iValue Center of Excellence
Your Technology. Proven. Positioned. Sold.
• Sell outcomes, not features
Cloud Security Upsell Stack with Controls
Comprehensive mapping of cloud security controls to Indian regulatory mandates, ensuring robust compliance and protection across multi-cloud environments.
| # | Cloud Security Control Area | Consolidated Requirement | CERT-In | RBI | SEBI CSCRF | IRDAI | DPDP | NCIIPC | Technology | iValue Stack Required (Multi-Stack by Design) |
|---|---|---|---|---|---|---|---|---|---|---|
| 1 | Cloud Asset Inventory | Discover all IaaS / PaaS / SaaS assets | ✅ | ✅ | ✅ | ✅ | ⬜ | ✅ | CSPM / CAASM | Wiz |
| 2 | Cloud Configuration Management | Detect cloud misconfigurations | ✅ | ✅ | ✅ | ⬜ | ⬜ | ✅ | CSPM | Wiz |
| 3 | Cloud Risk Prioritisation | Risk-based exposure analysis | ⬜ | ✅ | ✅ | ⬜ | ⬜ | ✅ | CNAPP | Wiz |
| 4 | Cloud IAM Governance | Least privilege & access hygiene | ✅ | ✅ | ✅ | ✅ | ⬜ | ✅ | CIEM / IDAM | RSA / OpenText NetIQ |
| 5 | Privileged Cloud Access | Secure cloud admin access | ⬜ | ✅ | ✅ | ⬜ | ⬜ | ✅ | PAM | CyberArk |
| 6 | Cloud MFA | Phishing-resistant authentication | ✅ | ✅ | ✅ | ✅ | ⬜ | ⬜ | MFA | Yubico |
| 7 | Cloud Network Firewall | Control north-south traffic | ⬜ | ✅ | ✅ | ⬜ | ⬜ | ✅ | CNFW / Firewall | Check Point |
| 8 | Cloud WAF | Protect cloud applications | ⬜ | ✅ | ✅ | ⬜ | ⬜ | ⬜ | WAF | Check Point |
| 9 | Cloud Workload Protection | Secure VMs & cloud workloads | ⬜ | ✅ | ✅ | ⬜ | ⬜ | ✅ | CWPP | Wiz |
| 10 | Container Security | Image & runtime security | ⬜ | ✅ | ✅ | ⬜ | ⬜ | ✅ | CNAPP | Wiz |
| 11 | Kubernetes Security | K8s posture & runtime protection | ⬜ | ✅ | ✅ | ⬜ | ⬜ | ✅ | CNAPP | Wiz |
| 12 | Cloud Vulnerability Management | VM & image vulnerability detection | ⬜ | ✅ | ✅ | ⬜ | ⬜ | ✅ | Cloud VM | Tenable Cloud Security |
| 13 | Patch Hygiene (Cloud) | OS & workload patch visibility | ⬜ | ✅ | ✅ | ⬜ | ⬜ | ✅ | VM / Patch Mgmt | Tenable |
| 14 | Cloud Network Traffic Visibility | East-west traffic monitoring | ⬜ | ✅ | ✅ | ⬜ | ⬜ | ✅ | NDR | Arista |
| 15 | Network Behaviour Analytics | Detect anomalous cloud traffic | ⬜ | ✅ | ✅ | ⬜ | ⬜ | ✅ | NBAD | Arista |
| 16 | SaaS Security Posture | SaaS configuration & risk | ⬜ | ✅ | ✅ | ⬜ | ⬜ | ⬜ | SSPM | Wiz |
| 17 | CASB | Control SaaS access & data | ⬜ | ✅ | ✅ | ⬜ | ✅ | ⬜ | CASB | Check Point / Forcepoint |
| 18 | Cloud Data Discovery | Identify sensitive cloud data | ⬜ | ⬜ | ⬜ | ⬜ | ✅ | ⬜ | DSPM | Forcepoint DSPM |
| 19 | Cloud Data Protection | Prevent cloud data leakage | ⬜ | ⬜ | ⬜ | ⬜ | ✅ | ⬜ | Cloud DLP | Forcepoint |
| 20 | API Security | Secure cloud & SaaS APIs | ⬜ | ✅ | ✅ | ⬜ | ⬜ | ⬜ | API Security | Levo + Wiz |
| 21 | Cloud Threat Detection | Detect cloud-native attacks | ⬜ | ✅ | ✅ | ⬜ | ⬜ | ✅ | CDR | Wiz |
| 22 | Cloud UEBA | Detect anomalous cloud usage | ⬜ | ✅ | ✅ | ⬜ | ⬜ | ⬜ | UEBA | Gurucul |
| 23 | SASE | Secure cloud access & ZTNA | ⬜ | ✅ | ✅ | ⬜ | ⬜ | ⬜ | SASE | Check Point SASE |
| 24 | Cloud Log Collection | Centralised cloud logging | ✅ | ✅ | ✅ | ⬜ | ⬜ | ✅ | SIEM | Splunk / Google Chronicle |
| 25 | Log Retention (Cloud) | Retain logs per mandate | ✅ | ⬜ | ⬜ | ⬜ | ⬜ | ⬜ | SIEM | Splunk / Chronicle |
| 26 | Incident Response (Cloud) | Containment & response | ✅ | ✅ | ✅ | ⬜ | ⬜ | ✅ | SIEM / SOAR | Splunk / Chronicle |
| 27 | Compliance & Audit Reporting | Audit-ready cloud evidence | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | GRC / SIEM | Wiz + Splunk |