cecs - Fotolia
I don't think there is any one archival technology that could be considered vastly superior to the others from a security standpoint. Each has its own advantages and disadvantages. If I had to pick a single technology as offering the most archive security, I would probably go with tape -- but with some caveats.
The reason tape may be the more secure medium is because unlike disk- and cloud-based archives, tape-based archives generally remain offline unless they are needed. It's impossible for a hacker to access the data from a tape that is not mounted in a tape drive, but rather is locked away in a vault somewhere.
Of course, some would point out the potential for tape theft. In fact, I remember getting interviewed for a data security magazine way back when Windows 2000 was first released. One of the questions I was asked was how a hacker might penetrate a Windows 2000 server. My answer at the time was that if I were attempting to hack such a server, I wouldn't directly attack the server, but rather would restore a backup tape to my own hardware and then use a combination of tools to gain access from outside the operating system.
Obviously, that was a long time ago, but I believe the lesson still holds true today. If not properly secured, backup tapes represent an easily exploitable weakness. Thankfully, there are methods to adequately protect backup tapes. For example, the tape contents can be encrypted in such a way that prevents the tape from being read by any tape drive other than the one containing the certificate that was used to perform encryption.
I say all that as a way of illustrating the point that I think tape can be very secure, but the administrator must take care to ensure the necessary archive security precautions are taken. Otherwise, anyone can access archive data simply by stealing a tape.
Best practices for data archiving
Ensuring secure electronic healthcare information storage
Dig Deeper on Tape backup and tape libraries
Related Q&A from Brien Posey
The backup-as-a-service platform is a popular use of cloud-based infrastructure. With new products and features launching, it's important to plan out... Continue Reading
IT pros must understand that their desktops' upgrade method, workload and other factors affect whether the Windows 10 system requirements are ... Continue Reading
With container storage a major trend, it's important to ensure data protection. These five guidelines will help you properly back up Docker ... Continue Reading