Strong InfoSec strategies must answer the key questions of who is logging in, what is accessed, when was it changed and how is the IT landscape affected.
Enterprise security can be a labyrinthine, complex beast with many moving parts, dozen upon dozen of requirements, needs, implications, options and alternatives.
But when we get down to the nitty gritty (the brass tacks if you will), cloud security can be simplified by six simple questions.