Cloud 101CircleEventsBlog
Missed CSA's Cyber Monday sale? You can still get 50% off the CCSK + CCZT Exam & Training Bundle and Token Bundle with raincheck code 'rcdoubledip24'

Download Publication

Disaster Recovery as a Service
Disaster Recovery as a Service
Who it's for:
  • System auditors
  • System engineers
  • System architects
  • System administrators
  • Cloud engineers
  • Cloud architects
  • Cloud administrators
  • Project coordinators

Disaster Recovery as a Service

Release Date: 05/13/2021

Working Group: Security as a Service

Disaster Recovery as a Service (DRaaS) is a cloud computing service model that allows an organization to back up its data and IT infrastructure in a third-party cloud computing environment. This as-a-service model enables an organization to regain access and functionality to its IT infrastructure after a disaster. For the model to be effective, cloud service providers must supply backup and recovery that seamlessly ensures operational resilience in-line with the customer’s business and compliance requirements.

This document by the Security as a Service Working Group aims to increase awareness of recent changes in backup and disaster recovery services and technologies. We discuss the different DRaaS architectures, services offered, and security best practices, making it possible to regain access and functionality after a disaster.

Key Takeaways:
  • The proper division of shared responsibilities between the cloud provider and the cloud customer for different DRaaS services
  • The features, advantages, and disadvantages of four architectural models: one non-DRaaS model (in-house own data center no cloud) and three DRaaS models (in-house own data center with cloud, hybrid cloud, and multi-cloud)
  • The types of backup and disaster recovery services
  • Which best practice considerations should be addressed to ensure that DRaaS Services are secure, including usable checklists
  • The most significant benefits of DRaaS services and why you should use them as part of your disaster recovery plan
  • The definitions of different cloud architectures from multiple sources including NIST, ISO, and IBM
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Top Threats to Cloud Computing 2024 - Japanese Translation
Top Threats to Cloud Computing 2024 - Japanese ...
Map the Transaction Flows for Zero Trust
Map the Transaction Flows for Zero Trust
Top Concerns With Vulnerability Data
Top Concerns With Vulnerability Data
Strengthening Cybersecurity with a Resilient Incident Response Plan
Strengthening Cybersecurity with a Resilient Incident Response Plan
Published: 12/10/2024
Microsoft Power Pages: Data Exposure Reviewed
Microsoft Power Pages: Data Exposure Reviewed
Published: 12/09/2024
Why Continuous Controls Monitoring is Not GRC: Transforming Compliance and Risk Management
Why Continuous Controls Monitoring is Not GRC: Transforming Complia...
Published: 12/09/2024
AI-Enhanced Penetration Testing: Redefining Red Team Operations
AI-Enhanced Penetration Testing: Redefining Red Team Operations
Published: 12/06/2024

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.

Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. His lea...

Read more

Ashish Vashishtha
Ashish Vashishtha
Security Compliance Leader

Ashish Vashishtha

Security Compliance Leader

Analytical, results-oriented IS/IT Audit, Governance, Risk, and Compliance (GRC) leader over 19 years of experience managing enterprise-wide IT/IS security risk approach for large healthcare and IT services organizations. Passionate design thinker with an ability to harness innovation by facilitating collaboration to develop enterprise-wide security risk assessments (onsite as well as remote) for high-risk Third-Parties leveraging NIST 800-...

Read more

Shamun Mahmud
Shamun Mahmud
Senior Research Analyst, CSA

Shamun Mahmud

Senior Research Analyst, CSA

Bowen Close Headshot Missing
Bowen Close

Bowen Close

Shobhit Mehta
Shobhit Mehta

Shobhit Mehta

Shobhit Mehta is a distinguished professional with over 12 years of expertise in Governance, Risk, Compliance, and Privacy frameworks, with notable experience in the security and privacy domains. His illustrious career has seen him contribute significantly to organizations such as PayPal, HSBC, Deutsche Bank, Credit Suisse, and Fidelity Investments, where he played pivotal roles in ensuring the integrity and security of critical systems and...

Read more

Balaji Karumanchi
Balaji Karumanchi

Balaji Karumanchi

Balaji is an active contributor to several CSA working groups, including Hybrid Cloud Security and Artificial Intelligence, and has had articles published in well-known journals. Currently, he is a nationally and internationally acclaimed...

Read more

Brian Zawada Headshot Missing
Brian Zawada

Brian Zawada

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training