BDRC Overview

BDRC leverages smart discovery to automatically identify cloud assets, evaluate protection status, and deliver actionable remediation strategies. Its Protection Policy Center provides centralized governance and customizable reporting. By simplifying and optimizing disaster recovery and compliance workflows, BDRC empowers enterprises to maintain secure, compliant data environments.

Advantages

All-in-One Compliance & Protection

Alibaba Cloud's Native Data Storage Disaster Recovery Solution with Full Coverage

Visual Insights & Cross-Region Compliance

Multi-angled data protection view with score, star ratings and 3D visualization

Custom Policies & Centralized Control

Categorize and manage resources based on their usage to meet business needs

Ease of use

All-in-one policy center with guided configuration process to simplify the process

  • 01

    Unified Backup Management

    BDRC empowers enterprises to streamline cloud resource backups with adaptive, tiered protection aligned with data criticality, ensuring compliance and operational resilience.
  • 02

    Cloud Asset Backup

    BDRC provides multi-asset protection for cloud resources (ECS, OSS), ensuring rapid recovery and data integrity with automated failover and granular retention policies, delivering resilience and business continuity.
  • 03

    Tiered Data Protection

    Organize resources into protection tiers based on importance to prioritize, assess, and monitor security levels, ensuring alignment with compliance and operational requirements across diverse scenarios.
  • 04

    Compliance-Driven Data Protection

    Assess configuration health for local and off-site backups to pinpoint gaps and implement targeted solutions, ensuring compliance readiness.

Security and Compliance

  • BDRC employs a minimal-data-access architecture to ensure robust data protection.

    BDRC interacts exclusively with non-sensitive metadata (e.g., instance configurations, timestamps, permissions) and does not collect, store, or process actual user data (e.g., files, databases, application content). This design aligns with GDPR, HIPAA, and PCI-DSS compliance requirements, minimizing exposure to sensitive information.


    Secure, API-Driven Integration:
    All interactions leverage industry-standard OpenAPIs provided by cloud platforms (e.g., AWS, Azure, GCP). These APIs enable BDRC to assess data protection status (e.g., encryption settings, backup policies) without requiring direct access to underlying data. Authentication and encryption are enforced at the API level, ensuring secure, auditable access.

    Learn More >

  • BDRC adheres to security best practices by implementing strict access controls and transparent authorization mechanisms.

    Principle of Least Privilege (PoLP) Minimal Permissions:
    BDRC operates with only the essential permissions required to monitor data protection status (e.g., reading metadata, checking backup configurations). No Hidden Access: No additional or "hidden" permissions are utilized, ensuring full transparency and alignment with GDPR, SOC 2, and CIS benchmarks. Compliance Alignment: This approach minimizes attack surfaces and reduces the risk of privilege escalation, meeting global regulatory requirements.

    RAM-Based Authorization Framework Role-Based Access Control (RBAC):
    BDRC leverages Resource Access Management (RAM) identities to authenticate and authorize actions. Secure Detection & Remediation: Detecting data protection status (e.g., encryption gaps, backup failures) requires RAM-based authentication. Implementing countermeasures (e.g., enabling encryption, configuring backups) also demands explicit RAM permissions, ensuring accountability and audit-ability. Temporary Credentials: Access is granted via short-lived tokens or temporary credentials, reducing long-term exposure risks.

    Learn More >

  • BDRC ensures full traceability of all activities through detailed logging and auditing mechanisms. This provides end-to-end visibility into cloud resource monitoring, risk management, and policy enforcement.

    Scan Auditing Cloud Resource Scans:
    Every scan performed by BDRC on cloud resources (e.g., instances, storage, databases) is automatically logged, including timestamps, scope, and results. Audit Trail: Logs capture metadata such as scan triggers, configurations, and detected risks, enabling forensic analysis and compliance validation.

    Integration:
    Logs are stored in a structured format (e.g., JSON) and can be exported for integration with SIEM tools (e.g., Splunk, ELK Stack). Operation Auditing User Actions: All operations, including score queries, risk resolution workflows, policy creation, and configuration changes, are recorded with user identity, timestamp, and action details.

    Transparency:
    Logs provide a complete audit trail for governance teams to verify compliance with internal policies and external regulations (e.g., GDPR, SOC 2). Access Control: Audit logs are protected by role-based access controls (RBAC) to ensure only authorized personnel can view or modify them.

    Learn More >

Pricing

BDRC is free to use! Enhancing data protection scores or resolving risks may require paid services like ECS snapshots or Cloud Backup, depending on your implementation needs.
For more information about other costs that may arise, see Relevant Pricing.

phone Contact Us
AI Assistant Powered By QWEN