10 Ways To Transform Your Clients' Security Program

10. Cloud Security Controls Integrated With Core SOC

Although the implementation differs slightly, the controls implemented for the cloud environment should be integrated and handled the same as your core security operations center monitoring capabilities, Thompson said. Your security operations center (SOC) should be indifferent to the location of the data. Security must follow the data and provide the same monitoring capabilities regardless of where it resides.

Get a roundup of CRN's security coverage right to your inbox with the Security Advisor newsletter.