Use this phase to codify your findings about your environments and the prioritized CIA risks, and the corrective security services to mitigate the risks. This is in tandem with the Cloud Security Architecture Reference Model, which is used to plot the security risks to services. By prioritizing the risks facing your network, you will know what you have in place and where you still need to go.
Unlock Storyboard
Get Instant Access
Our systems detected an issue with your IP. If you think this is an error please submit your concerns via our contact form.