O'Reilly logo

Automating Security in the Cloud by Ted Steffan, Tim Sandage

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2 – Understand your requirements

Image

Moving to the cloud 

Moving to a cloud service provider may involve multiple evaluations, risk assessments and identification of the key stakeholders and workloads which will drive the organizational security posture as you migrate or enhance your already deployed resources. In order to do is successfully and without added risk there are several activities which should be followed.  This chapter will walk through several options, opportunities and recommendation organization should follow or at least evaluate as you migrate to the cloud or provide option to ensure you are more secure in the cloud if you are already using cloud services this chapter will help you remediate and security your use of the cloud.

As part of the journey to the cloud organization should review their existing policies, procedures and regulatory requirements which may be applicable to the workloads and business units which are moving into the cloud. Reviewing these requirements will help identify security requirements, security benefits and opportunities which may help reduce or remove any existing risk an organization is currently carrying.  Example: I see a lot of organization which need to run an older or deprecated operating system within the on-premise data centers due to a legacy application and are spending a lot of time, money and resources ensure this vulnerably ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required