Disaster Recovery in Cloud Computing

Disaster Recovery in Cloud Computing

Disaster Recovery in Cloud Computing

Considering a cloud service offering? You’re not alone. Practically every IT organization out there is at least discussing the cloud as a way to improve services, save money, or shift workloads, and there’s good reason for that. While the cloud might not be for everyone, it has tremendous advantages for understaffed IT shops, and can offer businesses from sole proprietorship’s to multi-nationals with millions of employees services on par with anything that could be deployed internally, and at a price point that could save a ton on the budget. However, when a company moves services to an outside provider, they are also moving responsibility for all the related aspects of that service both when things are running normally, and when they are not. Disaster recovery in cloud computing is one of the most important things for any customer to consider when investigating service providers. There are some key areas you want to make sure are covered, and that you fully understand, to make sure they meet your business needs and that no surprises come up should disaster strike.

One man’s disaster is another man’s blip

I’m sure every good cloud service provider has a disaster recovery plan in place; that they have tested it and certified it, and they have geo-diverse resources available to support operations in the event of a site loss, but if I am going to consider a provider, I want to know what those are, how they are implemented, and what it will mean to me and my users. I’m also very interested in how a cloud service provider will help me in case my company is the one that experiences the disaster.

Read the SLA

Actually take the time to read and understand the SLA being offered by your cloud service provider. Ask questions and walk through scenarios to be sure you fully understand what constitutes a disaster, how that impacts your SLA, and the specifics around a DR event. Who declares a disaster, what processes and technologies are in place to minimize the impact to customers, and how long will it take to restore service. A few hours of downtime may seem like an eternity, but your business should be able to survive it, and if it can’t, maybe a cloud service is not a good fit for you, but no business should have to deal with day or multi-day long outages. You may be entitled to a credit on your account, but restoring service is much more important.

RPO

The word disaster implies that bad things have happened, and when it comes to an IT service, that usually implies data loss. Make sure you understand the recovery point objective of the service so you know just how much data loss is possible in the event disaster strikes.

RTO

Get the Recovery Time Objective out in front of all the stakeholders, and make certain they ALL understand and agree to it. Should your cloud service provider experience a disaster, they should be able to restore services within that RTO. Your boss yelling at you to call them up to yell at them to go faster will help no one, so you want to make sure everyone understands how long things will take to get back to normal.

Disaster recovery testing

More Cloud service providers offer multi-tenant than not, which means getting them to test DR on your schedule, or in cooperation with your own processes isn’t going to happen. Review their DR test plans and results, and make sure they are sufficient for any internal or external obligations you have. You may have to adapt your own DR plans and testing procedures to work within the constraints of your provider, so you want to know how this might impact audit, accreditation, or contractual obligations with your own customers before committing to a service provider.

Cloud computing has the potential to save companies large percentages of their IT budget, and to offer services that they cannot do on their own. Fully understanding how disaster recovery works in your cloud computing provider’s offering will ensure a successful adoption, and should disaster strike, getting operations back to normal with the least pain possible.

By Casper Manes on behalf of IT Channel Insight, a site for MSPs and Channel partners where you can find other related articles to disaster recovery.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…