Hello researchers,
I need some resources about clod security evaluation, best practices, security assessment controls and check lists and testing guides in details, both technical and policy based controls. I am familiare with CSA controls but it is too general. is there any thing else more practical like protection profiles?