Continuous
Compliance
Program
CTP Azure Foundations
Security Benchmark
Business Unit Virtual Network
Security Controls aligned with the
required security baseline
Business Unit Virtual Network
Security Controls aligned with the
required security baseline
Figure 1: Security Efforts During CTP’s Cloud Adoption Program
Too often, we receive news of data breaches involving the personal informa-
tion of millions of people falling into the wrong hands. The latest Uber breach
shows that cyberattacks do not have to be super-sophisticated, James Bond
movie efforts, to be successful. The disciplined, consistent implementation of
security controls and best practices is key to preventing most of these breaches
and keeping intruders at bay.
WINTER 2018 | THE DOPPLER | 15