10 Ways To Transform Your Clients' Security Program

8. Cloud Enablement Controls

The same controls required on-premise are necessary to implement in the cloud environment. An inventory of architecture, exfiltration protection, DNS, and logging controls are among those controls required to manage and protect the data in the cloud environment, Thompson said.

Get a roundup of CRN's security coverage right to your inbox with the Security Advisor newsletter.