Download Publication

Who it's for:
- System auditors
- System engineers
- System architects
- System administrators
- Cloud engineers
- Cloud architects
- Cloud administrators
- Project coordinators
Disaster Recovery as a Service
Release Date: 05/13/2021
Working Group: Security as a Service
- The proper division of shared responsibilities between the cloud provider and the cloud customer for different DRaaS services
- The features, advantages, and disadvantages of four architectural models: one non-DRaaS model (in-house own data center no cloud) and three DRaaS models (in-house own data center with cloud, hybrid cloud, and multi-cloud)
- The types of backup and disaster recovery services
- Which best practice considerations should be addressed to ensure that DRaaS Services are secure, including usable checklists
- The most significant benefits of DRaaS services and why you should use them as part of your disaster recovery plan
- The definitions of different cloud architectures from multiple sources including NIST, ISO, and IBM
Download this Resource
Acknowledgements

Michael Roza
Risk, Audit, Control and Compliance Professional
Since 2012 Michael has contributed to over 75 CSA projects completed by CSA's Internet of Things, Blockchain/Distributed Ledger, Top Threats, Cloud Control Matrix, Software-Defined Perimeter, Applications, Containers, and Microservices, and other working groups. In, 2020 he also served as co-chair to CSA's Enterprise Architecture and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, S...

Ashish Vashishtha
Cybersecurity - Sr. Risk Manager & Security Architect at IBM
Analytical, results-oriented IS/IT Audit, Governance, Risk, and Compliance (GRC) leader over 19 years of experience managing enterprise-wide IT/IS security risk approach for large healthcare and IT services organizations. Passionate design thinker with an ability to harness innovation by facilitating collaboration to develop enterprise-wide security risk assessments (onsite as well as remote) for high-risk Third-Parties leveraging NIST 800-...