Research Publications currently filtered by Topic, Locale.
×
Download Publication
Who it's for:
- System auditors
- System engineers
- System architects
- System administrators
- Cloud engineers
- Cloud architects
- Cloud administrators
- Project coordinators
Disaster Recovery as a Service
Release Date: 05/13/2021
Working Group: Security as a Service
Disaster Recovery as a Service (DRaaS) is a cloud computing service model that allows an organization to back up its data and IT infrastructure in a third-party cloud computing environment. This as-a-service model enables an organization to regain access and functionality to its IT infrastructure after a disaster. For the model to be effective, cloud service providers must supply backup and recovery that seamlessly ensures operational resilience in-line with the customer’s business and compliance requirements.
This document by the Security as a Service Working Group aims to increase awareness of recent changes in backup and disaster recovery services and technologies. We discuss the different DRaaS architectures, services offered, and security best practices, making it possible to regain access and functionality after a disaster.
Key Takeaways:
- The proper division of shared responsibilities between the cloud provider and the cloud customer for different DRaaS services
- The features, advantages, and disadvantages of four architectural models: one non-DRaaS model (in-house own data center no cloud) and three DRaaS models (in-house own data center with cloud, hybrid cloud, and multi-cloud)
- The types of backup and disaster recovery services
- Which best practice considerations should be addressed to ensure that DRaaS Services are secure, including usable checklists
- The most significant benefits of DRaaS services and why you should use them as part of your disaster recovery plan
- The definitions of different cloud architectures from multiple sources including NIST, ISO, and IBM
Download this Resource
Prefer to access this resource without an account? Download it now.
Related Resources
Interested in helping develop research with CSA?
Related Certificates & Training
.png)
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more
Learn more
.png)
For those who want to learn from the industry's first benchmark for measuring Zero Trust skill sets, the CCZT includes foundational Zero Trust components released by CISA and NIST, innovative work in the Software-Defined Perimeter by CSA Research, and guidance from renowned Zero Trust experts such as John Kindervag, Founder of the Zero Trust philosophy.
Learn more
Learn more

.jpeg)
.jpeg)

.jpeg)