{"id":7049,"date":"2025-06-19T20:09:42","date_gmt":"2025-06-19T20:09:42","guid":{"rendered":"https:\/\/itbd.net\/live\/?p=7049"},"modified":"2025-07-21T18:33:52","modified_gmt":"2025-07-21T18:33:52","slug":"data-resiliency-in-the-cloud","status":"publish","type":"post","link":"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/","title":{"rendered":"Data Resiliency in the Cloud: Who\u2019s Responsible for What?"},"content":{"rendered":"<p><span data-contrast=\"auto\">What happens when data resiliency strategies fail? As per <\/span><a href=\"https:\/\/secureframe.com\/blog\/data-breach-statistics\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">secure frame report<\/span><\/a><span data-contrast=\"auto\"> the average cost of a data breach reached an all-time high in 2024 of $4.88 million, a 10% increase from 2023. Yet many businesses still believe cloud migration automatically equals bulletproof data resiliency.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Why does this misconception persist? Cloud environments have evolved far beyond traditional IT infrastructures, where simple backups sufficed. Today&#8217;s cloud responsibility model involves complex three-way accountability between cloud providers, MSPs, and customers.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">According to <\/span><a href=\"https:\/\/jumpcloud.com\/blog\/msp-statistics-trends\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Jump Cloud report<\/span><\/a><span data-contrast=\"auto\">, when almost 90% of SMBs currently use an MSP to handle some of their IT needs, understanding who&#8217;s responsible for what becomes critical for business survival.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Where do most organizations go wrong? They assume cloud equals automatic protection, creating dangerous gaps in their disaster recovery plan. This isn&#8217;t just about compliance checkboxes \u2013 it&#8217;s about preventing business-destroying incidents where data resiliency failures cascade into operational disasters.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">What Modern Data Resiliency Actually Means<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">How has data resiliency evolved beyond traditional backup concepts? Modern cloud resiliency encompasses comprehensive strategies that ensure data can withstand, adapt to, and recover from any disruption. It&#8217;s built on four critical pillars:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Availability<\/span><\/b><span data-contrast=\"auto\"> &#8211; When data is accessible to authorized users\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Integrity<\/span><\/b><span data-contrast=\"auto\"> &#8211; How data accuracy and consistency is maintained\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Confidentiality<\/span><\/b><span data-contrast=\"auto\"> &#8211; Where unauthorized access is prevented\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Recoverability<\/span><\/b><span data-contrast=\"auto\"> &#8211; What enables quick restoration after incidents<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Where do MSPs encounter these challenges most frequently? At IT events for MSP professionals and MSP Leadership events in the US, discussions increasingly center on cloud resiliency frameworks that go beyond reactive incident response toward proactive, intelligence-driven strategies.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Understanding the Complex Cloud Responsibility Model<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Who&#8217;s responsible when cloud security fails? The traditional shared responsibility model seemed straightforward \u2013 providers handle infrastructure, customers handle data. However, reality proves far more complex, especially when MSPs manage cloud environments for clients.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">What the Traditional Model Actually Covers<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">What exactly do cloud providers protect? They typically handle:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Physical infrastructure and hardware security\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Network controls and platform maintenance<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Host operating systems and hypervisor security\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Basic compliance certifications and audits<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Why do misconceptions plague this cloud responsibility model? Organizations assume that &#8220;secure&#8221; cloud environments automatically protect against all threats, leading to countless cloud security incidents where critical gaps are discovered too late.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">How MSPs Transform the Responsibility Landscape<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">When do MSPs change the accountability equation? When they enter as intermediaries, the cloud responsibility model transforms from two-party to three-stakeholder complexity. This creates provider-to-MSP-to-customer chains where communication gaps can prove catastrophic.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">What challenges emerge during MSP Leadership summit in US discussions? Industry leaders grapple with questions like: Who&#8217;s responsible when client data is compromised due to misconfigured cloud settings? How do you maintain cloud compliance when responsibilities span multiple organizations?<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">Where Industry-Specific Requirements Complicate Things<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Which regulatory frameworks shift responsibility boundaries? Healthcare organizations navigate HIPAA requirements, financial institutions handle SOX compliance, and government contractors meet FedRAMP standards. Each framework creates unique challenges within the cloud responsibility model.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">How does cloud monitoring support compliance? Modern systems track compliance metrics in real-time and alert stakeholders when configurations drift from approved baselines, essential for maintaining cloud compliance across regulatory environments.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Where Cloud Backup and Recovery Planning Falls Short<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">What are the most common data loss prevention failures? Organizations fall into several critical traps:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">False Security Assumption<\/span><\/b><span data-contrast=\"auto\"> &#8211; Believing &#8220;cloud equals automatic backup&#8221;\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Inadequate Testing<\/span><\/b><span data-contrast=\"auto\"> &#8211; Not regularly validating backup and recovery procedures\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Geographic Concentration<\/span><\/b><span data-contrast=\"auto\"> &#8211; Storing backups in same region as primary data\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Poor RTO\/RPO Planning<\/span><\/b><span data-contrast=\"auto\"> &#8211; Insufficient Recovery Time and Recovery Point Objectives<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">What makes multi-cloud approaches essential? Geographic diversity prevents regional outages from devastating business operations but requires sophisticated orchestration between different cloud platforms and their respective cloud backup systems.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">How Disaster Recovery Planning Goes Wrong<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">When do disaster recovery plans fail most often? During actual emergencies when organizations discover their plans weren&#8217;t regularly tested. Integration challenges between on-premises and cloud systems create complications requiring specialized expertise.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Where does communication break down during cloud incident response? The three-party responsibility model means incident response requires coordination between cloud providers, MSPs, and customers \u2013 any breakdown extends downtime significantly.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">What Risk Assessment Often Misses<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Which blind spots create the biggest vulnerabilities? MSPs must watch for these critical risk areas:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Vendor Lock-in Risks<\/span><\/b><span data-contrast=\"auto\"> &#8211; Lack of exit strategies from current cloud providers\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Third-party Dependencies<\/span><\/b><span data-contrast=\"auto\"> &#8211; Hidden vulnerabilities in DNS, CDN, and security services<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Compliance Gaps<\/span><\/b><span data-contrast=\"auto\"> &#8211; Regulatory requirements spanning multiple jurisdictions<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Communication Failures<\/span><\/b><span data-contrast=\"auto\"> &#8211; Unclear escalation procedures during incidents<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">How do third-party dependencies multiply risks? When cloud providers rely on additional services for DNS, content delivery, or security, the responsibility chain extends beyond the primary cloud responsibility model, creating potential failure points that aren&#8217;t immediately obvious.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">How MSPs Can Strengthen Data Resiliency<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">What strategic approaches work best for comprehensive cloud resiliency? Success depends on building layered approaches that withstand multiple failure types while maintaining business continuity.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">1. Building Effective Cloud Backup Strategies<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">How should the 3-2-1 rule adapt for cloud environments? Modern cloud backup strategies require careful planning:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-7050\" src=\"http:\/\/itbd.net\/live\/wp-content\/uploads\/2025\/06\/Data-Resiliency-Cloud-Guide-3-2-1-Rule.webp\" alt=\"Data Resiliency Cloud Guide - 3-2-1 Rule\" width=\"1200\" height=\"628\" srcset=\"https:\/\/itbd.net\/live\/wp-content\/uploads\/2025\/06\/Data-Resiliency-Cloud-Guide-3-2-1-Rule.webp 1200w, https:\/\/itbd.net\/live\/wp-content\/uploads\/2025\/06\/Data-Resiliency-Cloud-Guide-3-2-1-Rule-300x157.webp 300w, https:\/\/itbd.net\/live\/wp-content\/uploads\/2025\/06\/Data-Resiliency-Cloud-Guide-3-2-1-Rule-1024x536.webp 1024w, https:\/\/itbd.net\/live\/wp-content\/uploads\/2025\/06\/Data-Resiliency-Cloud-Guide-3-2-1-Rule-768x402.webp 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Three Copies<\/span><\/b><span data-contrast=\"auto\"> &#8211; Maintain three multiple versions of critical data\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Two Media Types<\/span><\/b><span data-contrast=\"auto\"> &#8211; Store on two different cloud platforms or storage types\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">One Copy Off-site<\/span><\/b><span data-contrast=\"auto\"> \u2013 Store one copy on different cloud providers or geographic regions\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Cross-platform compatibility ensures data restoration even when original cloud platforms become unavailable, making vendor diversification a cornerstone of effective cloud resiliency.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">2. Implementing Advanced Cloud Monitoring<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">What makes real-time threat detection effective? Systems must integrate seamlessly with existing IT Service Management (ITSM) tools, ensuring alerts translate into actionable responses. Cloud monitoring extends beyond uptime checks to include performance metrics, security assessments, and compliance tracking.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">How do early warning systems prevent outages? These systems use machine learning to identify patterns preceding failures, enabling proactive responses that can prevent outages entirely \u2013 a crucial advancement in cloud resiliency strategy.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">3. Developing Robust Cloud Incident Response<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">When do escalation procedures become critical? Different incident types require different response strategies. MSPs must have clear protocols for engaging cloud providers, notifying clients, and coordinating recovery efforts across multiple cloud platforms.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Where do communication strategies matter most? During outages when traditional channels may be affected by the same issues impacting primary services. Post-incident analysis becomes more complex but valuable for improving cloud resiliency across client portfolios.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Your Cloud Responsibility Action Plan<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">How can organizations ensure accountability in multi-stakeholder environments? This checklist approach helps MSPs ensure nothing falls through the cracks while maintaining clear audit trails for compliance.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">Cloud Provider Accountability<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">What should infrastructure verification include? Understanding exactly what cloud providers protect versus what remains customer responsibility. This extends beyond marketing materials to detailed technical specifications and regular security assessments.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">How should SLA monitoring work? MSPs must understand SLA terms and implement monitoring systems tracking performance against commitments, triggering appropriate responses when thresholds are breached.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">MSP Framework Requirements<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">When does client onboarding matter most? Comprehensive responsibility communication eliminates ambiguity about cloud security and data resiliency roles. This communication should be documented, regularly reviewed, and updated as cloud services evolve.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">What ongoing protocols maintain protection? Regular cloud backup integrity reviews, disaster recovery plan testing, and cloud risk assessment updates help maintain robust protection as business needs evolve.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Future-Proofing Your Strategy<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Where is cloud technology heading? Emerging technologies like AI and quantum computing introduce new possibilities and challenges for data resiliency. MSPs must build adaptable frameworks incorporating new technologies without requiring complete strategy overhauls.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">What regulatory trends should concern MSPs? Increased scrutiny of cloud data handling practices, with new compliance requirements emerging regularly. Strategic vendor relationships become increasingly important as organizations consolidate their technology partnerships to reduce complexity and improve cloud resiliency oversight.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">How should investment priorities align? Automation tools reducing human error, analytics platforms providing predictive insights, and training programs keeping teams current with evolving best practices. Discussions at upcoming MSP Leadership summit in US and IT events for MSP professionals will likely focus on balancing innovation with stability.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Conclusion: Mastering Cloud Data Resiliency in 2025<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Cloud data protection success requires clear stakeholder accountability: providers maintain transparency, MSPs bridge technical gaps, and customers participate actively in security responsibilities. Well-documented procedures and tested protocols separate quick recovery from extended downtime.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Robust data resiliency planning builds competitive advantages through superior reliability and enhanced client confidence. In today&#8217;s data-driven economy, protecting critical assets directly impacts bottom-line results through comprehensive cloud responsibility model implementation.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Ready to Master Data Resiliency?<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/itbd.net\/live\/\"><b><span data-contrast=\"none\">Build IT LIVE 2025<\/span><\/b><span data-contrast=\"none\"> \u2013 the top MSP conference in the US<\/span><\/a><span data-contrast=\"auto\"> \u2013 brings together industry leaders tackling these exact challenges. Get exclusive access to advanced cloud backup strategies, emerging cloud security insights, and proven cloud responsibility frameworks.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\"><a href=\"https:\/\/cvent.me\/13OxEo\" target=\"_blank\" rel=\"noopener\">Register now<\/a> for Build IT LIVE 2025<\/span><\/b><b><span data-contrast=\"auto\"> and transform your data resiliency strategy. Your competitive edge starts here.<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What happens when data resiliency strategies fail? As per secure frame report the average cost of a data breach reached an all-time high in 2024 of $4.88 million, a 10% increase from 2023. Yet many businesses still believe cloud migration automatically equals bulletproof data resiliency.\u00a0 Why does this misconception persist? Cloud environments have evolved far [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":7054,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[],"class_list":["post-7049","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-ai"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data Resiliency Cloud Guide: Who&#039;s Really Responsible?<\/title>\n<meta name=\"description\" content=\"Learn who&#039;s responsible for cloud data resiliency in the complex MSP-provider-customer model. Learn compliance gaps &amp; solutions at Build IT..\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Resiliency Cloud Guide: Who&#039;s Really Responsible?\" \/>\n<meta property=\"og:description\" content=\"Learn who&#039;s responsible for cloud data resiliency in the complex MSP-provider-customer model. Learn compliance gaps &amp; solutions at Build IT..\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"Build IT Live\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-19T20:09:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-21T18:33:52+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/itbd.net\/live\/wp-content\/uploads\/2025\/06\/Data-Resiliency-Cloud-Guide.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Rita Hayre\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rita Hayre\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/\"},\"author\":{\"name\":\"Rita Hayre\",\"@id\":\"https:\/\/itbd.net\/live\/#\/schema\/person\/102fe389369a6878c50e87da4aadbebf\"},\"headline\":\"Data Resiliency in the Cloud: Who\u2019s Responsible for What?\",\"datePublished\":\"2025-06-19T20:09:42+00:00\",\"dateModified\":\"2025-07-21T18:33:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/\"},\"wordCount\":1431,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itbd.net\/live\/wp-content\/uploads\/2025\/06\/Data-Resiliency-Cloud-Guide.webp\",\"articleSection\":[\"Security &amp; AI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/\",\"url\":\"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/\",\"name\":\"Data Resiliency Cloud Guide: Who's Really Responsible?\",\"isPartOf\":{\"@id\":\"https:\/\/itbd.net\/live\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itbd.net\/live\/wp-content\/uploads\/2025\/06\/Data-Resiliency-Cloud-Guide.webp\",\"datePublished\":\"2025-06-19T20:09:42+00:00\",\"dateModified\":\"2025-07-21T18:33:52+00:00\",\"author\":{\"@id\":\"https:\/\/itbd.net\/live\/#\/schema\/person\/102fe389369a6878c50e87da4aadbebf\"},\"description\":\"Learn who's responsible for cloud data resiliency in the complex MSP-provider-customer model. Learn compliance gaps & solutions at Build IT..\",\"breadcrumb\":{\"@id\":\"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/#primaryimage\",\"url\":\"https:\/\/itbd.net\/live\/wp-content\/uploads\/2025\/06\/Data-Resiliency-Cloud-Guide.webp\",\"contentUrl\":\"https:\/\/itbd.net\/live\/wp-content\/uploads\/2025\/06\/Data-Resiliency-Cloud-Guide.webp\",\"width\":1200,\"height\":628,\"caption\":\"Data Resiliency Cloud Guide\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itbd.net\/live\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Resiliency in the Cloud: Who\u2019s Responsible for What?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itbd.net\/live\/#website\",\"url\":\"https:\/\/itbd.net\/live\/\",\"name\":\"Build IT Live\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itbd.net\/live\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/itbd.net\/live\/#\/schema\/person\/102fe389369a6878c50e87da4aadbebf\",\"name\":\"Rita Hayre\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/943bb4ec3c4de589c30a38a0cee7801ba48212c6d0704f759cc67ecc45a56419?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/943bb4ec3c4de589c30a38a0cee7801ba48212c6d0704f759cc67ecc45a56419?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/943bb4ec3c4de589c30a38a0cee7801ba48212c6d0704f759cc67ecc45a56419?s=96&d=mm&r=g\",\"caption\":\"Rita Hayre\"},\"url\":\"https:\/\/itbd.net\/live\/author\/rita\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Resiliency Cloud Guide: Who's Really Responsible?","description":"Learn who's responsible for cloud data resiliency in the complex MSP-provider-customer model. Learn compliance gaps & solutions at Build IT..","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/","og_locale":"en_US","og_type":"article","og_title":"Data Resiliency Cloud Guide: Who's Really Responsible?","og_description":"Learn who's responsible for cloud data resiliency in the complex MSP-provider-customer model. Learn compliance gaps & solutions at Build IT..","og_url":"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/","og_site_name":"Build IT Live","article_published_time":"2025-06-19T20:09:42+00:00","article_modified_time":"2025-07-21T18:33:52+00:00","og_image":[{"width":1200,"height":628,"url":"http:\/\/itbd.net\/live\/wp-content\/uploads\/2025\/06\/Data-Resiliency-Cloud-Guide.webp","type":"image\/webp"}],"author":"Rita Hayre","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rita Hayre","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/#article","isPartOf":{"@id":"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/"},"author":{"name":"Rita Hayre","@id":"https:\/\/itbd.net\/live\/#\/schema\/person\/102fe389369a6878c50e87da4aadbebf"},"headline":"Data Resiliency in the Cloud: Who\u2019s Responsible for What?","datePublished":"2025-06-19T20:09:42+00:00","dateModified":"2025-07-21T18:33:52+00:00","mainEntityOfPage":{"@id":"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/"},"wordCount":1431,"commentCount":0,"image":{"@id":"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/itbd.net\/live\/wp-content\/uploads\/2025\/06\/Data-Resiliency-Cloud-Guide.webp","articleSection":["Security &amp; AI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/","url":"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/","name":"Data Resiliency Cloud Guide: Who's Really Responsible?","isPartOf":{"@id":"https:\/\/itbd.net\/live\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/#primaryimage"},"image":{"@id":"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/itbd.net\/live\/wp-content\/uploads\/2025\/06\/Data-Resiliency-Cloud-Guide.webp","datePublished":"2025-06-19T20:09:42+00:00","dateModified":"2025-07-21T18:33:52+00:00","author":{"@id":"https:\/\/itbd.net\/live\/#\/schema\/person\/102fe389369a6878c50e87da4aadbebf"},"description":"Learn who's responsible for cloud data resiliency in the complex MSP-provider-customer model. Learn compliance gaps & solutions at Build IT..","breadcrumb":{"@id":"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/#primaryimage","url":"https:\/\/itbd.net\/live\/wp-content\/uploads\/2025\/06\/Data-Resiliency-Cloud-Guide.webp","contentUrl":"https:\/\/itbd.net\/live\/wp-content\/uploads\/2025\/06\/Data-Resiliency-Cloud-Guide.webp","width":1200,"height":628,"caption":"Data Resiliency Cloud Guide"},{"@type":"BreadcrumbList","@id":"https:\/\/itbd.net\/live\/data-resiliency-in-the-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itbd.net\/live\/"},{"@type":"ListItem","position":2,"name":"Data Resiliency in the Cloud: Who\u2019s Responsible for What?"}]},{"@type":"WebSite","@id":"https:\/\/itbd.net\/live\/#website","url":"https:\/\/itbd.net\/live\/","name":"Build IT Live","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itbd.net\/live\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/itbd.net\/live\/#\/schema\/person\/102fe389369a6878c50e87da4aadbebf","name":"Rita Hayre","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/943bb4ec3c4de589c30a38a0cee7801ba48212c6d0704f759cc67ecc45a56419?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/943bb4ec3c4de589c30a38a0cee7801ba48212c6d0704f759cc67ecc45a56419?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/943bb4ec3c4de589c30a38a0cee7801ba48212c6d0704f759cc67ecc45a56419?s=96&d=mm&r=g","caption":"Rita Hayre"},"url":"https:\/\/itbd.net\/live\/author\/rita\/"}]}},"_links":{"self":[{"href":"https:\/\/itbd.net\/live\/wp-json\/wp\/v2\/posts\/7049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itbd.net\/live\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itbd.net\/live\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itbd.net\/live\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/itbd.net\/live\/wp-json\/wp\/v2\/comments?post=7049"}],"version-history":[{"count":0,"href":"https:\/\/itbd.net\/live\/wp-json\/wp\/v2\/posts\/7049\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itbd.net\/live\/wp-json\/wp\/v2\/media\/7054"}],"wp:attachment":[{"href":"https:\/\/itbd.net\/live\/wp-json\/wp\/v2\/media?parent=7049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itbd.net\/live\/wp-json\/wp\/v2\/categories?post=7049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itbd.net\/live\/wp-json\/wp\/v2\/tags?post=7049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}