Network Security


Key management

Access control

includes people, processes and systems that are used to manage access to enterprise resources (also see )

Data and Media Sanitization

Vendor lock-in
highlights where a customer may be unable to leave, migrate, or transfer to an alternate provider due to technical or nontechnical constraints

Virtualization Security

Common Threats