home_banner `

Content Icon

Cloud Security Maturity Model

April 12, 2019 | Tools & Templates | Cloud Application and Data Controls

The IANS/Securosis Cloud Security Maturity Model shows how organizations can mature from more traditional, ad-hoc and manual processes to a point where security is fully integrated within all cloud processes and everything is centrally managed, automated and federated.


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

Cloud-Based Perimeter Protection: Key Considerations

Perimeter security products should be based on your specific environment, where your systems are located and what you are trying to protect. In this Ask-an-Expert written response, IANS Faculty Teri Radichel outlines key considerations for choosing the right tools and architecting strong cloud perimeter protections.

Gauge the Viability of the CSPM Space

How effective are cloud security posture management (CSPM) tools to date, and where is the space headed? In this Ask-an-Expert written response, IANS Faculty Dave Shackleford explains the issues facing multi-cloud deployments and how CSPM tools (as well as other options) can help.

Cloud Security: Choosing Between AWS, Azure and Google Cloud

Companies struggle to grasp the management, technological and architectural differences between Google Cloud and AWS/Azure. In this webinar, IANS Faculty Matt Chiodi explores the instances where one provider should be deployed over the other and detail which security tools work better for each.

IANS Cloud Security Update: Q2 2019

As organizations continue to move services and computing assets into cloud service provider environments, the need for adequate security controls grows as well. In this quarterly research report, IANS Faculty Dave Shackleford updates IANS’ clients on the new developments occurring in the cloud security arena.