From the course: Requirement-Driven Cloud Selection and Deployment

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

"As is" and "to be"

"As is" and "to be"

From the course: Requirement-Driven Cloud Selection and Deployment

Start my 1-month free trial

"As is" and "to be"

- [Instructor] So how do we pick the Security Solution that's right for the requirements that we defined? Well, there's three phases here that I'll walk you through. First phase one, basically is understanding the roles and responsibilities, understanding eye level overview of the security, looking at the different domains that are out there, in the particular problem domain we're dealing with and then providing a check point. Making sure that we're getting back, or checking back in with the business to ensure that we're getting the security requirements correct. Next phase is going to be an assessment. And the idea here is to leverage what we learned in phase one and to make sure we're aligning to the requirements that we're defining. So there's a common language, make sure we're looking at the security tools as they trickle in and which ones are working, which ones are not. And then also walking through best practices…

Contents