Cloud Security
Cloud Security Implementation Services
Establish and implement secure configurations in the cloud based on best practices.
Challenges
How can we navigate the ever-evolving portfolio of cloud platform security features, select the right ones for our cloud usage and ensure that they are properly configured?
Establishing and implementing secure configurations in the cloud based on best practices continues to be a significant challenge. Misconfiguration and inadequate change control ranks second in the Cloud Security Alliance's 2019 report “Top Threats to Cloud Computing: The Egregious Eleven”. It is often the leading cause of data breaches, ranked the highest security issue in the same report.
Cloud resources are transient by nature. Resources can be spun up and torn down almost instantaneously. Traditional security approaches and perimeter-based security tools are less effective in a world of dissolving perimeters and reduced visibility. Traditional controls and change management approaches that require multiple roles and approvals may not keep pace with or be as effective in the cloud.
Securing cloud is a complex task that requires a continuous effort. At Deloitte, we take a business-aligned cloud security posture management approach to systematically reviewing cloud usage along with cyber-risk domains, highlighting potential misconfigurations and prioritising remediation with you to secure these as necessary.
-
Establish current cloud usage and configurations
We leverage the strategy and a prioritised roadmap from prior cloud security assessments to understand the existing cloud usage, applicable compliance frameworks, security gaps identified and remediation recommendations made.
-
Prioritise remediation activities
We work with you to prioritise remediation activities according to time, effort, budget and impact on the cloud security posture. We can leverage cloud platform-specific or external third-party security posture management tools.
-
Implement secure configurations
Our engineers make the required configuration changes according to remediation recommendations and cloud platform best practices in alignment with compliance framework controls.
-
Verify with cloud security posture management tools
We run a subsequent configuration scan to verify configurations and confirm that changes align with remediation recommendations, cloud platform best practices and the applicable compliance framework controls. Through these phases, we close the gaps identified by prior cloud security assessments, improve existing configurations, verify changes with subsequent configuration scans and thereby increase the cloud security posture.
- Establish current cloud usage and configurations
- Prioritise remediation activities
- Implement secure configurations
- Verify with cloud security posture management tools
We leverage the strategy and a prioritised roadmap from prior cloud security assessments to understand the existing cloud usage, applicable compliance frameworks, security gaps identified and remediation recommendations made.
We work with you to prioritise remediation activities according to time, effort, budget and impact on the cloud security posture. We can leverage cloud platform-specific or external third-party security posture management tools.
Our engineers make the required configuration changes according to remediation recommendations and cloud platform best practices in alignment with compliance framework controls.
We run a subsequent configuration scan to verify configurations and confirm that changes align with remediation recommendations, cloud platform best practices and the applicable compliance framework controls. Through these phases, we close the gaps identified by prior cloud security assessments, improve existing configurations, verify changes with subsequent configuration scans and thereby increase the cloud security posture.
Why Deloitte?
Reach out
How do you reap the transformative benefits of cloud while remaining secure and compliant? Leverage our continuous cloud security posture management approach to navigate these cloud security challenges and accelerate cloud growth with peace of mind.