Website Monitoring Policies

Website Monitoring Policy is in place and the website is monitored periodically to address and fix the quality and compatibility issues around the following parameters:

Performance

Site download time is optimized for a variety of network connections as well as devices. All important pages of the website are tested for this.

Functionality

All modules of the website are tested for their functionality. The interactive components of the portal such as feedback forms are working smoothly.

Broken Links

The portal is thoroughly reviewed to rule out the presence of any broken links or errors.

Traffic Analysis

The site traffic is monitored to analyse the usage patterns as well as visitors.

Feedback

A proper mechanism for feedback is in place to carry out the changes and enhancements as suggested by the visitors.

Contingency Management Plan

A contingency plan is crucial to ensure preparedness and minimize the impact of defacement or natural calamities. Here are some general steps we considered while developing a contingency plan:

Risk Assessment: We have identified the potential risks and vulnerabilities our organization may face, such as defacement of property or natural calamities like floods, earthquakes, storms, or fires. We have assessed the likelihood and potential impact of each risk.

Emergency Response Team: We have established an emergency response team comprising key personnel from different departments. We have defined their roles and responsibilities in the event of an emergency. We have also designated a team leader who will coordinate the response efforts.

Communication Plan: We have established a clear communication plan to ensure effective communication with employees, stakeholders, and the public. This plan includes multiple channels of communication, such as email, text messages, social media, and designated communication points.

Data Backup and Recovery: We regularly backup critical data and store it securely in the cloud. We have established a data recovery plan to ensure the restoration of essential systems and data in the event of defacement or data loss.

Physical Security Measures: We have implemented security measures to protect our organization’s assets, including surveillance systems, access controls, and alarms. We have also considered measures to protect against vandalism or defacement.

Insurance Coverage: We have reviewed and updated insurance policies to ensure they adequately cover potential damages resulting from defacement or natural calamities. We have consulted with insurance experts to understand the coverage and claims process.

Training and Drills: We regularly conduct training sessions and emergency drills to educate employees about emergency procedures and their roles during an emergency. These drills help ensure that everyone is prepared and familiar with the contingency plan.

Recovery and Restoration: We have developed strategies for post-event recovery and restoration of normal operations. We have identified key priorities, such as damage assessment, repairs, resuming essential services, and supporting affected employees.

Regular Plan Review and Updates: We continuously review and update our contingency plan to incorporate lessons learned from drills, real events, or changes in the organization’s structure or operations. We also ensure that the plan remains current and relevant.

Business continuity plan

Developing a business continuity plan (BCP) specific to organization involves a thorough understanding of operations, critical processes, and potential risks. Here are some key steps we have considered to create a business continuity plan:

Business Impact Analysis (BIA): We have conducted a comprehensive assessment of our organization’s critical functions, processes, and dependencies and identified potential risks, determined the impact of disruptions on our operations, such as financial loss, reputational damage, and customer dissatisfaction.

Risk Assessment: We have evaluated the risks specific to our organization, including natural disasters, cyber threats, supply chain disruptions, and any other potential hazards and prioritized the risks based on their likelihood and impact on our business.

Recovery Objectives: We have determined the recovery time objectives (RTO) and recovery point objectives (RPO) for each critical process. RTO defines the acceptable downtime for a process, while RPO determines the maximum data loss permissible.

Continuity Strategies: We have developed strategies to mitigate the impact of disruptions and ensure continuity of operations. This includes redundant systems, alternative suppliers, backup facilities, cloud-based services, and remote work arrangements. We have considered the costs, feasibility, and effectiveness of each strategy.

Emergency Response Plan: We have established an emergency response team and defined their roles and responsibilities during an emergency. We have created a clear communication plan to ensure effective internal and external communication during the crisis. We have also identified primary and alternate means of communication.

Data Backup and Recovery: We have implemented a robust data backup and recovery system. We regularly backup critical data and ensure secure offsite storage or cloud-based solutions. We also test data recovery procedures to ensure data integrity and availability.

Incident Management: We have developed procedures to identify, report, and respond to incidents promptly. We have established protocols for escalation, decision-making, and coordination during an emergency and trained employees on incident management processes and their roles.

Testing and Training: We regularly conduct BCP drills and exercises to test the effectiveness of the plan. We identify gaps or areas for improvement and update the plan accordingly. We also provide training to employees on their roles and responsibilities during an emergency.

Plan Maintenance and Review: We continuously review and update our business continuity plan as our organization evolves or new risks emerge. We keep contact lists, emergency procedures, and recovery strategies up to date. We also conduct periodic audits to ensure compliance with the plan.

Defacement of the website under business continuity plan

Addressing the defacement of a website as part of a business continuity plan involves specific steps to restore the website’s functionality, reputation, and security. Here is the approach we have for dealing with website defacement:

Detection and Response:

We monitor our website regularly to detect any signs of defacement. Implement security measures like intrusion detection systems and web application firewalls to aid in early detection.

As soon as defacement is detected, we trigger our incident response plan and notify our designated response team.

We assess the extent of the defacement and gather evidence. Take screenshots or capture the defaced pages for documentation purposes.

Isolate and Investigate:

We immediately isolate the affected website to prevent further damage or compromise.

We conduct a thorough investigation to determine the cause and extent of the defacement. Identify any potential vulnerabilities or weaknesses in our website’s security.

Restore from Backup:

We initiate the restoration process from a known backup that predates the defacement. Ensure that the backup is clean and free from any malicious code or vulnerabilities.

We verify the integrity of the backup and validate that the restored website is functioning correctly.

Patch and Secure:

We identify and address any vulnerabilities or weaknesses that led to the defacement. Update our website’s software, plugins, themes, and any other components to their latest versions.

We implement robust security measures, such as strong authentication mechanisms, regular security audits, and web application firewalls, to safeguard against future defacement attempts.

Review and Test:

We conduct a thorough review of the incident and identify any lessons learned. Assess the effectiveness of our response and recovery efforts.

We perform penetration testing or vulnerability assessments to identify and address any remaining security gaps.

Regularly test our website’s security and functionality to ensure ongoing protection against defacement or other threats.

Communication and Reputation Management:

We have developed a communication plan to inform our stakeholders, customers, and users about the incident, the steps taken to address it, and any measures implemented to prevent future incidents.

We are transparent and proactive in addressing any concerns or questions raised by stakeholders.

We monitor our website’s reputation and respond promptly to any negative impact resulting from the defacement. We engage in public relations activities as necessary to restore trust and confidence.

Data corruption as per DR

Resolving data corruption from a Disaster Recovery (DR) site involves a systematic approach to restore data integrity and ensure business continuity. Here are the general steps to address data corruption from a DR site:

Identify and Isolate Corrupted Data:

Determine the scope and extent of the data corruption. Identify the specific files, databases, or systems affected by the corruption.

Isolate the corrupted data to prevent further damage or spreading of the corruption. This involve disconnecting affected systems from the network or disabling access to corrupted files.

Determine the Source and Cause:

Investigate the cause of the data corruption. It could be due to hardware failures, software bugs, human error, malware, or other factors.

Determine whether the corruption originated from the primary site or occurred during the replication process to the DR site. This information helps in identifying the appropriate resolution steps.

Restore from Backup:

With clean backups of the affected data, initiate the restoration process from a known good backup. Ensure that the backup is unaffected by the data corruption.

Verify the integrity of the backup and validate the restored data to ensure it matches the expected state.

Data Synchronization and Reconciliation:

If the data corruption occurred during replication to the DR site, initiate a synchronization process to reconcile the corrupted data.

Depending on the replication method and technologies used, consult the documentation or contact the vendor for guidance on how to synchronize and resolve any discrepancies.

Data Repair and Recovery:

In cases where the corrupted data cannot be restored from backups or synchronization alone, consider data repair techniques. This involve using specialized tools or engaging data recovery experts to salvage and repair the corrupted data.

Data Validation and Testing:

Once the data restoration and repair processes are complete, validate the integrity and accuracy of the recovered data. Perform thorough testing and verification to ensure that the data is usable and free from corruption.

System and Process Improvements:

Analyse the root cause of the data corruption incident and identify any underlying vulnerabilities or weaknesses in systems or processes.

Implement appropriate measures to prevent future data corruption incidents. This involve hardware upgrades, software patches or updates, improved backup and replication procedures, or enhanced data validation checks.

Documentation and Communication:

Document the steps taken to resolve the data corruption issue, including the root cause analysis and the actions performed to recover the data.

Communicate with relevant stakeholders, such as IT teams, management, and affected users, to keep them informed about the incident, resolution, and any preventive measures implemented.

Natural disasters according to DR and DC and vice versa

DR (Disaster Recovery) and DC (Data Centre) are closely related concepts, and they both play critical roles in mitigating the impact of natural disasters on business operations. Here’s an overview of how they relate to each other:

Disaster Recovery (DR):

DR refers to the strategies, processes, and procedures put in place to recover and restore critical business functions and IT systems after a disruptive event, such as a natural disaster.

A DR plan outlines the steps to be taken to minimize downtime, recover data, and resume operations in the event of a disaster.

DR typically involves maintaining redundant systems, data backups, and alternate infrastructure at an off-site location to ensure business continuity.

Data Centre (DC):

A data centre is a physical facility that houses computer systems, servers, networking equipment, and storage resources required for processing and storing data.

Data centres are designed to provide a controlled and secure environment for housing critical IT infrastructure.

They include redundant power supplies, cooling systems, fire suppression measures, and physical security measures to protect the equipment and ensure uninterrupted operation.

Interconnection between DR and DC in the context of natural disasters:

DR Site Location:

The DR site is typically located in a geographically separate area from the primary data centre to mitigate the impact of localized natural disasters. For example, if the primary data centre is in a flood-prone area, the DR site may be situated in a region less susceptible to flooding.

Data Replication and Backup:

Data replication is a key component of DR, where critical data is continuously or periodically copied from the primary data centre to the DR site. This ensures that in the event of a natural disaster, the most up-to-date data is available for recovery and restoration.

Backup copies of data are stored at the DR site, often using techniques such as tape backups, disk-to-disk backups, or cloud-based backups. These backups provide additional layers of data protection and help facilitate recovery.

Failover and Recovery Procedures:

In the event of a natural disaster that affects the primary data centre, DR procedures are initiated to switch operations to the DR site seamlessly. This can involve activating redundant systems, restoring data from backups, and redirecting network traffic.

The DR plan outlines the specific steps and processes required to recover and restore critical systems and operations, ensuring minimal disruption and downtime.

Continuous Monitoring and Testing:

Both the primary data centre and the DR site are subject to continuous monitoring to ensure their availability and readiness to handle potential disasters.

Regular testing and validation of the DR plan and systems are conducted to ensure their effectiveness and identify any areas for improvement. These tests simulate disaster scenarios and assess the ability to recover data and resume operations.

Disaster Recovery (DR):

Natural disasters, such as hurricanes, earthquakes, floods, wildfires, or severe storms, pose a threat to the availability and integrity of IT systems and data.

DR focuses on implementing strategies and procedures to recover IT infrastructure, applications, and data after a disaster occurs. This includes restoring critical systems, data, and operations to minimize downtime and ensure business continuity.

DR plans consider the potential impact of various natural disasters on the primary data centre and define procedures to shift operations to a secondary site (DR site) if the primary site becomes unavailable or compromised.

DR sites are typically geographically distant from the primary data centre, reducing the risk of both sites being affected by the same natural disaster.

Data Centres (DC):

Data centres are facilities that house IT infrastructure, including servers, storage systems, networking equipment, and power and cooling infrastructure.

The location of data centres is crucial in mitigating the risks posed by natural disasters. It’s important to choose data centre locations that are less prone to specific natural disasters common to the region, such as areas with low flood risk or seismic activity.

Data centres implement physical security measures, redundancy in power and cooling systems, fire suppression systems, and other disaster mitigation techniques to protect the infrastructure from natural disasters.

Data centres also employ backup systems and data replication techniques to ensure data availability and minimize the risk of data loss in the event of a natural disaster.

Interdependence:

Natural disasters can impact both the primary data centre and the DR site, depending on their geographical proximity and the scope of the disaster.

To mitigate this risk, organizations opt for geographically diverse DR sites located in areas less prone to the same types of natural disasters as the primary data centre. This helps ensure that if one site is affected, the other site remains operational.

Data replication and backup mechanisms, such as asynchronous replication or cloud-based backups, used to maintain up-to-date copies of critical data at the DR site, reducing the risk of data loss in case of a disaster.

Testing and Preparedness:

Regular testing and drills are essential for both DR and DC to assess their readiness in the face of natural disasters.

Organizations conduct simulated disaster scenarios, such as table top exercises or full-scale recovery tests, to validate the effectiveness of DR plans and procedures.

Data centres regularly review and update disaster mitigation strategies, including physical security measures, infrastructure redundancies, and compliance with relevant safety and building codes.

Website Security Policy

The Pune Metropolitan Region Development Authority (PMRDA) uses secured servers for this website. We have taken a number of steps to safeguard the integrity of its data and to provide reasonable protection of private information that is in our possession.

For information security purposes, the computer systems that host our website, employs software programs to monitor network traffic to identify unauthorized attempts to compromise its devices. If security monitoring reveals possible evidence of criminal activity, information pertaining to such activity may be provided to law enforcement officials.