Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Download Publication

Disaster Recovery as a Service
Disaster Recovery as a Service
Who it's for:
  • System auditors
  • System engineers
  • System architects
  • System administrators
  • Cloud engineers
  • Cloud architects
  • Cloud administrators
  • Project coordinators

Disaster Recovery as a Service

Release Date: 05/13/2021

Working Group: Security as a Service

Disaster Recovery as a Service (DRaaS) is a cloud computing service model that allows an organization to back up its data and IT infrastructure in a third-party cloud computing environment. This as-a-service model enables an organization to regain access and functionality to its IT infrastructure after a disaster. For the model to be effective, cloud service providers must supply backup and recovery that seamlessly ensures operational resilience in-line with the customer’s business and compliance requirements.

This document by the Security as a Service Working Group aims to increase awareness of recent changes in backup and disaster recovery services and technologies. We discuss the different DRaaS architectures, services offered, and security best practices, making it possible to regain access and functionality after a disaster.

Key Takeaways:
  • The proper division of shared responsibilities between the cloud provider and the cloud customer for different DRaaS services
  • The features, advantages, and disadvantages of four architectural models: one non-DRaaS model (in-house own data center no cloud) and three DRaaS models (in-house own data center with cloud, hybrid cloud, and multi-cloud)
  • The types of backup and disaster recovery services
  • Which best practice considerations should be addressed to ensure that DRaaS Services are secure, including usable checklists
  • The most significant benefits of DRaaS services and why you should use them as part of your disaster recovery plan
  • The definitions of different cloud architectures from multiple sources including NIST, ISO, and IBM
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Map the Transaction Flows for Zero Trust
Map the Transaction Flows for Zero Trust
Top Concerns With Vulnerability Data
Top Concerns With Vulnerability Data
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Using Asymmetric Cryptography to Help Achieve Z...
The Lost Art of Visibility, in the World of Clouds
The Lost Art of Visibility, in the World of Clouds
Published: 11/20/2024
Group-Based Permissions and IGA Shortcomings in the Cloud
Group-Based Permissions and IGA Shortcomings in the Cloud
Published: 11/18/2024
9 Tips to Simplify and Improve Unstructured Data Security
9 Tips to Simplify and Improve Unstructured Data Security
Published: 11/18/2024
How AI Changes End-User Experience Optimization and Can Reinvent IT
How AI Changes End-User Experience Optimization and Can Reinvent IT
Published: 11/15/2024

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Ashish Vashishtha
Ashish Vashishtha
Security Compliance Leader

Ashish Vashishtha

Security Compliance Leader

Analytical, results-oriented IS/IT Audit, Governance, Risk, and Compliance (GRC) leader over 19 years of experience managing enterprise-wide IT/IS security risk approach for large healthcare and IT services organizations. Passionate design thinker with an ability to harness innovation by facilitating collaboration to develop enterprise-wide security risk assessments (onsite as well as remote) for high-risk Third-Parties leveraging NIST 800-...

Read more

Shamun Mahmud
Shamun Mahmud
Senior Research Analyst, CSA

Shamun Mahmud

Senior Research Analyst, CSA

Bowen Close Headshot Missing
Bowen Close

Bowen Close

Shobhit Mehta
Shobhit Mehta

Shobhit Mehta

Shobhit Mehta is a distinguished professional with over 12 years of expertise in Governance, Risk, Compliance, and Privacy frameworks, with notable experience in the security and privacy domains. His illustrious career has seen him contribute significantly to organizations such as PayPal, HSBC, Deutsche Bank, Credit Suisse, and Fidelity Investments, where he played pivotal roles in ensuring the integrity and security of critical systems and...

Read more

Balaji Karumanchi
Balaji Karumanchi

Balaji Karumanchi

Balaji is an active contributor to several CSA working groups, including Hybrid Cloud Security and Artificial Intelligence, and has had articles published in well-known journals. Currently, he is a nationally and internationally acclaimed...

Read more

Brian Zawada Headshot Missing
Brian Zawada

Brian Zawada

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training