Skip to main content

Balancing On-Prem and Cloud Security Strategic Considerations for Modern Organizations

In today’s environment of expanding attack surfaces, AI-powered threats, and increasing pressure to do more with less, security leaders must rethink how and where their operations run. This paper examines the strategic trade-offs between cloud and on-prem deployments, and the growing trend of consolidating tools into integrated security platforms.

SANS_Balancing_On_Prem_Cloud_Security_Strategic_Considerations_Modern_Organizations (PDF, 3.31MB)

30 Jul 2025
ByMatt Bromiley
Share
All papers are copyrighted

No re-posting of papers is permitted

Related Content

A New Era in Vulnerability Management: A SANS Review of the Seemplicity Platform

Research Paper

In this paper, Dave Shackleford offers an inside look at Seemplicity, a vendor-agnostic remediation orchestration platform designed to unify vulnerability management across code, cloud, and infrastructure.

  • 18 Aug 2025
  • Dave Shackleford

Adopting an Offensive Security Posture: Strategies and Best Practices

Research Paper

This paper delves into essential concepts, and offers practical guidance for adopting an offensive security posture.

  • 18 Aug 2025
  • Jorge Orchilles

Enhanced Decisions with WatsonX: A Look at IBM QRadar Investigation Assistant

Research Paper

This paper examines IBM QRadar Investigation Assistant, an AI-powered tool that enhances SOC performance by streamlining incident triage, automating threat enrichment, and enabling natural language query capabilities.

  • 6 Aug 2025
  • Matt Bromiley

Evaluating Zero Trust Network Access: A Framework for Comparative Security Testing

Research Paper

While most evaluations rely on vendor checklists and surface-level comparisons, this white paper takes a different approach: building and applying a hands-on testing framework grounded in NIST SP 800-207 and the CISA Zero Trust Maturity Model.

  • 11 Jul 2025

Malware Function-based encryption technique

Research Paper

Recent malware often uses techniques to evade detection by cybersecurity products. One of the...

  • 22 Jun 2022

Detecting Unauthorized Behavior From Legitimate Accounts

Research Paper

Incident Responders face an almost insurmountable amount of log events, and the move to the Cloud...

  • 22 Jun 2022

Recover an RSA Private Key from a TLS v1.2 session

Research Paper

Cyberattacks happen every day.Most organizations have administrative and technical controls...

  • 22 Jun 2022

Cyber Guardian Exercise: A Case Study in Brazil to Address Challenges in Cybersecurity and Protect Critical Infrastructure

Research Paper

Discussions of cybersecurity, in particular those associated with critical infrastructure (CI),...

  • 22 Feb 2022

Recommendations for small/medium-sized businesses enabling incident response

Research Paper

Security incidents are inevitable. While large businesses can afford security teams to prepare and...

  • 17 Jan 2022

Black-Box Fuzzing for Android Native Libraries

Research Paper

Many Android application developers are adopting C\C++ native language development in their Android...

  • 12 Jan 2022

Machine Learning Techniques for Intrusion Detection

Research Paper

This paper aims to equip intrusion analysts with the basic techniques needed to apply machine...

  • 9 Jun 2021

Detecting DLL Search Order Hijacking: How using a purple team approach can help create better defensive techniques and a more tactical SIEM

Research Paper

Many SIEM analysts will recognize the feeling of being overwhelmed with security logs and alerts,...

  • 4 May 2020

Corporate Information Governance with Business Wisdom

Research Paper

Whether a secret ingredient used for a lemonade stand across the street or the business strategies...

  • 4 May 2020

Automated Detection and Disinfection of Ransomware Attacks using Roadblock Software

Research Paper

We often hear about ransomware locking data and demanding the ransom. Ransomware is a kind of...

  • 18 Mar 2020

Assisted Security Investigations Using Cognitive Computing

Research Paper

The purpose of this research is to illustrate the application of cognitive computing and machine...

  • 3 Dec 2019

Leveraging the PE Rich Header for Static Malware Detection and Linking

Research Paper

An ever-increasing number of malware samples are identified and assessed daily. Malware researchers...

  • 1 Jul 2019

Analysis of a Multi-Architecture SSH Linux Backdoor

Research Paper

A key aspect in any intrusion is to attempt to gain persistence on the compromised system. Threat...

  • 17 Jun 2019

Unpacking and Decrypting FlawedAmmyy

Research Paper

Malware authors commonly utilize packers (Roccia, 2017) as a method of concealing functionality and...

  • 22 Apr 2019

Continuous Security Monitoring in non-Active Directory Environments

Research Paper

Active Directory-centric monitoring techniques, tools, and methodologies have dominated information...

  • 20 Feb 2019

Intrusion Prevention System Signature Management Theory

Research Paper

The intrusion prevention system (IPS) serves as one of the critical components for a...

  • 5 Feb 2019

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.