SQL/MP Installation and Management Guide
HP NonStop SQL/MP Installation and Management Guide—523353-004
4-1
4
Planning Database Security and
Recovery
Database security and recovery are two important topics to consider before creating a
database:
•
Planning for security and implementing an authorization scheme is the primary
protection against unauthorized user intervention. Security, however, cannot
eliminate errors by authorized users.
•
Planning for recovery is essential for protecting your database. Your recovery plan
should include protection against disk failures, software failures, application errors,
other equipment failures, catastrophic disasters, and human errors of all types.
HP NonStop software provides several online recovery mechanisms, including:
•
Mirrored disk volumes are a primary protection against disk failures. These
volumes also provide the ability to repair and maintain disk volumes online, without
interrupting application processing.
•
The TMF subsystem provides the best online protection against application or
equipment failures. When used correctly, the TMF subsystem protects the
database from program failures that would leave the database inconsistent
because of incomplete transactions.
•
The use of backup tapes of the data files can provide a way of protecting data in an
offline mode. Tapes can be physically removed from the site and saved for
possible disaster recovery.
•
The Remote Duplicate Database Facility (RDF) maintains replicated databases at
a remote site that can be used for contingency planning. As end users modify the
local database, RDF replicates those changes in the remote database, keeping it
continuously up to date. For more information about managing a replicated
SQL/MP database with RDF, see the RDF/IMP and IMPX System Management
Manual.
NonStop fault-tolerant hardware and software strategies provide maximum protection
against most equipment failures, power failures, and some catastrophic failures. This
protection, however, does not eliminate the need to plan carefully to protect your
database and application software. After formulating a comprehensive recovery
strategy, practice carrying out the plan on a regular, consistent basis.