Cloud computing offers several key advantages to organizations, including reduced costs, automation, hardware independence, high availability, and increased flexibility. Use of cloud technology also alters the risk landscape, impacting confidentiality, privacy, integrity, regulatory compliance, availability, and e-discovery, as well as incident response and forensics. Therefore, it is important to ensure that proper security controls are in place.
Foundstone’s Cloud Computing Readiness Check covers all major cloud computing architectures, including Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). Foundstone consultants create a custom methodology that accounts for your unique requirements. The Cloud Computing Readiness Check includes the following review phases:
Architecture & Design Review
In the Architecture & Design Review phase of the assessment, Foundstone consultants examine:
Cloud Infrastructure Security Review
Assess the logical network, applications, and services hosted by the cloud. The key steps of this phase include:
Governance, Policies & Procedures Review
The policies, procedures, and regulations followed by the cloud vendor may not be consistent with your requirements and expectations. This assessment compares the vendor’s policies and procedures against industry best practices and regulatory compliance requirements that are specific to your organization. Based on the results, policies, procedures, and service legal agreements can be developed to bridge identified gaps. The areas covered as part of this review include:
All Foundstone projects are managed using our proven Security Engagement Process (SEP). A critical aspect of this process is continual communication with your organization to ensure the success of your Foundstone consulting engagement. The duration of this engagement depends on the size and nature of your cloud computing efforts and project scope.