Disaster Recovery on Cloud - Security Compliance Challenges and Best Practices

被引:0
|
作者
Rajendran, Sreenivasan [1 ]
Sundar, Karthik [1 ]
Maini, Rajat [1 ]
机构
[1] Infosys Ltd, Infrastruct Management Serv, Bangalore, Karnataka, India
关键词
Disaster Recovery; Cloud; Cloud Security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Business continuity and Disaster recovery (DR) are crucial aspects for any enterprise. With IT Infrastructure landscape becoming more and more complex and the ever increasing dependence of Business Processes on IT systems, ensuring high availability becomes more challenging. But traditional methods of DR by Hardware duplication and DATA-only back up fail to strike a balance between "Invest Less = Gain more " objective of Corporations. The methods are extremely capital, labor intensive. Whereas a perfect alternative for this traditional approach of DR is Cloud based Disaster recovery, which will reduce TCO by more than 40 percent. Also with reduction in carbon foot print it provides way for Green IT, at the same time not compromising on RTO and RPO requirements. Also they come with the ease on DR testing which seem to be a much neglected across Enterprises. A major concern that CIO have is the security compliance and the regulatory constraints that they face. Even though cloud computing has evolved over a years, the security aspects are still in nascent stage. An investment on DR on cloud will turn to be more attractive once these security compliance concerns are addressed and rectified. In the recent years we have observed that corporations are keen on virtualizing their server landscape. Since Virtualizing resources pays way for tapping the potential of cloud computing, DR on cloud becomes a key area of interest to enterprises. This holds very true in the current scenario wherein DATA CENTER Consolidation is a key focus stream across enterprises irrespective of the industry they belong to. Since ensuring security on cloud is quite challenging, it is vital that corporates have a deep understanding of the various security aspects related to cloud. Thus this paper catches the inputs on operational level details from professionals working on cloud based solutions and tries to outline the challenges faced and best practices that has to be looked upon in adopting Cloud based DR model.
引用
收藏
页码:149 / 158
页数:10
相关论文
共 50 条
  • [1] AUTOMATED ASSESSMENT OF COMPLIANCE WITH SECURITY BEST PRACTICES
    Anwar, Zahid
    Campbell, Roy
    [J]. CRITICAL INFRASTRUCTURE PROTECTION II, 2008, 290 : 173 - 187
  • [2] Recommendations and Best Practices for Cloud Enterprise Security
    Ramachandran, Muthu
    Chang, Victor
    [J]. 2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, : 983 - 988
  • [3] Federal Disaster Mental Health Response and Compliance with Best Practices
    Jody McIntyre
    Briana S. Nelson Goff
    [J]. Community Mental Health Journal, 2012, 48 : 723 - 728
  • [4] Federal Disaster Mental Health Response and Compliance with Best Practices
    McIntyre, Jody
    Goff, Briana S. Nelson
    [J]. COMMUNITY MENTAL HEALTH JOURNAL, 2012, 48 (06) : 723 - 728
  • [5] Challenges and Best Practices in Information Security Management
    McLaughlin, Mark-David
    Gogan, Janis
    [J]. MIS QUARTERLY EXECUTIVE, 2018, 17 (03) : 237 - 262
  • [6] Cloud Computing Security: Concerns, Strategies and Best Practices
    Francis, Tina
    Vadivel, S.
    [J]. 2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 205 - 207
  • [7] Decrypting SSL traffic: best practices for security, compliance and productivity
    Taylor, Adrian
    [J]. Network Security, 2019, 2019 (08): : 17 - 19
  • [8] Disaster Recovery in Single-Cloud and Multi-Cloud Environments: Issues and Challenges
    Alshammari, Mohammad M.
    Alwan, Ali A.
    Nordin, Azlin
    Al-Shaikhli, Imad Fakhri
    [J]. 2017 4TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING TECHNOLOGIES AND APPLIED SCIENCES (ICETAS), 2017,
  • [9] Network Telemetry Anonymization for Cloud Based Security Analysis - Best Practices
    Dara, Sashank
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2014, : 134 - 140
  • [10] Equating: Best practices and challenges to best practices
    Petersen, Nancy S.
    [J]. Linking and Aligning Scores and Scales, 2007, : 59 - 72