Professional Documents
Culture Documents
A Programmatic Approach To Cloud Security: Cy Be R
A Programmatic Approach To Cloud Security: Cy Be R
to cloud security
Organizations move to cloud for access to state-of-the-art IT
in a cost-effective and flexible manner. However, moving to
cloud can introduce new security challenges.
Data
aa p
S
S A
| D at a &
Pa
aS ph
y
a
aS | I
A M & C r y pt og r
u
Ia
re
t
| uc
Cy
ce
tr
Sh
Ze as
r
ve
an
ro T r
be
f
ar
d n
r us t S e fo r I
co
Re Re
pli
e
rR
sp curit y
m
&
isk
on e
Co
na s ib o ns
M
e sp
us
ility uo
a
ge , R it n
m | Threat Detecti on
en Con
t |
| S text
trat
egy | ss Con
Governance | Busine
Optimize
Manage Advise
Continuous security and Security and compliance at
compliance monitoring iliency the core of your cloud
es Ad
and threat protection +R vis transformation strategy
t e
en er Risk Management |
management
em Cyb St
ag ra
red Responsibility
an
te
Sha
M
gy
at
+R
re
IaaS
Th
oa
dm
|
ap
PaaS
age
Man
SaaS
Data
for Cloud
Da
ta & A pp
Build
IA
hy
trols
M& p
er C r y p to g r a ur
| S
o
Z
Tru t
uc
C on
s t Se s tr
e cu
ry
St
ce
re
re-
e
ra
ov
n
at
cu
ia
y c
te
D
by
etec Re
pl
|G m
Se
g
ov sC
m
ern
es
n ou
r
an c u ns
ig
Ap
fo
e|B ntin a
pl
ic a usiness Contex t | Co Tr
tio |
n ve
Build
De
velo Mo Move
p m en
Build applications based t Migrate and modernize
on secure software infrastructure and
development lifecycle applications based on
processes and practices secure environment and
security best practices
Protecting critical data A data-centric security approach starts with discovery & classification
of critical assets and implementing core data protection controls
Cloud-native tool integration Best practice guidance & expertise for creating a secure
native environment
& configuration
Deploying security Help satisfy DevOps requirements for rapid innovation while not sacrificing
CISO security & compliance requirements through security automation
with cloud workloads
Centralized visibility Cloud and vendor agnostic managed security services that provide
a single-pane-of-glass security view across a hybrid environment
Compliance monitoring End-to-end threat management & recovery, compliance monitoring &
configuration drift management
and threat management
Learn more
1. IBM Institute for Business Value: Assembling Your Cloud Orchestra (October 2018)