Ensure Cloud Security in IaaS, PaaS, and SaaS Environments Research & Tools
Start here – read the Executive Brief
Read our concise Executive Brief to find out why you should prioritize security in the cloud, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
- Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phases 1-5
1. Determine your cloud risk profile
Determine
your organization’s rationale for cloud adoption and what that means for your
security obligations.
- Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 1: Determine Your Cloud Risk Profile
- Secure Cloud Usage Policy
2. Identify your cloud security requirements
Use
the Cloud Security CAGI Tool to
perform four unique assessments that will be used to identify secure cloud
vendors.
- Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 2: Identify Your Cloud Security Requirements
- Cloud Security CAGI Tool
3. Evaluate vendors from a security perspective
Learn
how to assess and communicate with cloud vendors with security in mind.
- Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 3: Evaluate Vendors From a Security Perspective
- IaaS and PaaS Service Level Agreement Template
- SaaS Service Level Agreement Template
- Cloud Security Communication Deck
4. Implement your secure cloud program
Turn
your security requirements into specific tasks and develop your implementation
roadmap.
- Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 4: Implement Your Secure Cloud Program
- Cloud Security Roadmap Tool
5. Build a cloud security governance program
Build
the organizational structure of your cloud security governance program.
- Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 5: Build a Cloud Security Governance Program
- Cloud Security Governance Program Template