Hello researchers,

I need some resources about clod security evaluation, best practices, security assessment controls and check lists and testing guides in details, both technical and policy based controls. I am familiare with CSA controls but it is too general. is there any thing else more practical like protection profiles?

More Mahdi Fotouhi's questions See All
Similar questions and discussions