º¹Á¦/¹Ì·¯¸µ(replication and mirroring), ÀüÀڱݰí(electronic vaulting) µî) ¹× º¸°üÀ§Ä¡(¿ø°ÝÁö(off-site) º¸°ü µî) °áÁ¤ ¡Ý ¾îÇø®ÄÉÀ̼Ç(ºñÁî´Ï½º µ¥ÀÌÅͷμ, applications as another form of business data) º¹±¸- °èȹ¼ö¸³ ½Ã °í·Á»çÇ×(version, patches/fixes, configuration, users and roles, interfaces, customizations, pairing with OS and database versions, client systems, network considerations, change management, configuration management)
±â¾÷Àº Ãë¾àÇÑ ³ëÃâ ¸®½ºÅ©¼öÁذú ÃæÁ·ÇØ¾ß ÇÏ´Â ±ÔÁ¦¿ä°Ç(compliance) ¹× °¨³», ¿ëÀÎÇÒ ¼ö ÀÖ´Â ¾÷¹«Áß´Ü¿¡ µû¸¥ ¼Õ½Ç Á¤º¸, 󸮷® ¹× ±âÁ¸ IT ÀÎÇÁ¶óÀÇ Æ¯¼ºÀ» ¸é¹ÐÈ÷ °í·ÁÇØ ÇÕ¸®ÀûÀÎ ÀçÇØº¹±¸Àü·«À» ¼ö¸³ÇØ¾ß ÇÑ´Ù. ´Ù½Ã °Á¶ÇÏÁö¸¸ ÀÓ¼ö¼öÇà¿¡ ÀÖ¾î ÇÙ½ÉÀÌ µÇ´Â(Mission Critical) ±â¾÷ ³» Á¤º¸¿Í µ¥ÀÌÅÍ´Â ±â¾÷ÀÇ ÀÌÀͰú Á÷°áµÇ´Â Áß¿äÇÑ ÀÚ»êÀ̸ç, ÀÌ·± ÀÚ»êÀÌ º¸°ü, ¿î¿µµÇ°í ÀÖ´Â IT ½Ã½ºÅÛÀÇ Áß´Ü ¾ø´Â °¡¿ë¼º(High Availability)À» È®º¸ÇÏ´Â °ÍÀÌ ºñÁî´Ï½º¿¬¼Ó¼º ±¸ÇöÀÇ ÇÙ½ÉÀÌ´Ù. °¡»óÈ(virtualization)¿Í Ŭ¶ó¿ìµå ÄÄÇ»ÆÃ(cloud computing)°ú °°Àº Ãֽбâ¼ú·Î ÀÎÇÑ ¾÷¹«¿Í Àü»êȯ°æ º¯È µîÀ» °í·ÁÇÑ IT DRÀÇ ÃÖ±Ù µ¿Çâ¿¡ ´ëÇØ¼´Â ´ÙÀ½ È£¿¡¼ ¼Ò°³ÇϰíÀÚ ÇÑ´Ù.
< Àç³Æ÷Ä¿½º www.di-focus.com >
Âü°íÀÚ·á ¡Ü The Next Level of Disaster Recovery, John, Lindeman, Disaster Recovery Journal, 2007³â ¡Ü BS 25777: Code of Practice for Information and Communications Technology Continuity, Draft for Public Comment (DPC version) 2008³â8¿ù ¡Ü BS 24762: Information Technology - Security Guideline - Guidelines for Information and Communications Technology Disaster Recovery Services, 2008³â2¿ù ¡Ü Using Virtualization for Disaster Recovery, Gartner Research Report, 2008³â10¿ù ¡Ü What Your Business Can Learn About DR from Financial Institutions, Forrester Research, 2008³â7¿ù ¡Ü Business continuity and resiliency services - Helping business stay in business, IBM Global Technology Services, 2008³â ¹ßÇ¥ÀÚ·á ¡Ü IBM - Virtualization on the IBM Family of Servers, Software and Storage, http://www.redbooks.ibm.com/redpieces/pdfs/redp4396.pdf ¡Ü BCM, ºñÁî´Ï½º¿¬¼Ó¼º°ü¸®(Business Continuity Management): A Practical Guide, FKI¹Ìµð¾î, 2008³â |