Sample Cloud Security Project
Sample Cloud Security Project
FRAMEWORK
Khairul Anam
+6014 3656551
[email protected]
linkedin.com/in/khairulanamcwa/
DOCUMENT PURPOSE
01
Introduction:
To serve as a framework to understand minimum
security requirements for client's IT landscape
What is
this?
TARGET AUDIENCE
Client’s INTERNAL OR CLIENT delivery teams.
02 This framework is provided, and designed to be
used by, IT & STRATEGY, as well as any
relevant personnel.
SUPPLEMENTAL MATERIAL
03 THERE IS A COMPANION DOCUMENT
(SCORECARD) that focuses more on how to
asses deliverables for any IT project, as well as
IT FRAMEWORK DEFINITION.
SCOPE and approach of the assessment
TARGET
Gain an overview of client's IT Security elements and identify major non-compliances
against the IT Security Infrastructure standard, without evaluation on maturity of
implementation
SCOPE
Client's IT Security
Infrastructure Standards
APPROACH
INPUTS
Review the relevant Virtual/F2F Validate control Recommend
MINIMUM requirements Interviews with key design by reviewing improvements to
defined within IT Security stakeholders and sample evidences & client's
Infrastructure Standard domain owners documentation
EFFORTS ~128 hours ~320 hours ~128 hours | ~8 hours
~8 Hours ~8 hours per entity ~20 hours per entity per entity reporting
RISK BASED COMPLIANCE SCORING
MATURITY RATINGS
MATURITY
LEVEL Managed Security control is implemented with Low/ No risk deviations
5 5
(5)
MATURITY
LEVEL Improving Security control is implemented with Medium risk deviations
4 4
(4-4.99)
MATURITY
LEVEL
Defined Security control is implemented with High risk
3 deviations 3
(3-3.99)
MATURITY
LEVEL Developing Security control is still under
2 development with low to medium risk 2
(2-2.99) deviations
MATURITY
LEVEL Not existing Security issue exists &
1 requires addressing; however 1
(1-1.99) no security control exists to
tackle the issue.
RISK BASED COMPLIANCE SCORING
CLIENT'S
GROUP CLIENT'S REGION
DOMAINS TARGET A B
C D F G
NETWORKING
SECURITY
INFRASTRUCTURE
NA
DATACENTER No External Third-
Party Datacenter
WORKSPACE END-USER
IDENTITY AND
ACCESS MANAGEMENT
Not Defined
existing
Developing Improving Managed NA Not Applicable
COMPLIANCE ASSESSMENT OVERVIEW PER DOMAIN
OVERALL SUMMARY IN COMPARISON WITH RELEVANT PEERS
Not existing Developing Defined Improving Managed
Security issue exist & Security control is still Security control is Security control is Security control is
requires addressing under development implemented with implemented with implemented with
however no security with low to medium
Essential recommendations
High risk deviations Medium risk deviations Low/ No risk
control exists to tackle risk deviations deviations
the issue
1 2 3 4 5
• Led the discussion, technical design, development and proof-of-concept for millions of
dollar projects for partners and client's.
• Led the production of the whitepaper to comply with the regulation of government bodies,
and as support for a fintech e-payment startup, bringing in a $15M project to the company.
• Managed architecture for 17 different products in the Airline industry while working
closely with the internal stakeholders, driving the collaboration culture and best practices.
Let’s Chat!
I’m currently based in Singapore, and always available via
Teams/Zoom, as well as reachable via phone.
Interests:
Reading (Currently: 4-Hours Body), Continuous Learning
(Aim to be certified in AWS SAP by Q1 2023), Christopher
Nolan film, Post-rock music (Toe), Japanese food, gaming,
taking care of daughters and wife.
Contact Anam
+6014 3656551