Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Explore how the cloud changes and whether your enterprise is ready for the shift to the cloud.
Analyze the workloads that will migrated to the cloud. Consider the various domains of security in the cloud, considering the cloud’s unique risks and challenges as they pertain to your workloads.
Map your risks to services in a reference model from which to build a robust launch point for your architecture.
Map your risks to services in a reference architecture to build a robust roadmap from.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand your suitability and associated risks with your workloads as they are deployed into the cloud.
An understanding of the organization’s readiness and optimal service level for cloud security.
1.1 Workload Deployment Plan
1.2 Cloud Suitability Questionnaire
1.3 Cloud Risk Assessment
1.4 Cloud Suitability Analysis
Workload deployment plan
Determined the suitability of the cloud for your workloads
Risk assessment of the associated workloads
Overview of cloud suitability
Explore your business-critical workloads and the associated controls and mitigating services to secure them.
Address NIST 800-53 security controls and the appropriate security services that can mitigate the risks appropriately.
2.1 “A” Environment Analysis
2.2 “B” Environment Analysis
2.3 “C” Environment Analysis
2.4 Prioritized Security Controls
2.5 Effort and Risk Dashboard Overview
NIST 800-53 control mappings and relevancy
NIST 800-53 control mappings and relevancy
NIST 800-53 control mappings and relevancy
Prioritized security controls based on risk and environmental makeup
Mitigating security services for controls
Effort and Risk Dashboard
Identify security services to mitigate challenges posed by the cloud in various areas of security.
Comprehensive list of security services, and their applicability to your network environment. Documentation of your “current” state of cloud security.
3.1 Cloud Security Control Mapping
3.2 Cloud Security Architecture Reference Model Mapping
1. Cloud Security Architecture Archive Document to codify and document each of the associated controls and their risk levels to security services
2. Mapping of the codified controls onto Info-Tech’s Cloud Security Architecture Reference Model for clear security prioritization
Prepare a communication deck for executive stakeholders to socialize them to the state of your cloud security initiatives and where you still have to go.
A roadmap for improving security in the cloud.
4.1 Cloud Security Strategy Considerations
4.2 Cloud Security Architecture Communication Deck
Consider the additional security considerations of the cloud for preparation in the communication deck.
Codify all your results into an easily communicable communication deck with a clear pathway for progression and implementation of security services to mitigate cloud risks.