SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
Security Imperatives when
  selecting your vendor
Agenda
•What are the key components of Cloud
 Computing?
•How is vendor / solution selection done?
•What are the key criteria from Cloud information
 security perspective?
•How to jump start the process of adoption of
 Cloud?
The reason we are talking about
information security here today
Simple analogy of cloud computing
       and its components
Key phases of fact based solution /
        vendor selection
Key criteria for solution and vendor
         selection for cloud
Key stakeholders in cloud security and
         their requirements
Key cloud security criteria – Information
               Security, Privacy, Compliance and Legal
Forrester                         Cloud Security Alliance                     Gartner                  Others

Data protection                   Governance and Enterprise Risk              Privileged User Access   Policy, standards, and guidelines
Identity management               Management
Physical and personnel security   Legal and Electronic Discovery              Regulatory Compliance    Transparency


Availability                      Compliance and Audit                        Data Location            Personnel security


Application security              Information Lifecycle Management            Data segregation         Third party providers


Privacy                           Portability and Interoperability            Recovery                 Legal

Business continuity and data      Traditional Security, Business Continuity   Investigative Support    Business Continuity
recovery                          and Disaster Recovery
Logs and audit trails             Data Center Operations                      Long term viability      Resource Provisioning
Unique compliance requirements    Incident Response, Notification and                                  Software assurance
                                  Remediation
Records                           Application Security                                                 Network security

                                                                                                       Host and VM security
                                  Encryption and Key Management

                                  Identity and Access Management                                       Identity and access management

                                  Virtualization                                                       Authentication

                                                                                                       Key management
                                                                                                       Cryptography
                                                                                                       Operational Security
Key cloud regulatory considerations
Detailed questions for each area - Samples
Checklist : Personnel Security
Personnel Security
• Are there policies and procedures for:
• Hiring employees who will have access to or control over cloud components?
• Pre-employment checks for personnel with privileged access?
• Are personnel security policies consistent across locations?
• Do they apply to online cloud systems and data as well as to offline systems that either stored data or to offline systems
that will be provisioned for online use?
• Is there a security education program, and if so, how extensive is it?
• Is personnel security frequently reviewed to determine if employees with access should continue to have access?
• Are personnel required to have and maintain security certifications?
• Does physical access to the CSP’s facility require background checks?

Checklist : Legal
Legal
• Where—in which jurisdiction—will data be stored?
• Where—in which jurisdiction—is the CSP incorporated?
• Does the CSP use third party providers who are not located in the same jurisdiction?
• Does the CSP subcontract any services or personnel?
• Does the CSP use a customer’s data in any manner that is not part of the service?
• Does the CSP have a documented procedure for responding to legal requests (such as a subpoena) for customer data?
• In the event of a subpoena, how does the CSP produce data for a single customer only without providing non-subpoena
data?
• Is the CSP insured against losses, including remuneration for customer losses due to CSP outages or data exposure?
Detailed questions for each area - Samples
Checklist :Third Party Providers
Third Party Providers
• Are any services or functions provided by a third party?
• If any part of a cloud is subcontracted or otherwise outsourced, does the providing party comply with the same policy
and standards that the CSP enforces?
• If used, are third party providers audited for compliance with the CSPs policies and standards?
• Does the CSP security policy (or equivalent) and governance extend to all third party providers?

Checklist : Network Security
Network Security
• What controls are in place to manage externally sourced and internally sourced attacks, including distributed denial of
service (DDoS)?
• For customers, how is isolation managed between VMs by the hypervisor?
• For customers, how is isolation managed between VMs by network hardware and routing?
• What standards or best practices are used to implement virtual network infrastructure?
• How are MAC spoofing, ARP poisoning, and so on protected against?
• How is isolation managed between customer accessed/routable systems and cloud management systems and
infrastructure?
• Is cloud customer processing dependent on off-cloud tenant components such as LDAP?
• Does the CSP perform periodic penetration testing against the cloud?
• If so, is penetration testing done both from external to the cloud and from inside the cloud and the cloud
infrastructure?
• Does the CSP perform vulnerability testing of the cloud infrastructure, cloud management, and also customer accessible
components?
• How are identified vulnerabilities tracked and addressed?
• Is vulnerability information made available to customers?
• Does the CSP allow customers to perform vulnerability testing against the customer’s own VMs or other containers?
Why is there uncertainty when it
  comes to cloud adoption
Step wise selection of vendor /
           solution
We are Big 4 Consultants.
Contact us mgmtadvisory@gmail.com for details

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011
Jonathan Sinclair
 
An Enterprise Guide to Understanding Key Management
An Enterprise Guide to Understanding Key ManagementAn Enterprise Guide to Understanding Key Management
An Enterprise Guide to Understanding Key Management
SafeNet
 
Dynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyenDynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyen
Thuan Ng
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
Symantec APJ
 
Sunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera Business & Technology Risk Consulting
Sunera Business & Technology Risk Consulting
Sunera
 

Was ist angesagt? (20)

Cloud computing 10 cloud security advantages and challenges
Cloud computing 10 cloud security advantages and challengesCloud computing 10 cloud security advantages and challenges
Cloud computing 10 cloud security advantages and challenges
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
 
Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011
 
Data security
Data securityData security
Data security
 
Cloud Auditing
Cloud AuditingCloud Auditing
Cloud Auditing
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information Protection
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
Symantec Data Insight
Symantec Data InsightSymantec Data Insight
Symantec Data Insight
 
Web security
Web securityWeb security
Web security
 
An Enterprise Guide to Understanding Key Management
An Enterprise Guide to Understanding Key ManagementAn Enterprise Guide to Understanding Key Management
An Enterprise Guide to Understanding Key Management
 
Secure Cloud Reference Architecture
Secure Cloud Reference ArchitectureSecure Cloud Reference Architecture
Secure Cloud Reference Architecture
 
Dynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyenDynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyen
 
Cloud Audit and Compliance
Cloud Audit and ComplianceCloud Audit and Compliance
Cloud Audit and Compliance
 
Data Integrity Protection
Data Integrity ProtectionData Integrity Protection
Data Integrity Protection
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
 
Data security
Data securityData security
Data security
 
Building Trust in the Cloud
Building Trust in the CloudBuilding Trust in the Cloud
Building Trust in the Cloud
 
Sunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera Business & Technology Risk Consulting
Sunera Business & Technology Risk Consulting
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 

Ähnlich wie Simple cloud security explanation

security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
Ajay Rathi
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
sucesuminas
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
MongoDB
 
Sunera business & technology risk consulting services -slide share
Sunera  business & technology risk consulting services -slide shareSunera  business & technology risk consulting services -slide share
Sunera business & technology risk consulting services -slide share
Sunera
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
OracleIDM
 

Ähnlich wie Simple cloud security explanation (20)

Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
Information Security Framework
Information Security FrameworkInformation Security Framework
Information Security Framework
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
 
Tci reference architecture_v2.0
Tci reference architecture_v2.0Tci reference architecture_v2.0
Tci reference architecture_v2.0
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
O365 security and privacy de_novo_event_july2014
O365 security and privacy de_novo_event_july2014O365 security and privacy de_novo_event_july2014
O365 security and privacy de_novo_event_july2014
 
Sunera business & technology risk consulting services -slide share
Sunera  business & technology risk consulting services -slide shareSunera  business & technology risk consulting services -slide share
Sunera business & technology risk consulting services -slide share
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Database development and security certification and accreditation plan pitwg
Database development and security certification and accreditation plan  pitwgDatabase development and security certification and accreditation plan  pitwg
Database development and security certification and accreditation plan pitwg
 
CISO_Mind_Map_and_Vulnerability_Management_Maturity_Model_1643375178.pdf
CISO_Mind_Map_and_Vulnerability_Management_Maturity_Model_1643375178.pdfCISO_Mind_Map_and_Vulnerability_Management_Maturity_Model_1643375178.pdf
CISO_Mind_Map_and_Vulnerability_Management_Maturity_Model_1643375178.pdf
 
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Introduction to Mydex CIC Personal Data Stores -  7th March 2013Introduction to Mydex CIC Personal Data Stores -  7th March 2013
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
 
CCSK.pptx
CCSK.pptxCCSK.pptx
CCSK.pptx
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 

Kürzlich hochgeladen

Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 

Kürzlich hochgeladen (20)

Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowKalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 

Simple cloud security explanation

  • 1. Security Imperatives when selecting your vendor
  • 2. Agenda •What are the key components of Cloud Computing? •How is vendor / solution selection done? •What are the key criteria from Cloud information security perspective? •How to jump start the process of adoption of Cloud?
  • 3. The reason we are talking about information security here today
  • 4. Simple analogy of cloud computing and its components
  • 5. Key phases of fact based solution / vendor selection
  • 6. Key criteria for solution and vendor selection for cloud
  • 7. Key stakeholders in cloud security and their requirements
  • 8. Key cloud security criteria – Information Security, Privacy, Compliance and Legal Forrester Cloud Security Alliance Gartner Others Data protection Governance and Enterprise Risk Privileged User Access Policy, standards, and guidelines Identity management Management Physical and personnel security Legal and Electronic Discovery Regulatory Compliance Transparency Availability Compliance and Audit Data Location Personnel security Application security Information Lifecycle Management Data segregation Third party providers Privacy Portability and Interoperability Recovery Legal Business continuity and data Traditional Security, Business Continuity Investigative Support Business Continuity recovery and Disaster Recovery Logs and audit trails Data Center Operations Long term viability Resource Provisioning Unique compliance requirements Incident Response, Notification and Software assurance Remediation Records Application Security Network security Host and VM security Encryption and Key Management Identity and Access Management Identity and access management Virtualization Authentication Key management Cryptography Operational Security
  • 9. Key cloud regulatory considerations
  • 10. Detailed questions for each area - Samples Checklist : Personnel Security Personnel Security • Are there policies and procedures for: • Hiring employees who will have access to or control over cloud components? • Pre-employment checks for personnel with privileged access? • Are personnel security policies consistent across locations? • Do they apply to online cloud systems and data as well as to offline systems that either stored data or to offline systems that will be provisioned for online use? • Is there a security education program, and if so, how extensive is it? • Is personnel security frequently reviewed to determine if employees with access should continue to have access? • Are personnel required to have and maintain security certifications? • Does physical access to the CSP’s facility require background checks? Checklist : Legal Legal • Where—in which jurisdiction—will data be stored? • Where—in which jurisdiction—is the CSP incorporated? • Does the CSP use third party providers who are not located in the same jurisdiction? • Does the CSP subcontract any services or personnel? • Does the CSP use a customer’s data in any manner that is not part of the service? • Does the CSP have a documented procedure for responding to legal requests (such as a subpoena) for customer data? • In the event of a subpoena, how does the CSP produce data for a single customer only without providing non-subpoena data? • Is the CSP insured against losses, including remuneration for customer losses due to CSP outages or data exposure?
  • 11. Detailed questions for each area - Samples Checklist :Third Party Providers Third Party Providers • Are any services or functions provided by a third party? • If any part of a cloud is subcontracted or otherwise outsourced, does the providing party comply with the same policy and standards that the CSP enforces? • If used, are third party providers audited for compliance with the CSPs policies and standards? • Does the CSP security policy (or equivalent) and governance extend to all third party providers? Checklist : Network Security Network Security • What controls are in place to manage externally sourced and internally sourced attacks, including distributed denial of service (DDoS)? • For customers, how is isolation managed between VMs by the hypervisor? • For customers, how is isolation managed between VMs by network hardware and routing? • What standards or best practices are used to implement virtual network infrastructure? • How are MAC spoofing, ARP poisoning, and so on protected against? • How is isolation managed between customer accessed/routable systems and cloud management systems and infrastructure? • Is cloud customer processing dependent on off-cloud tenant components such as LDAP? • Does the CSP perform periodic penetration testing against the cloud? • If so, is penetration testing done both from external to the cloud and from inside the cloud and the cloud infrastructure? • Does the CSP perform vulnerability testing of the cloud infrastructure, cloud management, and also customer accessible components? • How are identified vulnerabilities tracked and addressed? • Is vulnerability information made available to customers? • Does the CSP allow customers to perform vulnerability testing against the customer’s own VMs or other containers?
  • 12. Why is there uncertainty when it comes to cloud adoption
  • 13. Step wise selection of vendor / solution
  • 14. We are Big 4 Consultants. Contact us mgmtadvisory@gmail.com for details