Overview#Availability Answers the questions of Are you there?
Availability is a should be classified as to the Data Security Impact
Availability of a Personal Entity#Availability of a Personal Entity is often referred to as Presence Reliability - as reliability increases, so does Availability . Availability of a system may also be increased by the strategy on focusing on increasing testability & maintainability and not on reliability.
Improving maintainability is generally easier than reliability. Maintainability estimates (Repair rates) are also generally more accurate. However, because the uncertainties in the reliability estimates are in most cases very large, it is likely to dominate the availability (prediction uncertainty) problem, even while maintainability levels are very high.
How Reliable Are Your Systems#The technology for Disaster Recovery and business continuity plans differs dramatically depending on the percentage of uptime that must be delivered.
Any project planning should include some statement of acceptable availability which directly influences design considerations.
This table shows the amount of time your service would be allowed to be un-avalable for each level of Availability.
|98.0000%||7.30 days||14.4 hours||3.360 hours||28.80 minutes|
|99.0000%||3.65 days||7.20 hours||1.680 hours||14.40 minutes|
|99.5000%||1.83 days||3.60 hours||50.40 minutes||7.200 minutes|
|99.9000%||8.76 hours||43.2 minutes||10.10 minutes||1.440 minutes|
|99.9900%||52.3 minutes||4.32 minutes||1.010 minutes||8.660 seconds|
|99.9990%||5.26 minutes||25.9 seconds||6.050 seconds||0.864 seconds|
|99.9999%||31.5 seconds||2.59 seconds||0.065 seconds||0.009 seconds|
Do not Over Do it#Moving up in reliability form one level to another is very costly as a percentage of the project cost.
You should balance the risk vs rewards vs the costs for each level.
More Information#There might be more information for this subject on one of the following:
- Active attacker
- Application Metrics
- Basically Available Soft state Eventual consistency
- Best Practices for LDAP Security
- CAP theorem
- Content Delivery Network
- Cryptography Objectives
- Data Security Impact
- Disaster Recovery
- Domain Name System Security Extensions
- Event Correlation
- Eventual consistency
- FIPS 199
- GCP Cloud Load Balancing
- GCP Multi-Regional
- GCP Storage Classes
- Google Cloud Storage
- Incident Management
- Information Lifecycle Management
- Internal Metrics
- Internet Corporation for Assigned Names and Numbers
- Load Balancing
- Protected Data
- Reputation System
- Runtime Application Self-Protection
- SOC 2
- Trust Tier
- Unfortunate event
- Web Blog_blogentry_080116_1