ABSTRACT

It is no longer sucient to look at information security as maintaining the three basic pillars: con dentiality, integrity, and availability. While these core concepts remain the holy grails of security, the protection mechanisms needed to ensure these three pillars are sustained

in the cloud can become overwhelming. Organizations must consider protection and detection mechanisms in each of these areas while understanding that there is a certain level of security maturity that must drive the strategy. As illustrated in Figure 31.1, security professionals should consider the following point of view as one way to drive strategy with three fundamental concepts: attack resiliency, incident readiness, and security maturity.