Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Download Publication

Disaster Recovery as a Service
Disaster Recovery as a Service
Who it's for:
  • System auditors
  • System engineers
  • System architects
  • System administrators
  • Cloud engineers
  • Cloud architects
  • Cloud administrators
  • Project coordinators

Disaster Recovery as a Service

Release Date: 05/13/2021

Working Group: Security as a Service

Disaster Recovery as a Service (DRaaS) is a cloud computing service model that allows an organization to back up its data and IT infrastructure in a third-party cloud computing environment. This as-a-service model enables an organization to regain access and functionality to its IT infrastructure after a disaster. For the model to be effective, cloud service providers must supply backup and recovery that seamlessly ensures operational resilience in-line with the customer’s business and compliance requirements.

This document by the Security as a Service Working Group aims to increase awareness of recent changes in backup and disaster recovery services and technologies. We discuss the different DRaaS architectures, services offered, and security best practices, making it possible to regain access and functionality after a disaster.

Key Takeaways:
  • The proper division of shared responsibilities between the cloud provider and the cloud customer for different DRaaS services
  • The features, advantages, and disadvantages of four architectural models: one non-DRaaS model (in-house own data center no cloud) and three DRaaS models (in-house own data center with cloud, hybrid cloud, and multi-cloud)
  • The types of backup and disaster recovery services
  • Which best practice considerations should be addressed to ensure that DRaaS Services are secure, including usable checklists
  • The most significant benefits of DRaaS services and why you should use them as part of your disaster recovery plan
  • The definitions of different cloud architectures from multiple sources including NIST, ISO, and IBM
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
HSM-as-a-Service Use Cases, Considerations, and Best Practices
HSM-as-a-Service Use Cases, Considerations, and...
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration an...
10 Tips to Guide Your Cloud Email Security Strategy
10 Tips to Guide Your Cloud Email Security Strategy
Published: 04/17/2024
The Widening Overlap Between Cloud Workloads and Cybersecurity
The Widening Overlap Between Cloud Workloads and Cybersecurity
Published: 04/17/2024
How to Audit Your Outdated Security Processes
How to Audit Your Outdated Security Processes
Published: 04/16/2024
Sealing Pandora's Box - The Urgent Need for Responsible AI Governance
Sealing Pandora's Box - The Urgent Need for Responsible AI Governance
Published: 04/12/2024

Acknowledgements

Michael Roza
Michael Roza
Head of Risk, Audit, Control and Compliance

Michael Roza

Head of Risk, Audit, Control and Compliance

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Ashish Vashishtha
Ashish Vashishtha
Security Compliance Leader

Ashish Vashishtha

Security Compliance Leader

Analytical, results-oriented IS/IT Audit, Governance, Risk, and Compliance (GRC) leader over 19 years of experience managing enterprise-wide IT/IS security risk approach for large healthcare and IT services organizations. Passionate design thinker with an ability to harness innovation by facilitating collaboration to develop enterprise-wide security risk assessments (onsite as well as remote) for high-risk Third-Parties leveraging NIST 800-...

Read more

Shamun Mahmud
Shamun Mahmud
Senior Research Analyst, CSA

Shamun Mahmud

Senior Research Analyst, CSA

This person does not have a biography listed with CSA.

Bowen Close Headshot Missing
Bowen Close

Bowen Close

This person does not have a biography listed with CSA.

Shobhit Mehta
Shobhit Mehta

Shobhit Mehta

Shobhit Mehta is a distinguished professional with over 12 years of expertise in Governance, Risk, Compliance, and Privacy frameworks, with notable experience in the security and privacy domains. His illustrious career has seen him contribute significantly to organizations such as PayPal, HSBC, Deutsche Bank, Credit Suisse, and Fidelity Investments, where he played pivotal roles in ensuring the integrity and security of critical systems and...

Read more

Balaji Karumanchi
Balaji Karumanchi

Balaji Karumanchi

Balaji is an active contributor to several CSA working groups, including Hybrid Cloud Security and Artificial Intelligence, and has had articles published in well-known journals. Currently, he is a nationally and internationally acclaimed...

Read more

Brian Zawada Headshot Missing
Brian Zawada

Brian Zawada

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training