home_banner `

Content Icon

Cloud Security Maturity Model

April 12, 2019 | Tools & Templates | Cloud Application and Data Controls

The IANS/Securosis Cloud Security Maturity Model shows how organizations can mature from more traditional, ad-hoc and manual processes to a point where security is fully integrated within all cloud processes and everything is centrally managed, automated and federated.


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

Best Practices for Migrating to Office 365

Given the sheer number of options and apps available in Office 365, establishing security governance across it all can be daunting. In this Ask-an-Expert written response, IANS Faculty Matthew Chiodi emphasizes the importance of strategy and programmatic policy enforcement in the process. 

Know What and How to Monitor Within Office 365

Deciding among the multitude of monitoring and event collection options within Office 365 is difficult at best. In this Ask-an-Expert written response, IANS Faculty Mick Douglas details the most important events to monitor, and says which can be kept in the cloud and which should be pulled into your SIEM.

Best Practices for IAM and Monitoring in AWS

Strong identity and access management (IAM) and monitoring are critical to AWS success. In this Ask-an-Expert written response, IANS Faculty George Gerchow details best practices/tools for both, as well as some pitfalls to avoid.

Achieve a Successful Cloud Migration

Migrating critical data and applications to the cloud, securely and efficiently, is no easy task. In this report, IANS Faculty George Gerchow details key strategies/best practices as well as pitfalls to avoid to ensure your migration is successful.