Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 2: Identify Your Cloud Security Requirements

Author(s): Wesley McPherson , Alan Tang , Ian Mulholland

Use the Cloud Security CAGI Tool to perform four unique assessments that will be used to identify secure cloud vendors. This phase will take you through the following activities:

  • Perform a completeness assessment.
  • Perform an auditability assessment.
  • Perform a governability assessment.
  • Perform a interoperability assessment.

Use this phase as part of the full blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments.