Plan: Establishing your security scope and model
Planning is an iterative process as you mature your security model. Key steps in the planning process include:
-
Understanding the security scope – Security scope varies and depends on how the cloud is used.
-
Choosing a security model – Identify the best-fitting security model for your security use case.
-
Creating a business objective model – Define clear goals and mechanisms to measure success.
As you develop your plan, consider the following:
-
Be willing to iterate. Iteration is constant in the cloud. Iteration helps you identify gaps in the plan.
-
Do not start with services. Start with your plan instead of picking out what services you need. This helps drive your organization to its intended outcomes.