Identify the Components of Your Cloud Security Architecture – Phases 1-4

Author(s): Isaac Kinsella, Shastri Sooknanan

1 Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

Info-Tech has developed an approach to identifying the components of a cloud security architecture that is built on the strong foundations the NIST 800-53 control set. In tandem with the considerations from the Cloud Security Alliance, Info-Tech has created a robust reference model that lets you know what you need to secure your cloud workloads. The blueprint:

  • Focuses on control areas that are likely to present a specific challenge in the cloud (e.g. data protection and log and event management).
  • Highlights how the different service models (SaaS, PaaS, and IaaS) present different security challenges and offers resolutions to these challenges.
  • Helps with understanding the risks with your cloud workloads and the associating mitigating services.
  • Includes a reference architecture to plot and plan your next cloud security moves for a securely planned architecture.
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171