July 2018
Intermediate to advanced
356 pages
9h 18m
English
In this stage, we may be dealing with a start-up company. No dedicated security team is part of the IT team. Most security controls are adopted from cloud services, such as AWS.
Although the cloud service may provide security services, it's still the user's responsibility to protect the application and data. Therefore, the following are critical for the security assurance program at this stage. Take AWS service practices as an example: