Your game plan for
secure cloud adoption
Migrating to the cloud securely needn’t be complicated. By
following ten simple steps before engaging cloud service
providers (CSPs) you can take a clear-headed approach to
migration and avoid becoming bogged down in detail.
Next month at CSA Congress EMEA 2015, I’ll be explaining how to develop a
winning cloud adoption game plan in detail and the checklist below highlights
the key points forming the basis of my presentation.
These ten steps will help you define your adoption strategy, highlight key require-
ments and make the right decisions about processes and business and technical
controls. Read on to discover if your organisation is match-fit for cloud adoption.
Simplified Security for Cloud Adoption - Define your game plan www.iacs-llp.com
Information Assurance
Consulting Services
Scope
Start by determining
the scope of the task
ahead. Identify the sys-
tems and applications
you want to migrate
to the cloud and the
practical implications
of doing so. This will
form the basis of your
strategy and help you
focus on priorities.
01
Why?
Ask yourself why you’re
migrating your chosen ap-
plication or systems to the
cloud and stop to sense-
check your decisions. We
recommend a maximum of
five key objectives.
02
Why not?
List your top five
concerns in relation to
the objectives you’ve
chosen. It’s likely these
will be predominately
security-related, but
also consider factors
such as availability,
cost of migration, and
additional resource
needed.
03
Review
Review steps 1 to 3 and
ensure the objectives
and concerns you’ve
examined are directly
relevant to the project
scope. This will help
you retain focus on
what’s critical to your
organisation.
04
Assess
criticality
Next, assess the criticality
of your assets. We recom-
mend implementing a 1
to 3 score based on low,
medium or high criticality,
then assigning it at an ap-
plication estate level. This
will enable you to cate-
gorise assets in batches.
For example, a market
analysis application
estate might include
fifteen individual assets,
all of which can be
covered by assigning
them the same level of
criticality.
05
Engage and
demand
Now you’ve got a game
plan, you’re ready to
kick-off your cloud migra-
tion. Equipped with the
knowledge gained over
the course of this process,
you’re prepared to engage
cloud service providers and
demand the technical and
process controls that are
right for your organisation.
10
Choose
solutions
Next, match specific controls
to your requirement. Not all
of these will be technical and
you may be able to overcome
challenges with existing or
new processes. Equally, new
hires may be necessary.
Before investing in people or
technology, ensure these will
enable you to deliver the spe-
cific benefits identified within
the scope of your project.
09
Define
requirements
Define your key security
requirements based on the
output of the threat modelling
you’ve conducted. Firstly,
ensure you can mitigate the
80% of generic security risks,
but concentrate time and re-
sources on guarding against
the 20% of cloud-specific
threats.
08
06
Apply the
80 / 20 Principle
It’s likely that 80% of your
risk is generic across your
estate and therefore, as
all assets have the same
criticality, they should
be treated similarly.
The remaining 20% is
specific and bespoke to
your cloud migration and
requires more time and
effort. By segmenting
your assets into these two
groups and applying the
same level of security to
each, you can safeguard
all of your assets efficient-
ly and cost-effectively.
07
Threat
modelling
By identifying the
specific threats other
organisations in your
sector or industry have
faced, you can define
the right type of counter
measures to protect your
organisation. The Cloud
Security Alliance, PwC
and Verizon all publish
reliable, industry-specific
research on a regular
basis, providing you with
a robust starting point for
threat modelling.
Your game plan for
secure cloud adoption.
Simplified Security for Cloud Adoption - Define your game plan www.iacs-llp.com
Learn how to implement these steps effectively by attending my presentation at
CSA Congress EMEA 2015 on 17 November. I’ll be speaking at 14:00 during
Track 2: Strategies, Governance, Risk Management.

More Related Content

PDF
Cloud Adoption and Risk Report 2019
PPTX
Cloud Adoption Framework Phase one-moving to the cloud
PPTX
Cloud Adoption Plan - Strategy phase
PPTX
Enterprise Cloud Strategy & Adoption
PPTX
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
PPTX
Cloud Adoption Plan - Planning phase
PDF
RightScale Webinar: The Five Critical Steps to Develop a Cloud Strategy
PPTX
Azure cloud governance deck
Cloud Adoption and Risk Report 2019
Cloud Adoption Framework Phase one-moving to the cloud
Cloud Adoption Plan - Strategy phase
Enterprise Cloud Strategy & Adoption
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Cloud Adoption Plan - Planning phase
RightScale Webinar: The Five Critical Steps to Develop a Cloud Strategy
Azure cloud governance deck

What's hot (17)

PPTX
Omaha DevOps Meetup - Sept 2018
PDF
Architecting your Cloud Strategy - Part One.vsdx
PDF
December 2014 Webinar - Planning Your 2015 Cloud Strategy
PDF
AgilePath Cloud Playbook Strategy Template
PDF
Developing Your Cloud Strategy
PDF
AWS cloud adoption framework (caf)
PDF
Creating an Operating Model to enable a high frequency organization
PPT
SOA Governance in the Cloud Webinar Slides
PDF
Getronics - Governance and the Cloud
PDF
Enterprise grade disaster recovery without breaking the bank
PDF
Enterprise Cloud Strategy Framework
PPTX
Softchoice Discovery Series: Cloud Cost Governance
PPTX
Developing a Holistic Cloud Strategy Webinar
PDF
Where are you at on your journey from on-premise SAP HCM to SuccessFactors th...
PPTX
A Model-Driven Approach to Support Cloud Migration Process- A Language Infras...
PPTX
Enterprise Cloud Transformation
PPTX
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Omaha DevOps Meetup - Sept 2018
Architecting your Cloud Strategy - Part One.vsdx
December 2014 Webinar - Planning Your 2015 Cloud Strategy
AgilePath Cloud Playbook Strategy Template
Developing Your Cloud Strategy
AWS cloud adoption framework (caf)
Creating an Operating Model to enable a high frequency organization
SOA Governance in the Cloud Webinar Slides
Getronics - Governance and the Cloud
Enterprise grade disaster recovery without breaking the bank
Enterprise Cloud Strategy Framework
Softchoice Discovery Series: Cloud Cost Governance
Developing a Holistic Cloud Strategy Webinar
Where are you at on your journey from on-premise SAP HCM to SuccessFactors th...
A Model-Driven Approach to Support Cloud Migration Process- A Language Infras...
Enterprise Cloud Transformation
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Ad

Viewers also liked (13)

PDF
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
PPTX
Roles and Responsibilities | RACI
PDF
Christophe feltus introduction to iso 38500 v1 0
PDF
Superior it governance with iso 38500.key
PDF
Re-Architect Your Legacy Environment To Enable An Agile, Future-Ready Enterprise
PDF
IT Governance
PDF
Cobit 5 for information security
PDF
Security Framework for Digital Risk Managment
PPT
3.5 ICT Policies
PDF
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
PDF
Effective GOVERNANCE in Project Portfolio Management
PPT
It Policies
PPTX
Program governance Structure
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
Roles and Responsibilities | RACI
Christophe feltus introduction to iso 38500 v1 0
Superior it governance with iso 38500.key
Re-Architect Your Legacy Environment To Enable An Agile, Future-Ready Enterprise
IT Governance
Cobit 5 for information security
Security Framework for Digital Risk Managment
3.5 ICT Policies
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
Effective GOVERNANCE in Project Portfolio Management
It Policies
Program governance Structure
Ad

Similar to Secure Cloud Adoption - Checklist (20)

PDF
Simplifying Security for Cloud Adoption - Defining your game plan
PDF
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
PDF
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
PDF
SIEM Buyer's Guide
PDF
5 must haves - cloud confidence
PDF
10-TOP-IT-INITIATIVES_6-6-16
PDF
Cloud Security, Standards and Applications
PDF
Cloud services and it security
PPT
Legal And Regulatory Issues Cloud Computing...V2.0
PPTX
Cloud Computing Security Essentials for beginners
PDF
The Roadmap to a Successful Cloud Strategy_ Steps to Implementation.pdf
PPTX
Evolution security controls towards Cloud Services
PDF
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
PDF
5-Ways-To-Future-Proof-Your-SIEM-Securonix[1].pdf
PDF
7 Steps To Developing A Cloud Security Plan
PDF
Risk management for cloud computing hb final
PDF
Elevating Cloud Security Testing- Strategies & Solutions.pdf
PDF
Azure Security.pdf
PDF
Migrating to Cloud? 5 motivations and 10 key security architecture considerat...
Simplifying Security for Cloud Adoption - Defining your game plan
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
SIEM Buyer's Guide
5 must haves - cloud confidence
10-TOP-IT-INITIATIVES_6-6-16
Cloud Security, Standards and Applications
Cloud services and it security
Legal And Regulatory Issues Cloud Computing...V2.0
Cloud Computing Security Essentials for beginners
The Roadmap to a Successful Cloud Strategy_ Steps to Implementation.pdf
Evolution security controls towards Cloud Services
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
5-Ways-To-Future-Proof-Your-SIEM-Securonix[1].pdf
7 Steps To Developing A Cloud Security Plan
Risk management for cloud computing hb final
Elevating Cloud Security Testing- Strategies & Solutions.pdf
Azure Security.pdf
Migrating to Cloud? 5 motivations and 10 key security architecture considerat...

Recently uploaded (20)

PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Hybrid model detection and classification of lung cancer
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Five Habits of High-Impact Board Members
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Modernising the Digital Integration Hub
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Unlock new opportunities with location data.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Getting started with AI Agents and Multi-Agent Systems
PPT
Geologic Time for studying geology for geologist
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
1 - Historical Antecedents, Social Consideration.pdf
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Hybrid model detection and classification of lung cancer
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Five Habits of High-Impact Board Members
Module 1.ppt Iot fundamentals and Architecture
Getting Started with Data Integration: FME Form 101
Modernising the Digital Integration Hub
NewMind AI Weekly Chronicles – August ’25 Week III
Unlock new opportunities with location data.pdf
Developing a website for English-speaking practice to English as a foreign la...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Tartificialntelligence_presentation.pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Group 1 Presentation -Planning and Decision Making .pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Getting started with AI Agents and Multi-Agent Systems
Geologic Time for studying geology for geologist

Secure Cloud Adoption - Checklist

  • 1. Your game plan for secure cloud adoption Migrating to the cloud securely needn’t be complicated. By following ten simple steps before engaging cloud service providers (CSPs) you can take a clear-headed approach to migration and avoid becoming bogged down in detail. Next month at CSA Congress EMEA 2015, I’ll be explaining how to develop a winning cloud adoption game plan in detail and the checklist below highlights the key points forming the basis of my presentation. These ten steps will help you define your adoption strategy, highlight key require- ments and make the right decisions about processes and business and technical controls. Read on to discover if your organisation is match-fit for cloud adoption. Simplified Security for Cloud Adoption - Define your game plan www.iacs-llp.com Information Assurance Consulting Services Scope Start by determining the scope of the task ahead. Identify the sys- tems and applications you want to migrate to the cloud and the practical implications of doing so. This will form the basis of your strategy and help you focus on priorities. 01 Why? Ask yourself why you’re migrating your chosen ap- plication or systems to the cloud and stop to sense- check your decisions. We recommend a maximum of five key objectives. 02 Why not? List your top five concerns in relation to the objectives you’ve chosen. It’s likely these will be predominately security-related, but also consider factors such as availability, cost of migration, and additional resource needed. 03 Review Review steps 1 to 3 and ensure the objectives and concerns you’ve examined are directly relevant to the project scope. This will help you retain focus on what’s critical to your organisation. 04
  • 2. Assess criticality Next, assess the criticality of your assets. We recom- mend implementing a 1 to 3 score based on low, medium or high criticality, then assigning it at an ap- plication estate level. This will enable you to cate- gorise assets in batches. For example, a market analysis application estate might include fifteen individual assets, all of which can be covered by assigning them the same level of criticality. 05 Engage and demand Now you’ve got a game plan, you’re ready to kick-off your cloud migra- tion. Equipped with the knowledge gained over the course of this process, you’re prepared to engage cloud service providers and demand the technical and process controls that are right for your organisation. 10 Choose solutions Next, match specific controls to your requirement. Not all of these will be technical and you may be able to overcome challenges with existing or new processes. Equally, new hires may be necessary. Before investing in people or technology, ensure these will enable you to deliver the spe- cific benefits identified within the scope of your project. 09 Define requirements Define your key security requirements based on the output of the threat modelling you’ve conducted. Firstly, ensure you can mitigate the 80% of generic security risks, but concentrate time and re- sources on guarding against the 20% of cloud-specific threats. 08 06 Apply the 80 / 20 Principle It’s likely that 80% of your risk is generic across your estate and therefore, as all assets have the same criticality, they should be treated similarly. The remaining 20% is specific and bespoke to your cloud migration and requires more time and effort. By segmenting your assets into these two groups and applying the same level of security to each, you can safeguard all of your assets efficient- ly and cost-effectively. 07 Threat modelling By identifying the specific threats other organisations in your sector or industry have faced, you can define the right type of counter measures to protect your organisation. The Cloud Security Alliance, PwC and Verizon all publish reliable, industry-specific research on a regular basis, providing you with a robust starting point for threat modelling. Your game plan for secure cloud adoption. Simplified Security for Cloud Adoption - Define your game plan www.iacs-llp.com Learn how to implement these steps effectively by attending my presentation at CSA Congress EMEA 2015 on 17 November. I’ll be speaking at 14:00 during Track 2: Strategies, Governance, Risk Management.