Information Technology Policy Manual FY23-24
on SAN/NAS systems will be scheduled to run every 1 hours and be retained with 4 weekly, 7 daily and 8-hour snapshots. d. Using Cohesity replication technology all backups will be scheduled to replicate to a system located at an offsite building and will be retained until the data is no longer needed. e. Cohesity performs validations of each backup to confirm they were successfully completed. 16. An approved backup job will be scheduled to run on each SQL Database server once or more everyday. a. Full SQL database backup jobs will be scheduled to run on each SQL server every day of the week and will be retained for 30 days. Extended retention retains 4 weekly each month, 12 monthly and 1 yearly backups. b. The SQL Transactional Logs backup jobs will be scheduled to run on each SQL server every 15 minutes of every day of the week and will be retained for the same duration of the full database backup. c. All critical SQL databases will be replicated using Cohesity replication technology. d. Cohesity performs validations of each sql backup to confirm they were successfully completed. e. Infor Lawson is backed up by the AWS Cloud operations team where it is hosted. Refer to the SOC report from AWS for backup policies. 17. An approved backup job will be scheduled to run on each email On-premises Exchange Database server once or more every day. a. Using Cohesity backup technology On-premises Exchange databases are backed up daily and are kept for 30 days. Extended retention retains 4 weekly each month, 12 monthly and 1 yearly backups. b. Exchange Online databases are maintained by Microsoft. c. Exchange On-premises databases are replicated using Cohesity replication technology. d. Cohesity performs validations of each Exchange On-premises database backup to confirm they were successfully completed. 18. Active monitoring of network and Internet communications must be conducted to identify malicious activities and block intrusions and cyber-attacks. Cyber Security personnel must be alerted of any malicious activities to quickly analyze the behavior and prepare the proper response. 19. Continuity of operations plan must be defined and implemented to ensure the availability of systems and applications in the event of unforeseen disaster. The plan must include recovery procedures for systems and applications and must be tested regularly to identify gaps and areas of improvements. 20. Vulnerability assessments must be conducted regularly to identify and mitigate system and application vulnerabilities that could be exploited by unauthorized users to gain access to confidential information. Critical vulnerabilities must be mitigated in a timely manner to protect the City of Greensboro systems and information.
21. IT compliance reviews must be conducted regularly to ensure compliance to policies, procedures and standards. The reviews must include the following activities:
2 2
Made with FlippingBook flipbook maker