Ensuring that you have visibility into your cloud computing infrastructure from an information security perspective should be a top priority of the information security program when it comes to building an effective security cloud architecture.
As you begin to outsource your organization's information technology to cloud vendors, you must ensure that you do not comprise on information security control implementation. While you most likely will not be able to use the same solutions to implement information security as you did for on-premises solutions, you will be able to find satisfactory substitutes for use in the cloud environment.