- Scoping of the Security Controls: (i) Identify the
common security controls; The cloud stakeholders decide on
which security controls in the baseline they plan to replace
with a common security control (either provided by the CPs
or by the CCs), (ii) Identify critical and non-critical system
components; the SPs and CCs should define which
components are critical to enforce security on it and which
are non-critical (may be because they are already in a trusted
zone) so no possible security breaches, and (iii) Identify
technology and environment related security controls that
are used whenever required such as wireless network
security controls.