on requirements for cloud services such as encryption, dedicated instances, the use of multi-factor authentications, etc. The output will be a document security Architecture which will outline the processes, service and security architecture plan which will provide a clear recipe for ingesting inherited controls from a cloud computing environment, recommendations and requirements for aligning administrative and operational policy and procedure controls with the use of cloud service as well as configuration recommendation for configuring cloud services according to the specific control mitigation threat objectives.
- Chapter 3 - Analyze and Document your cloud deployment
- from Automating Security in the Cloud
- Publisher: O'Reilly Media, Inc.
- Released: September 2017
Share this highlighthttp://www.safaribooksonline.com/a/automating-security-in/7900158/