cecs - Fotolia
I don't think there is any one archival technology that could be considered vastly superior to the others from a security standpoint. Each has its own advantages and disadvantages. If I had to pick a single technology as offering the most archive security, I would probably go with tape -- but with some caveats.
The reason tape may be the more secure medium is because unlike disk- and cloud-based archives, tape-based archives generally remain offline unless they are needed. It's impossible for a hacker to access the data from a tape that is not mounted in a tape drive, but rather is locked away in a vault somewhere.
Of course, some would point out the potential for tape theft. In fact, I remember getting interviewed for a data security magazine way back when Windows 2000 was first released. One of the questions I was asked was how a hacker might penetrate a Windows 2000 server. My answer at the time was that if I were attempting to hack such a server, I wouldn't directly attack the server, but rather would restore a backup tape to my own hardware and then use a combination of tools to gain access from outside the operating system.
Obviously, that was a long time ago, but I believe the lesson still holds true today. If not properly secured, backup tapes represent an easily exploitable weakness. Thankfully, there are methods to adequately protect backup tapes. For example, the tape contents can be encrypted in such a way that prevents the tape from being read by any tape drive other than the one containing the certificate that was used to perform encryption.
I say all that as a way of illustrating the point that I think tape can be very secure, but the administrator must take care to ensure the necessary archive security precautions are taken. Otherwise, anyone can access archive data simply by stealing a tape.
Best practices for data archiving
Ensuring secure electronic healthcare information storage
Dig Deeper on Tape backup and tape libraries
Related Q&A from Brien Posey
Disaster recovery may not be the most prominent use case for blockchain technology, but the idea of using it for data protection and recovery is ... Continue Reading
Appliance-based hyper-convergence integrates software with hardware, while software-only HCI enables you to use the hardware of your choice. Each ... Continue Reading
When failing over VMs to the cloud or a remote data center, slow data transfer speeds can spell disaster. Don't let failed replications and partial ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.