Threat Stack Blog and Cloud Security News

Continuous security monitoring for your cloud.

Adopt a Cloud Security Maturity Model to Guide Your Journey in the Cloud

by Tim Armstrong , posted in Cloud Security, cloud adoption, Cloud Security Maturity Model, AWS Configuration Auditing

Cloud Security Maturity Model Blog Banner.jpg

Moving to and scaling in the cloud — especially for those who came from on-premise environments — can not only be overwhelming, but confusing, too. With new services available to your organization, policies to adhere to, and users and systems to secure, where should you begin?

Many of us at Threat Stack, including myself, have worked with on-premise environments at other organizations. So we understand the experience of being overwhelmed and confused when it comes to getting started securing your cloud or hybrid environment. The good news is that we have some real experts and great customers who have helped us identify best practices for transitioning to and scaling in a cloud environment, and we want to share those with you! 

We use a Cloud Maturity Model as a starting point. Essentially, it lays out the stages and activities companies should follow to mature their cloud environment — but we believe secure cloud computing needs to play a bigger part. As such, the Threat Stack team agreed it was time to develop a Cloud Security Maturity Model to help companies understand, step by step, how to implement and scale security as they grow in the cloud.

Read More [fa icon=long-arrow-right"]

Dec 9, 2016 9:56:41 AM

[fa icon="comment"] 0 Comments

The Weekly Security and DevOps News Brief

by The Threat Stack Team , posted in Security, data breach, data loss, cloud adoption


A lot happened in the world of security and DevOps this week. Here are top posts we saw:

Read More [fa icon=long-arrow-right"]

Apr 29, 2016 4:21:22 PM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all