home_banner `

Content Icon

Overview of the Cloud Security Shared Responsibility Model

July 31, 2018 | Content Aggregator - Single Slide | Cloud Application and Data Controls

Not all cloud services are created equal when it comes to security. When it comes to software-as-a-service (SaaS), for example, customers are responsible for user access/identity, while the cloud service provider handles everything else.


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

IANS Cloud Security Update: Q2 2019

As organizations continue to move services and computing assets into cloud service provider environments, the need for adequate security controls grows as well. In this quarterly research report, IANS Faculty Dave Shackleford updates IANS’ clients on the new developments occurring in the cloud security arena.

Best Practices for Migrating to Office 365

Given the sheer number of options and apps available in Office 365, establishing security governance across it all can be daunting. In this Ask-an-Expert written response, IANS Faculty Matthew Chiodi emphasizes the importance of strategy and programmatic policy enforcement in the process. 

Know What and How to Monitor Within Office 365

Deciding among the multitude of monitoring and event collection options within Office 365 is difficult at best. In this Ask-an-Expert written response, IANS Faculty Mick Douglas details the most important events to monitor, and says which can be kept in the cloud and which should be pulled into your SIEM.

Best Practices for IAM and Monitoring in AWS

Strong identity and access management (IAM) and monitoring are critical to AWS success. In this Ask-an-Expert written response, IANS Faculty George Gerchow details best practices/tools for both, as well as some pitfalls to avoid.