It’s 5:00 a.m. sometime in 2018. The phone rings. It’s the cloudops team reporting a potential breach where gigabytes of customer data may have been compromised.
You spend the next year toughening up cloud security, allocating four times what you spent in the previous year. The board of directors is happy to fund the additional tools and people. As we say: “You can’t have too much security.”
But what if you can have too much security? When do you need to hit the accelerator, and when are you going too fast already? It’s a matter of where you exist on the cloud security spectrum.