Coursework 02 - Storage and Backup
Coursework 02 - Storage and Backup
Duration 24 - 36 hours
I heard that your team is already capable of managing and securing access to our IT infrastructure.
Next in business would be to get the storage setup and ready. Now remember, when I say storage,
we also need to figure out backup and restore services as well, so we can come up with a solid
disaster recovery plan.
As employees I think everybody needs to have access to a common folder when they come to work
and log in to their computers. Also, I think we need to have a common FTP server to get quick access
to resources such as various software and company policy documents etc. through the network. This
should be enough for a good start. We also need to backup the content in the FTP files and common
folder. At the same time we need to make sure that the common folder, FTP files, and their backups
are secure at all times. I also figured that we have access to Windows Server and Linux environments.
So I figured the following points will be helpful to go forward.
● Centralised User Management: Use Active Directory (AD) for seamless login and file access
across multiple desktops.
● Common Shared Folder: A shared folder accessible via File Explorer on Windows and file
manager on Linux.
● FTP Server: For administrators to upload software and users to download.
● Backup Solution: Daily encrypted backups of the shared folder and FTP server.
● Storage Encryption: Secure both storage and backup using encryption (for data at rest and
data in transit).
● Redundancy: Use RAID for redundancy in the storage architecture to ensure data availability.
● Management: Auditing who accessed what and a disaster recovery plan covering all the
aspects above.
1
I also sketched down the following steps.
2
c. Monitor RAID health and set up alerts for drive failures.
7. Securing the System
a. Firewall: Use firewalls on both Linux and Windows to restrict access to the shared
folder and FTP server.
b. Access Controls: Use Active Directory to manage user permissions and ensure only
authorized personnel have access to specific directories.
c. Monitoring and Auditing: Enable file access auditing to track file changes, uploads,
and downloads.
d. Security awareness training: train employees on how to use storage services
provided.
I prefer if we can come up with a POC, but I do understand we might have knowledge, time, and
resource constraints. However, I expect the team to have at least the necessary know-how in such
cases, so that we can confidently invest our time and resources if we are going to implement this.
Now this is between you and I - I used chatGPT to furnish this document in english. So even I might
not know what certain words or sentences mean. Please discuss with me if anything is not clear.
Remember, what is important is to get this done. Cheers.
Task Description
Your team represents the IT team in this company. You are supposed to study the situation, come up
with a design and a plan, implement a model solution as proof of concept along with necessary
documentation.
Requirement
1. Come up with a comprehensive set of requirements to assess the progress.
2. Develop a POC to demonstrate the design and plan.
3. Provide necessary documentation which includes (but not limited to) the system
specifications, DR plan, and user training plan.
Evaluation Criteria
Category Source Marks
Professionalism Documentation 10
3
Configuration and Implementation
Marks are awarded to the group considering the extent of the requirements fulfilled, the accuracy of
the configuration, and consistency of the knowledge in the group.
Professionalism
You are supposed to complete the activity as System Administrators. Marks are awarded to the
best-practices followed, as reflected in the documentation.
- The End -