Disaster Recovery Policy

Wildfire Labs inherits the Datica Contingency Plan that establishes procedures to recover Wildfire Labs following a disruption resulting from a disaster. This Disaster Recovery Policy is maintained by the Datica Security Officer and Privacy Officer.

The following objectives have been established for this plan:

  1. Maximize the effectiveness of contingency operations through an established plan that consists of the following phases:

    • Notification/Activation Phase: to detect and assess damage and to activate the plan;

    • Recovery Phase: to restore temporary IT operations and recover damage done to the original system;

    • Reconstitution Phase: to restore IT system processing capabilities to normal operations.

  2. Identify the activities, resources, and procedures needed to carry out Datica processing requirements during prolonged interruptions to normal operations.

  3. Identify and define the impact of interruptions to Datica and Wildfire Labs systems.

  4. Assign responsibilities to designated personnel and provide guidance for recovering Wildfire Labs during prolonged periods of interruption to normal operations.

  5. Ensure coordination with other Datica staff who will participate in the contingency planning strategies.

  6. Ensure coordination with external points of contact and vendors who will participate in the contingency planning strategies.

This Wildfire Labs Contingency Plan has been developed as required under the Office of Management and Budget (OMB) Circular A-130, Management of Federal Information Resources, Appendix III, November 2000, and the Health Insurance Portability and Accountability Act (HIPAA) Final Security Rule, Section §164.308(a)(7), which requires the establishment and implementation of procedures for responding to events that damage systems containing electronic protected health information.

This Wildfire Labs Contingency Plan is created under the legislative requirements set forth in the Federal Information Security Management Act (FISMA) of 2002 and the guidelines established by the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-34, titled “Contingency Planning Guide for Information Technology Systems” dated June 2002.

The Wildfire Labs Contingency Plan also complies with the following federal and departmental policies:

  • The Computer Security Act of 1987;

  • OMB Circular A-130, Management of Federal Information Resources, Appendix III, November 2000;

  • Federal Preparedness Circular (FPC) 65, Federal Executive Branch Continuity of Operations, July 1999;

  • Presidential Decision Directive (PDD) 67, Enduring Constitutional Government and Continuity of Government Operations, October 1998;

  • PDD 63, Critical Infrastructure Protection, May 1998;

  • Federal Emergency Management Agency (FEMA), The Federal Response Plan (FRP), April 1999;

  • Defense Authorization Act (Public Law 106-398), Title X, Subtitle G, “Government Information Security Reform,” October 30, 2000

Examples of the types of disasters that would initiate this plan are natural disaster, political disturbances, man made disaster, external human threats, internal malicious activities.

Wildfire Labs defined two categories of systems from a disaster recovery perspective.

  1. Critical Systems: These systems host application servers and database servers or are required for functioning of systems that host application servers and database servers. These systems, if unavailable, affect the integrity of data and must be restored, or have a process begun to restore them, immediately upon becoming unavailable.

  2. Non-critical Systems: These are all systems not considered critical by definition above. These systems, while they may affect the performance and overall security of critical systems, do not prevent Critical systems from functioning and being accessed appropriately. These systems are restored at a lower priority than critical systems.

Applicable Standards

HITRUST Common Security Framework

  • 12.c - Developing and Implementing Continuity Plans Including Information Security

HIPAA Security Rule

  • 164.308(a)(7)(i) - Contingency Plan

Line of Succession

The following order of succession is to ensure that decision-making authority for the Wildfire Labs Contingency Plan is uninterrupted. The Chief Executive Officer, Nick Keezer, is responsible for ensuring the safety of personnel and the execution of procedures documented within this Wildfire Labs Contingency Plan. If the CEO is unable to function as the overall authority or chooses to delegate this responsibility to a successor, the COO shall function as that authority. To provide contact initiation should the contingency plan need to be initiated, please use the contact list below.

  1. Nick Keezer, Co-founder and CEO: nkeezer@wildfire-labs.com

  2. Melissa Bailey, Co-founder and COO: mbailey@wildfire-labs.com

Responsibilities

The following teams have been developed and trained to respond to a contingency event affecting the IT system.

  1. The Infrastructure Team is responsible for recovery of the Wildfire Labs hosted environment, network devices, and all servers. Members of the team include personnel who are also responsible for the daily operations and maintenance of Wildfire Labs. The team leader is the CPO and directs the Infrastructure Team.

  2. The Engineering Team is responsible for assuring all application servers, web services, and platform add-ons are working. It is also responsible for testing redeployments and assessing damage to the environment. The team leader is the CTO and directs the Engineering Team.

Testing and Maintenance

The CEO and COO shall establish criteria for validation/testing of a Contingency Plan, an annual test schedule, and ensure implementation of the test. This process will also serve as training for personnel involved in the plan’s execution. At a minimum the Contingency Plan shall be tested annually (within 365 days). The types of validation/testing exercises include tabletop and technical testing. Contingency Plans for all application systems must be tested at a minimum using the tabletop testing process. However, if the application system Contingency Plan is included in the technical testing of their respective support systems that technical test will satisfy the annual requirement.

  1. Tabletop Testing: conducted in accordance with the CMS Risk Management Handbook, Volume 2. The primary objective of the tabletop test is to ensure designated personnel are knowledgeable and capable of performing the notification/activation requirements and procedures as outlined in the CP, in a timely manner. The exercises include, but are not limited to:

    • Testing to validate the ability to respond to a crisis in a coordinated, timely, and effective manner, by simulating the occurrence of a specific crisis.

  2. Technical Testing: the primary objective of the technical test is to ensure the communication processes and data storage and recovery processes can function at an alternate site to perform the functions and capabilities of the system within the designated requirements. Technical testing shall include, but is not limited to:

    • Process from backup system at the alternate site;

    • Restore system using backups; and

    • Switch computer and storage resources to an alternate processing site.

Disaster Recovery Procedures

Notification and Activation Phase

This phase addresses the initial actions taken to detect and assess damage inflicted by a disruption to Wildfire Labs. Based on the assessment of the Event, sometimes according to the Wildfire Labs Incident Response Policy, the Contingency Plan may be activated by either the CEO or the COO.

The notification sequence is listed below:

  • The first responder is to notify the Security Officer. All known information must be relayed to the Security Officer.

  • The Security Officer is to contact the Datica team and inform them of the event. Datica and Wildfire Labs are to begin assessment procedures.

  • The Datica CTO is to notify team members and direct them to complete the assessment procedures outlined below to determine the extent of damage and estimated recovery time. If damage assessment cannot be performed locally because of unsafe conditions, the Datica CTO is to follow the steps below.

    • Damage Assessment Procedures:

    • The CTO and Manager of Infrastructure are to logically assess damage, and begin to formulate a plan for recovery.

    • Alternate Assessment Procedures:

    • Upon notification from the CSO, the VP of Engineering is to follow the procedures for damage assessment with combined Infrastructure and Engineering Teams.

  • The Wildfire Labs Contingency Plan is to be activated if one or more of the following criteria are met:

    • Wildfire Labs will be unavailable for more than 48 hours.

    • Hosting facility is damaged and will be unavailable for more than 24 hours.

    • Other criteria, as appropriate and as defined by Wildfire Labs.

    • If the plan is to be activated, the Security Officer is to notify and inform team members of the details of the event and if relocation is required.

    • Upon notification from the Security Officer, group leaders and managers are to notify their respective teams. Team members are to be informed of all applicable information and prepared to respond and relocate if necessary.

    • The Security Officer is to notify remaining personnel and executive leadership on the general status of the incident.

    • Notification can be messaged by email or phone.

Recovery Phase

This section provides procedures for recovering the application at an alternate site, whereas other efforts are directed to repair damage to the original system and capabilities.

The following procedures are for recovering the Wildfire Labs infrastructure at the alternate site. Procedures are outlined per team required. Each procedure should be executed in the sequence it is presented to maintain efficient operations.

Recovery Goal: The goal is to rebuild Wildfire Labs infrastructure to a production state.

The tasks outlined below are not sequential and some can be run in parallel.

  1. Contact Partners and Customers affected - Customer Success

  2. Assess damage - Engineering

  3. Begin replication of new environment using automated and tested scripts, currently Ansible.

  4. Test new environment using pre-written tests - Engineering

  5. Test logging, security, and alerting functionality - Infrastructure

  6. Assure systems are appropriately patched and up to date. - Infrastructure

  7. Deploy environment to production - Engineering

  8. Update DNS to new environment. - Infrastructure

Reconstitution Phase

This section discusses activities necessary for restoring Wildfire Labs operations at the original or new site and relies and procedures performed by the Datica team. The goal is to restore full operations within 24 hours of a disaster or outage. When the hosted data center at the original or new site has been restored, Datica operations at the alternate site may be transitioned back. The goal is to provide a seamless transition of operations from the alternate site to the computer center.

  1. Original or New Site Restoration

    • Begin replication of new environment using automated and tested scripts, currently Chef and Salt. - Dev Ops at Datica

    • Test new environment using pre-written tests. - Web Services at Datica

    • Test logging, security, and alerting functionality. - Dev Ops at Datica

    • Deploy environment to production - Web Services at Datica

    • Assure systems are appropriately patched and up to date. - Dev Ops at Datica

    • Update DNS to new environment. - Dev Ops at Datica

  2. Plan Deactivation

    • If the Datica environment is moved back to the original site from the alternative site, all hardware used at the alternate site should be handled and disposed of according to the Datica Disposal Media Policy.

Last updated