O'Reilly logo
  • Lex Pedersen thinks this is interesting:

on requirements for cloud services such as encryption, dedicated instances, the use of multi-factor authentications, etc. The output will be a document security Architecture which will outline the processes, service and security architecture plan which will provide a clear recipe for ingesting inherited controls from a cloud computing environment, recommendations and requirements for aligning administrative and operational policy and procedure controls with the use of cloud service as well as configuration recommendation for configuring cloud services according to the specific control mitigation threat objectives.

From

Cover of Automating Security in the Cloud

Note

Project A