Download Publication
Who it's for:
- System auditors
- System engineers
- System architects
- System administrators
- Cloud engineers
- Cloud architects
- Cloud administrators
- Project coordinators
Disaster Recovery as a Service
Release Date: 05/13/2021
Working Group: Security as a Service
- The proper division of shared responsibilities between the cloud provider and the cloud customer for different DRaaS services
- The features, advantages, and disadvantages of four architectural models: one non-DRaaS model (in-house own data center no cloud) and three DRaaS models (in-house own data center with cloud, hybrid cloud, and multi-cloud)
- The types of backup and disaster recovery services
- Which best practice considerations should be addressed to ensure that DRaaS Services are secure, including usable checklists
- The most significant benefits of DRaaS services and why you should use them as part of your disaster recovery plan
- The definitions of different cloud architectures from multiple sources including NIST, ISO, and IBM
Download this Resource
Prefer to access this resource without an account? Download it now.
Acknowledgements
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC
Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...
Ashish Vashishtha
Security Compliance Leader
Analytical, results-oriented IS/IT Audit, Governance, Risk, and Compliance (GRC) leader over 19 years of experience managing enterprise-wide IT/IS security risk approach for large healthcare and IT services organizations. Passionate design thinker with an ability to harness innovation by facilitating collaboration to develop enterprise-wide security risk assessments (onsite as well as remote) for high-risk Third-Parties leveraging NIST 800-...
Shamun Mahmud
Senior Research Analyst, CSA
Bowen Close
Shobhit Mehta
Shobhit Mehta is a distinguished professional with over 12 years of expertise in Governance, Risk, Compliance, and Privacy frameworks, with notable experience in the security and privacy domains. His illustrious career has seen him contribute significantly to organizations such as PayPal, HSBC, Deutsche Bank, Credit Suisse, and Fidelity Investments, where he played pivotal roles in ensuring the integrity and security of critical systems and...
Balaji Karumanchi
Balaji is an active contributor to several CSA working groups, including Hybrid Cloud Security and Artificial Intelligence, and has had articles published in well-known journals. Currently, he is a nationally and internationally acclaimed...
Brian Zawada
Interested in helping develop research with CSA?
Related Certificates & Training
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn moreFor those who want to learn from the industry's first benchmark for measuring Zero Trust skill sets, the CCZT includes foundational Zero Trust components released by CISA and NIST, innovative work in the Software-Defined Perimeter by CSA Research, and guidance from renowned Zero Trust experts such as John Kindervag, Founder of the Zero Trust philosophy.
Learn more