On this page
Service Overview
Organizations are increasingly moving infrastructure, services, applications, and other critical data stores from on-premise networks to public or private cloud environments. Cloud platforms can offer an increase in scalability, flexibility, and availability with more predictable costs by converting capital expenditures (CapEx) to operating expenditures (OpEx). The differences that can result in these benefits make some of the models and approaches used for traditional cybersecurity less applicable, but it is crucial not to assume that transition to cloud platforms is automatically secure with the default configuration. Organizations should also consider that not all legacy cybersecurity tools can transition seamlessly into virtualized Cloud environments.
Cloud Security Assessment examines cloud and cloud-related elements to identify that organizations are not relying on default or typical security settings to protect critical data, and instead aligning with best practice and striking the best possible balance between operation and security.
This Statement of Work identifies the objectives, scope, methodology, deliverables, client requirements, and assumptions for all work to be completed by DeepSeas.
Objectives
The objectives of this initiative are as follows:
- Examine the cloud environment for technical and administrative security gaps.
- Identify improvements to cloud environment security based on recognized best practice standards.
- Support the protection of critical assets.
- Support compliance with regulatory requirements.
Methodology
The methodology consists of the following activities:
- INITIALIZATION MEETING – DeepSeas will host an initialization meeting to review the objectives, methodology, scope, and deliverables in the Statement of Work.
- PLANNING – Preparation necessary to conduct an effective assessment, including:
- Scope Validation – Validating the scope aligns with all parties.
- Schedule Development – Scheduling, project plan creation, and resource identification.
- ASSESSMENT – perform an evaluation of cybersecurity controls by conducting the following:
- Technical and administrative control assessment – Direct inspection of security controls applied within the cloud environment, compared against industry-accepted best practice standards from organizations such as the Center for Internet Security (CIS) and the National Institute for Standards and Technology (NIST), by Subject Matter Experts.
- FINDINGS – Actions required to formalize the findings, including:
- Documentation – Documentation of the findings summary and detailed assessment findings.
- Presentation – Presentation of findings to Client.
Deliverables
DeepSeas will produce the following deliverables:
- SUMMARY FINDINGS – DeepSeas will deliver a report summarizing the findings of the initiative and associated recommendations.
- DETAILED FINDINGS – DeepSeas will deliver a report clearly identifying all gaps for in-scope controls.
- FINDINGS PRESENTATION – DeepSeas will conduct a meeting, onsite or virtual, to review the results of the initiative.
Client Responsibilities
The client is responsible for the completion of the following tasks, in accordance with agreed-upon timelines established as part of the project plan.
- Provisioning and providing cloud environment accounts with the appropriate levels of privilege and access to enable assessment. Accounts typically require full administrative permissions; read-only accounts often do not have access to all relevant features and setting information.
- The client must provide feedback for the findings report and presentation material and schedule the meeting with internal client resources.

Back to Service Library