DEVELOP AND IMPLEMENT DATABASE BACKUP DISASTER RECOVERY TECHNIQUES
THE CRUCIAL ROLE OF DATA BACKUPS: Protecting Your Information Fortress
Data backups are the cornerstone of any effective data security strategy. They serve as a safety net, ensuring you can recover your valuable information in case of unforeseen events that threaten its availability or integrity. Here's a breakdown of the importance of data backups, along with specific examples of potential threats and how backups can mitigate them:
IMPORTANCE OF DATA BACKUPS:
Disaster Recovery: Natural disasters (floods, fires, earthquakes) or hardware failures (server crashes, disk corruption) can render your data inaccessible. Backups stored offsite or in the cloud ensure you can restore your data and resume operations quickly, minimizing downtime and potential financial losses.
Example: A company's data center suffers a fire, destroying the primary database server. Fortunately, the company had a comprehensive backup strategy in place. They were able to restore their data from secure offsite backups and resume operations within a day, minimizing disruption to their business.
Human Error: Accidental data deletion, modification, or overwriting can occur due to human mistakes. Backups provide a safety net, allowing you to restore the data to its previous state before the error.
Example: An employee accidentally deletes critical customer records while updating a database. The company can restore the data from a recent backup, preventing significant customer service issues and potential data breaches.
Ransomware Attacks: Ransomware encrypts your data, rendering it inaccessible until a ransom is paid. Backups stored securely offline or in the cloud are unaffected by such attacks. You can restore your data from the backups and avoid the hefty ransom demands.
Example: A hospital gets hit with a ransomware attack that encrypts all patient medical records. However, the hospital maintains regular backups on a secure cloud storage platform. They refuse to pay the ransom and instead restore their data from the backups, ensuring patient information remains secure and accessible.
Hardware Theft: Theft of laptops, servers, or storage devices could result in data loss. Backups safeguard your data even if hardware is stolen, allowing you to restore it from a secure location.
Example: A laptop containing sensitive financial data is stolen from an employee's home. The company has regular backups to a secure cloud storage service. The stolen data is irrelevant as the company can access and restore the information from the cloud backups.
Software Errors: Software bugs or glitches can sometimes corrupt data. Backups provide a reliable copy of your data from a known good state, allowing you to roll back to a functional version and minimize data loss.
Example: A bug in a new accounting software update corrupts a company's financial data. They were able to restore their data from a backup made before the update, preventing significant financial discrepancies and accounting issues.
THE BALANCING ACT: FACTORS AFFECTING RTO AND RTO IN BACKUPS
When it comes to data backups, two crucial objectives play a critical role: Recovery Time Objective (RTO) and Recovery Point Objective (RPO). Let's delve into the factors that influence these objectives and how they impact your data recovery strategy.
RECOVERY TIME OBJECTIVE (RTO):
RTO defines the maximum tolerable downtime after a disaster or disruption before your systems and data need to be fully operational again. It essentially reflects how long your business can afford to be without access to critical data.
FACTORS AFFECTING RTO:
Severity of Data Loss: The more critical the lost data is to your operations, the lower your RTO will be. Financial transaction systems or medical records require near-instantaneous recovery, driving a lower RTO.
Backup Frequency: The frequency of your backups directly affects RTO. More frequent backups (e.g., continuous data protection) minimize data loss between backups, leading to faster recovery times.
Recovery Infrastructure: The complexity of your recovery procedures and infrastructure can impact RTO. Automated recovery processes and readily available backups significantly reduce RTO compared to manual recovery procedures.
Network Bandwidth: The speed of your network connection influences the time it takes to restore data from backups. Faster bandwidth allows for quicker data transfer during restoration, leading to a lower RTO.
Hardware Resources: The processing power and storage capacity of your recovery environment can impact RTO. Sufficient resources ensure efficient data restoration and faster system restarts.
Example: An online banking platform has an RTO of 1 hour. This means they can tolerate a maximum of 1 hour of downtime before their systems and data need to be fully operational again to minimize financial losses and maintain customer trust.
RECOVERY POINT OBJECTIVE (RPO):
RPO defines the maximum acceptable amount of data loss that can occur between backups. It signifies how much recent data you are willing to sacrifice in the event of a disaster.
Factors Affecting RPO:
Data Change Rate: The more frequently your data changes, the lower your RTO should be. Highly dynamic data (e.g., stock market prices) requires more frequent backups to minimize data loss, resulting in a lower RPO.
Data Criticality: Critical data with a high impact on operations necessitates a lower RPO. Businesses might be willing to tolerate minimal data loss for such data, leading to a stricter RTO.
Backup Technology: The type of backup technology used influences RPO. Continuous data protection offers near-zero RPO as it backs up data constantly, while traditional periodic backups might have a higher RPO depending on the backup frequency.
Cost Considerations: Frequent backups and sophisticated backup technologies often come with higher costs. Businesses need to balance RPO requirements with budget constraints.
Compliance Regulations: Certain industries have specific data retention requirements enforced by regulations. These regulations might dictate a lower RPO to ensure compliance.
Example: An e-commerce platform has an RPO of 15 minutes. This means they are willing to accept a maximum data loss of 15 minutes worth of transactions in the event of a system failure. This balance allows them to maintain operational efficiency while keeping data loss to a minimum.
CRAFTING A COMPREHENSIVE BACKUP PLAN: A STEP-BY-STEP GUIDE
Data backups are the cornerstone of a robust data security strategy. Here's a comprehensive guide to creating a customized backup plan that protects your valuable information:
Step 1: Define Your Scope and Requirements
Identify data to be backed up: Prioritize critical data like financial records, customer information, and system configurations.
Determine RTO (Recovery Time Objective): This defines the maximum tolerable downtime after a disaster before your systems need to be operational again.
Establish RPO (Recovery Point Objective): This dictates the acceptable amount of data loss between backups.
Step 2: Choose Your Backup Methods
Full backups: Create a complete copy of all your data at regular intervals.
Incremental backups: Back up only data that has changed since the last full backup, saving time and storage space.
Differential backups: Similar to incremental, but capture changes since the last full or differential backup.
Continuous data protection (CDP): Continuously backs up data changes, offering near-zero RPO.
Step 3: Select Backup Storage
Local storage: Back up data to internal hard drives or servers (fast, but vulnerable to local disasters).
Remote storage: Back up data to offsite locations or cloud storage (more secure, but might have higher latency).
Cloud backup services: Utilize dedicated cloud backup services offering features like automatic backups and disaster recovery.
Step 4: Schedule Your Backups
Establish a backup schedule: Determine the frequency of full, incremental, and differential backups based on your RPO requirements.
Automate backups: Use automation tools to schedule and execute backups regularly, minimizing human error.
Consider continuous data protection (CDP): For critical data with a very low RPO, consider CDP for near-continuous backups.
Step 5: Verification and Testing
Verify backups regularly: Ensure backups are complete and uncorrupted to guarantee successful recovery.
Test your recovery process: Periodically perform test restores to identify and address any potential issues in your recovery procedures.
Step 6: Documentation and Training
Document your backup plan: This includes backup methods, schedules, storage locations, and recovery procedures.
Train your staff: Educate users on data backup importance, data security best practices, and how to report potential data loss incidents.
Additional Considerations:
Version control: Maintain multiple backup versions to recover previous data states if needed.
Encryption: Encrypt backups to ensure data security even if storage locations are compromised.
Compliance regulations: Adhere to industry-specific regulations or organizational policies regarding data retention and backup requirements.
RISKS ASSOCIATED WITH ACCESSING AND MANAGING BACKUPS
While backups are crucial for data recovery, accessing and managing them also presents potential security risks. Here's a breakdown of the key access-related backup risks and mitigation strategies:
1. UNAUTHORIZED ACCESS:
Risk: Unauthorized users (hackers, insiders) gaining access to backup data could lead to data theft, manipulation, or accidental deletion.
Mitigation:
Implement Access Controls: Enforce strong access controls on backup storage locations, restricting access only to authorized personnel with the minimum level of access required for their roles.
Multi-factor Authentication (MFA): Utilize MFA for accessing backup systems, adding an extra layer of security beyond passwords.
Encryption: Encrypt all backups at rest (stored) and in transit (during transfer) to render them unreadable even if intercepted.
2. PRIVILEGE ESCALATION:
Risk: Authorized users with limited access might exploit vulnerabilities to gain higher privileges and access sensitive backup data they shouldn't.
Mitigation:
Least Privilege Principle: Grant users only the minimum level of access privileges required for their tasks. This minimizes the potential damage caused by compromised accounts.
Regular Privilege Reviews: Periodically review user access controls and privileges to ensure they remain appropriate and identify any potential gaps.
3. ACCIDENTAL EXPOSURE:
Risk: Human error can lead to accidental exposure of backup data. Sharing backup data with unauthorized parties or misconfiguring access controls can compromise data security.
Mitigation:
Security Awareness Training: Train your staff on data security best practices, including handling backups securely and avoiding unauthorized data sharing.
Data Loss Prevention (DLP): Implement DLP solutions to monitor and control data movement, preventing accidental leaks or unauthorized transfers of backup data.
4. BACKUP CORRUPTION:
Risk: Backup files can become corrupted due to hardware failures, software bugs, or malware attacks. Corrupted backups become unusable, rendering them ineffective for data recovery.
Mitigation:
Regular Backup Verification: Perform routine checks to verify the integrity and consistency of your backups. This ensures they are not corrupted and can be used for successful recovery.
Multiple Backup Copies: Maintain multiple backup copies stored in different locations. This minimizes the risk of losing all your backups due to a single point of failure.
5. RANSOMWARE THREATS:
Risk: Ransomware attacks can encrypt backups alongside primary data, rendering them unusable for recovery.
Mitigation:
Air-Gap Backups: Consider storing a separate backup copy offline (air-gapped) and disconnected from the network. This backup remains inaccessible to ransomware and can be used for recovery.
Unalterable Backups: Explore immutable backup solutions that create write-once backups that cannot be modified or encrypted by malware.
BACKUP MEDIUM: the foundation for data safekeeping
A backup medium refers to the physical storage device or location where you store your
backup copies of data. Choosing the right medium is critical for ensuring the accessibility,
security, and longevity of your backups. Here's a breakdown of different backup media and
the factors to consider when making your selection:
TYPES OF BACKUP MEDIA:
Magnetic Tape: Traditional and cost-effective, but prone to physical wear and degradation
over time. Offers offline storage, making it less vulnerable to ransomware attacks.
Hard Disk Drives (HDD): High capacity at a relatively low cost, but susceptible to physical
damage and data loss due to mechanical failures.
Solid-State Drives (SSD): Faster data access speeds compared to HDDs, but generally more
expensive with lower storage capacity per unit cost. More reliable than HDDs due to lack of
moving parts.
Removable Media (USB Drives, Optical Discs): Portable and convenient for offline storage,
but limited capacity and susceptible to physical damage or loss.
Cloud Storage: Offers remote, geographically dispersed storage with high availability and
scalability. Can be more expensive than on-premises storage depending on data volume and
access frequency.
FACTORS AFFECTING BACKUP MEDIUM CHOICE:
Capacity Requirements: Consider the amount of data you need to back up. Choose a
medium with sufficient capacity to accommodate your full backups and potential future
growth.
Cost: Balance the cost of the medium itself with factors like ongoing maintenance, energy
consumption, and potential replacement costs.
Performance: Evaluate the access speed and data transfer rates of the medium. Consider
how quickly you need to restore data in case of a disaster.
Accessibility: Choose a medium that allows for easy backup and restore processes. Consider
how frequently you need to access your backups.
Security: Prioritize the security of your backups. Opt for encryption and consider offline
storage options to minimize the risk of unauthorized access or cyberattacks.
Durability: Select a medium with good data retention capabilities to ensure your backups
remain reliable for extended periods.
Disaster Recovery Needs: Think about your disaster recovery plan and how the chosen
medium facilitates restoration. Consider geographically dispersed backups for added
resilience.
Here's a table summarizing the key considerations when choosing a backup medium:
Factor
Description
Considerations
Capacity
Amount of data to be backed up
Future data growth needs
Cost
Initial and ongoing expenses
Maintenance, energy consumption, replacement costs
Performance
Data access speed and transfer rates
Restore time requirements
Accessibility
Ease of backup and restore processes
Frequency of access needed
Security
Protection against unauthorized access
Encryption, offline storage options
Durability
Data retention capabilities
Long-term reliability of backups
Disaster Recovery
Facilitates restoration after disasters
Geographically dispersed backups
CHOOSING THE RIGHT BACKUP TYPE: A Guide to Data Protection Strategies
There are various backup types, each offering distinct advantages and ideal for specific scenarios. Here's a breakdown of the most common backup methods to help you choose the most suitable one for your needs:
TYPES OF BACKUPS:
Full Backups: Create a complete copy of all your data at a specific point in time. Offers a comprehensive recovery solution, but requires significant storage space and can be time-consuming for large datasets.
Incremental Backups: Back up only data that has changed since the last full backup. Saves storage space and time compared to full backups, but requires a full backup to restore data completely.
Differential Backups: Similar to incremental backups, but capture changes since the last full or differential backup. Requires less storage than full backups but still necessitates access to a full backup for complete restoration.
Continuous Data Protection (CDP): Continuously tracks and backs up data changes, offering near-zero data loss (RPO) but requiring significant storage resources and potentially complex infrastructure.
Mirror Backups: Create an exact copy of your data on a separate storage device, enabling near-instantaneous failover in case of primary storage failure. Offers fast recovery but requires double the storage capacity.
Archive Backups: Long-term backups of data that are no longer actively used but might be required for legal or compliance purposes. Can be stored on lower-cost, slower-access media like magnetic tapes.
FACTORS TO CONSIDER WHEN SELECTING A BACKUP LOCATION:
Recovery Time Objective (RTO): Defines the maximum tolerable downtime after a disaster before your systems need to be operational again. Locations with faster access speeds facilitate quicker recovery times.
Recovery Point Objective (RPO): Dictates the acceptable amount of data loss between backups. Locations enabling frequent backups are ideal for minimizing data loss.
Accessibility: Choose a location that allows for easy backup and restore processes. Consider network bandwidth limitations or physical accessibility requirements.
Security: Prioritize the security of your backups. Opt for locations with strong access controls, encryption, and protection against cyberattacks.
Cost: Evaluate the cost of storage, network access, and potential data transfer fees associated with different backup locations.
Disaster Recovery Needs: Consider geographically dispersed backups to minimize the impact of localized disasters. Cloud storage or remote backup facilities offer geographical separation.
Compliance Regulations: Certain industries have specific data residency requirements. Choose backup locations that comply with relevant regulations.
Here's a table summarizing the key considerations when selecting a backup location:
Select locations compliant with relevant regulations
CONFIGURING BACKUP SERVERS AND RECOVERY SITES:
BACKUP SERVERS:
Hardware Selection: Choose hardware with sufficient processing power, memory (RAM), and storage capacity to handle backup jobs efficiently. Consider scalability for future data growth.
Operating System Configuration: Install a stable and reliable operating system suitable for running backup software. Configure security settings to harden the server against cyberattacks.
Backup Software Installation: Select and install a reliable backup software solution that offers features like scheduling, encryption, and compatibility with your data sources.
Storage Configuration: Configure dedicated storage for backups, ensuring sufficient space and redundancy (RAID) to protect against drive failures. Consider using a combination of local and remote storage for added resilience.
Agent Deployment (if applicable): For agent-based backup solutions, deploy agents on the systems you want to back up. These agents facilitate communication with the backup server and manage data selection and transfer.
User Access Control: Implement strict user access controls on the backup server, restricting access only to authorized personnel with the minimum level of privileges required.
RECOVERY SITES:
Location Selection: Choose a geographically dispersed location away from the primary site to minimize the impact of localized disasters. Consider factors like network connectivity and security.
Infrastructure Setup: Mirror the infrastructure of your primary site at the recovery site, including servers, storage, and networking equipment. This ensures a smooth transition in case of a disaster.
Data Replication: Establish a data replication process to keep your recovery site's data synchronized with the primary site. This minimizes data loss in case of a disaster.
Testing and Validation: Regularly test your disaster recovery plan, including failover procedures and data restoration at the recovery site. This identifies and addresses any potential issues before a real disaster strikes.
PERFORMING BACKUPS: A Step-by-Step Guide
Define Backup Scope: Identify the data sources you want to back up, including databases, files, and system configurations.
Choose Backup Type: Select the appropriate backup type (full, incremental, differential, CDP) based on your RTO and RPO requirements.
Schedule Backups: Establish a backup schedule that balances the need for frequent backups with efficiency and storage considerations. Automate backups whenever possible.
Verification and Validation: Regularly verify backup integrity to ensure they are complete and uncorrupted. Conduct test restores to validate your backup and recovery procedures.
TYPES OF DATABASE FAILURES: Understanding Your Threats
Hardware Failure: Disk failures, server crashes, or power outages can render your database inaccessible. Backups ensure data recovery even in these scenarios.
Software Errors: Bugs or glitches in database software can corrupt data. Backups provide a reliable copy of your data from a known good state.
Human Error: Accidental data deletion, modification, or overwriting can occur due to user mistakes. Backups enable you to restore the data to its previous state.
Security Threats: Cyberattacks like ransomware encryption can render your database inaccessible. Backups stored securely offline or in the cloud are unaffected and facilitate restoration.
Network Issues: Network connectivity problems can disrupt access to your database. Backups stored locally at the database server can help restore access in case of network failures.
DATABASE RECOVERY: Bringing Your Data Back From the Brink
Database recovery refers to the process of restoring a database to a consistent and functional state after a failure or corruption. This ensures the continued availability and integrity of your critical data. Here's an explanation of different recovery techniques employed to achieve this:
Backup and Restore:
This is the most common and fundamental recovery technique. It involves restoring the database from a previously created backup.
Types of Backups:
Full Backups: Create a complete copy of the entire database at a specific point in time. Offers comprehensive recovery but requires significant storage space.
Incremental Backups: Back up only data that has changed since the last full backup. Saves space but requires the full backup for complete restoration.
Differential Backups: Similar to incremental, but capture changes since the last full or differential backup. Less storage needed than full backups, but still requires access to a full backup for complete restoration.
Recovery Steps:
Identify the most recent consistent backup point before the failure.
Restore the backup to a separate server or storage location.
Validate the restored data and bring the database back online.
Logging and Rollforward/Rollback:
Transaction logs record all database modifications. They allow for recovery by either reapplying committed transactions (rollforward) or undoing uncommitted transactions (rollback).
Rollforward Recovery:
After a system crash, the database replays the committed transactions from the log to bring the database to the most recent consistent state.
Ideal for recovering from unexpected shutdowns or system crashes.
Rollback Recovery:
If a transaction fails or encounters an error, the database uses the log to undo the changes made by that transaction, ensuring data consistency.
Checkpointing:
Checkpoints are periodic snapshots of the database state captured in the transaction log. They act as a reference point for recovery.
Recovery Process:
In case of a failure, the database can roll forward transactions from the last checkpoint, significantly reducing the amount of log data required for recovery compared to a full log replay.
Checkpointing improves recovery efficiency, especially for large databases with frequent transactions.
Mirroring:
Database mirroring creates a real-time copy of the database on a separate server. This copy remains synchronized with the primary database.
Benefits:
In case of a failure on the primary server, the mirror can be quickly activated, minimizing downtime and ensuring data availability.
Offers high availability and disaster recovery capabilities.
Types of Mirroring:
Synchronous Mirroring: Transactions are committed on both the primary and mirror server simultaneously, providing the highest level of data consistency but with potential performance overhead.
Asynchronous Mirroring: Transactions are committed on the primary server first and then replicated to the mirror server, offering faster performance but with a slight lag in data consistency between the two servers.
CRAFTING A DATABASE RECOVERY POLICY AND DISASTER RECOVERY PLAN
A robust database recovery strategy hinges on two crucial elements: a comprehensive database recovery policy and a well-defined disaster recovery plan. Let's delve into the components of each to ensure your data remains secure and recoverable in the face of unforeseen events.
DATABASE RECOVERY POLICY:
This policy outlines the organization's approach to database recovery, establishing guidelines for restoring data after failures. Here's a breakdown of its key components:
Scope: Define the databases covered by the policy, including critical systems and any specific exclusions.
Recovery Time Objective (RTO): Specify the maximum tolerable downtime after a failure before the database needs to be operational again.
Recovery Point Objective (RPO): Establish the acceptable amount of data loss that can occur between backups.
Backup Strategy: Outline the types of backups employed (full, incremental, differential), their frequency, and storage locations (local, remote, cloud).
Backup Verification: Define procedures for verifying backup integrity to ensure they are complete and uncorrupted.
Testing and Validation: Establish a schedule for testing recovery procedures, including restoring databases from backups and validating data consistency.
Roles and Responsibilities: Assign roles and responsibilities for backup management, recovery procedures, and communication during disaster events.
Documentation: Maintain comprehensive documentation of the recovery policy, including procedures, contact information, and escalation protocols.
DATABASE DISASTER RECOVERY PLAN:
This plan details the specific actions to be taken in the event of a database failure or disaster. It serves as a guide for IT personnel during recovery efforts. Here's how to design and implement one:
Risk Assessment: Identify potential threats that could lead to database failures, such as hardware failures, software errors, cyberattacks, or natural disasters.
Recovery Teams: Establish dedicated teams responsible for different aspects of disaster recovery, including incident response, data restoration, and communication.
Communication Plan: Define communication protocols for notifying stakeholders during a disaster, including affected users, management, and external support providers (if needed).
Recovery Procedures: Outline detailed steps for recovering the database using your chosen backup and recovery techniques.
This includes identifying the most recent backup or checkpoint, restoring the data, validating its consistency, and bringing the database back online.
Failover and Switchover Strategies: If you employ database mirroring, define procedures for activating the mirror server in case of a primary server failure (failover) or planned maintenance (switchover).
Testing and Training: Regularly test your disaster recovery plan through simulations to identify and address any potential issues. Train recovery teams on their roles and responsibilities during a disaster.
Implementation Tips:
Automation: Automate routine tasks like backup scheduling and verification whenever possible to minimize human error and improve efficiency.
Security: Prioritize data security in backups by implementing encryption and access controls.
Version Control: Maintain multiple backup versions to allow for recovery to previous states if needed.
Compliance: Ensure your recovery plan adheres to any industry-specific regulations or organizational data retention policies.
DATABASE RECOVERY TECHNIQUES: Bringing Your Data Back Online
Database recovery techniques are the tools used to restore your database to a functional state after a failure or corruption. Here's a breakdown of some common techniques and their functionalities:
Mirroring:
Concept: Creates a real-time copy of your database on a separate server (mirror server). This copy remains synchronized with the primary database.
Benefits:
High Availability: If the primary server fails, the mirror can be quickly activated, minimizing downtime and ensuring data availability.
Disaster Recovery: Offers a geographically dispersed copy of your database in case of localized disasters affecting the primary site.
Types of Mirroring:
Synchronous Mirroring: Transactions are committed on both the primary and mirror server simultaneously, providing the highest level of data consistency but with potential performance overhead.
Asynchronous Mirroring: Transactions are committed on the primary server first and then replicated to the mirror server, offering faster performance but with a slight lag in data consistency between the two servers.
Recovery using Backups:
Concept: The most fundamental recovery technique. It involves restoring the database from a previously created backup.
Types of Backups:
Full Backups: Create a complete copy of the entire database at a specific point in time. Ideal for comprehensive recovery but requires significant storage space.
Incremental Backups: Back up only data that has changed since the last full backup. Saves storage space but requires the full backup for complete restoration.
Differential Backups: Similar to incremental, but capture changes since the last full or differential backup. Less storage needed than full backups, but still requires access to a full backup for complete restoration.
Recovery Steps:
Identify the most recent consistent backup point before the failure.
Restore the backup to a separate server or storage location.
Validate the restored data and bring the database back online.
Log-based Recovery:
Concept: Transaction logs record all database modifications. They allow for recovery by either reapplying committed transactions (rollforward) or undoing uncommitted transactions (rollback).
Recovery Techniques:
Rollforward Recovery: After a system crash, the database replays the committed transactions from the log to bring the database to the most recent consistent state. Ideal for recovering from unexpected shutdowns or system crashes.
Rollback Recovery: If a transaction fails or encounters an error, the database uses the log to undo the changes made by that transaction, ensuring data consistency.
Shadow Paging:
Concept: A technique used for faster crash recovery in certain database management systems. It maintains two copies of data pages: a "current" page in use by transactions and a "shadow" page containing the most recent committed version.
Benefits:
Faster Recovery: In case of a crash, the database can quickly switch to the shadow pages, minimizing the need for extensive log replay.
Reduced Redo Work: Since shadow pages contain committed data, only a minimal amount of redo work might be needed from the transaction log during recovery.
Checkpointing:
Concept: Periodic snapshots of the database state captured in the transaction log. They act as reference points for recovery.
Recovery Process:
In case of a failure, the database can roll forward transactions from the last checkpoint, significantly reducing the amount of log data required for recovery compared to a full log replay.
Checkpointing improves recovery efficiency, especially for large databases with frequent transactions.