Question: Most users of a cloud, whether it is a private or a public cloud, have certain expectations for the security of their data. Similarly, the

Most users of a cloud, whether it is a private or

Most users of a cloud, whether it is a private or a public cloud, have certain expectations for the security of their data. Similarly, the owner and operator of a cloud share responsibility for ensuring that security measures are in place and that standards and procedures are followed. We can capture our expectations and responsibilities for security by stating them formally in documented requirements. The goal is to provide the reader with an organized set of tools (checklists), which can be used to evaluate the security of a private, community, public, or hybrid cloud, The intent of developing a cloud security evaluation checklist is to have a uniform means to verify the security of a cloud and also to obtain assurance from a CS about their security. One application for the checklist is that a cloud owner can use it to guide a security evaluation of their cloud. If cloud providers use such a checklist as a framework to report on the security of their clouds, then prospective tenants and users could compare the relative security of multiple clouds. The checklist can also be used by a public cloud customer to ask a series of questions that are relevant to their business needs. Not all these questions will be relevant for all uses or business relationships However, In a case reported by the German online newspaper Zeit Online on February 18, 2011,26 an error in the cloud provider's payment system paralyzed a German company's access to their public cloud Saas e mail and online documents. Although the facts in this case are not fully clear at the time, this should serve as a warning: Any cloud provider's accounting or customer management systems could be in error and in an extreme case, this might result in a business denial of service As a cloud provider, you need to develop a checklist to guide you in the security evaluation of the cloud so for the customer of public, private, or hybrid cloud they can view these checklist and compare the relative security of multiple clouds before they decide which cloud provider to adopt Write a four to five (5-6) page paper excluding cover page and case study page in which you: 1. Search and provide security checklists of personnel security, Business Continuity, Data Center: Physical Security, Identity and Access Management, and Incident Management 2. As a cloud provider, Is the cloud more or less secure than your current environment. Justify? How to assess your risk before moving data processing or applications to the cloud 3. The nature of cloud environments and workloads is changing. Security team approaches must evolve in response. One of the best practices is using Zero-Trust policy in cloud Summarize zero trust policy in cloud and identify how to implement it and the benefits of this policy Your Report must follow these formatting requirements: Be typed, 15 spaced, using Times New Roman font (size 12), with one-inch margins on all sides, citations and references must follow APA format. Most users of a cloud, whether it is a private or a public cloud, have certain expectations for the security of their data. Similarly, the owner and operator of a cloud share responsibility for ensuring that security measures are in place and that standards and procedures are followed. We can capture our expectations and responsibilities for security by stating them formally in documented requirements. The goal is to provide the reader with an organized set of tools (checklists), which can be used to evaluate the security of a private, community, public, or hybrid cloud, The intent of developing a cloud security evaluation checklist is to have a uniform means to verify the security of a cloud and also to obtain assurance from a CS about their security. One application for the checklist is that a cloud owner can use it to guide a security evaluation of their cloud. If cloud providers use such a checklist as a framework to report on the security of their clouds, then prospective tenants and users could compare the relative security of multiple clouds. The checklist can also be used by a public cloud customer to ask a series of questions that are relevant to their business needs. Not all these questions will be relevant for all uses or business relationships However, In a case reported by the German online newspaper Zeit Online on February 18, 2011,26 an error in the cloud provider's payment system paralyzed a German company's access to their public cloud Saas e mail and online documents. Although the facts in this case are not fully clear at the time, this should serve as a warning: Any cloud provider's accounting or customer management systems could be in error and in an extreme case, this might result in a business denial of service As a cloud provider, you need to develop a checklist to guide you in the security evaluation of the cloud so for the customer of public, private, or hybrid cloud they can view these checklist and compare the relative security of multiple clouds before they decide which cloud provider to adopt Write a four to five (5-6) page paper excluding cover page and case study page in which you: 1. Search and provide security checklists of personnel security, Business Continuity, Data Center: Physical Security, Identity and Access Management, and Incident Management 2. As a cloud provider, Is the cloud more or less secure than your current environment. Justify? How to assess your risk before moving data processing or applications to the cloud 3. The nature of cloud environments and workloads is changing. Security team approaches must evolve in response. One of the best practices is using Zero-Trust policy in cloud Summarize zero trust policy in cloud and identify how to implement it and the benefits of this policy Your Report must follow these formatting requirements: Be typed, 15 spaced, using Times New Roman font (size 12), with one-inch margins on all sides, citations and references must follow APA format

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!