Cloud Security
Inherited Controls
Compliance controls whose implementation responsibility transfers from the customer to the cloud service provider based on FedRAMP authorization, SOC 2 report, or equivalent certification. Customers must document which controls are inherited and verify alignment with their own System Security Plan.
From the library
The full analysis on Inherited Controls.
The article is where the term meets the practitioner. Read how this concept actually shows up in audit, in remediation, and in the boardroom.
Read the analysis →