Skip to main content
Disaster Recovery Plan

How Air recovers following a disruption from a disaster

Tyler Strand avatar
Written by Tyler Strand
Updated over 6 months ago

Examples of the types of disasters that would initiate this plan are natural disaster, political disturbances, human-made disaster, external human threats, internal malicious activities.

The following objectives have been established for this plan:

  1. Maximize the effectiveness of contingency operations through an established plan that consists of the following phases:

    1. Notification/Activation phase to detect and assess damage and to activate the plan.

    2. Recovery phase to restore temporary operations and recover damage done to the original system.

    3. Reconstitution phase to restore system processing capabilities to normal operations.

  2. Identify the activities, resources, and procedures needed to carry out Air processing requirements during prolonged interruptions to normal operations.

  3. Identify and define the impact of interruptions to Air systems.

  4. Assign responsibilities to designated personnel and provide guidance for recovering Air systems during prolonged periods of interruption to normal operations.

  5. Ensure coordination with other Air staff who will participate in the Disaster Recovery Planning strategies.

  6. Ensure coordination with external points of contact and vendors who will participate in the Disaster Recovery Planning strategies.

Air defines two categories of systems from a disaster recovery perspective:

  1. Critical Systems.
    ​
    These systems host application servers and database servers or are required for functioning of systems that host application servers and database servers. These systems, if unavailable, affect the integrity of data and must be restored, or have a process begun to restore them, immediately upon becoming unavailable.
    ​

  2. Non-critical Systems.
    ​
    These are all systems not considered critical by the definition above. These systems, while they may affect the performance and overall security of critical systems, do not prevent Critical systems from functioning and being accessed appropriately. These systems are restored at a lower priority than critical systems.

Did this answer your question?