Cloud computing security policy

Assignment Help Computer Engineering
Reference no: EM13820019

A small non-profit organization (SNPO-MC) has received a grant which will pay 90% of its cloud computing costs for a five year period. But, before it can take advantage of the monies provided by this grant, it must present an acceptable cloud computing security policy to the grant overseers.

Tasking:

You are a cybersecurity professional who is "on loan" from your employer, a management consulting firm, to a small non-profit organization (SNPO-MC). You have been tasked with researching requirements for a Cloud Computing Security Policy and then developing a draft policy for the non-profit organization, SNPO-MC. The purpose of this policy is to provide guidance to managers, executives, and cloud computing service providers. This new policy will supersede (replace) the existing Enterprise IT Security Policy which focuses exclusively upon enterprise security requirements for organization owned equipment (including database servers, Web and email servers, file servers, remote access servers, desktop computers, workstations, and laptop computers) and licensed software applications. The enterprise IT security policy also addresses incident response and disaster recovery.

As part of your policy development task you must take into consideration the issues list which was developed during brainstorming sessions by executives and managers in each of the three operating locations for the non-profit organization.

The organization is headquartered in Boston, MA and has two additional operating locations (offices) in New Orleans, LA and San Francisco, CA. Approximately 50 employees work in a formal office setting at one of these locations. These employees use organization owned IT equipment. The remaining 1,000 staff members are volunteers who work from their home offices using personally owned equipment.

The organization provides a variety of management consulting services for its clients (charities and non-governmental organizations) on a fee for service basis. Fees are set on a sliding scale based upon the client's ability to pay. The organization receives additional funding to support its administrative costs, including IT and IT security, through grants and donations from several Fortune 500 companies.

The non-profit organization is in the process of hiring its first Chief Information Officer. The organization has a small (3 person) professional IT staff that includes one information security specialist. These staff members are located in the Boston headquarters office.

Definitions:

Employees of the organization are referred to as employees.

Executives and other staff who are "on loan" from Fortune 500 companies are referred to as loaned staff members. Loaned staff members usually telework for the organization one to two days per week for a period of one year.

Volunteers who perform work for the organization are referred to as volunteer staff members. Volunteer staff members usually telework from their homes one to two days per week.

Cloud Computing includes but is not restricted to:

· Platform as a Service

· Infrastructure as a Service

· Software as a Service

Issues List:

· Who speaks with authority for the firm?

· Who monitors and manages compliance with laws and regulations?

· Ownership of content

· Privacy and confidentiality

· Enforcement

· Penalties for violations of policy

· Use by sales and marketing

· Use by customer service / outreach

· Use by public relations and corporate communications (e.g. information for shareholders, customers, general public)

· Use for advertising and e-commerce

· Use by teleworkers

· Review requirements (when, by whom)

· Use of content and services monitoring tools

· Content generation and management (documents, email, cloud storage)

Reference no: EM13820019

Questions Cloud

Economic relationships among account balances : 1. What analysis best considers the economic relationships among account balances?
How is energy released in a nuclear reaction : Discuss the scientific and technical concepts related to the use of nuclear power as an energy resource - how is energy released in a nuclear reaction?
Analyze data calls and technical issues that were reported : you are asked to analyze data calls and technical issues that were reported. As you analyze, you look at the mode, would this be the best central tendency analysis to provide to your supervisor listing.
Challenge in current or past real-life organization : Summarize the six bases of power that allow leaders to influence the importance of others. For each of the bases of power identified, provide at least one contemporary leadership issue or challenge in your current or past real-life organization.
Cloud computing security policy : Cloud Computing Security Policy
Identify the competition and in detail : Define the industry your company is participating in. Justify in detail why you placed them in this industry. Identify the competition and in detail why you view them as competition. Identify in detail who your customers are
Research the concept of apocalypse and end times : Research the concept of apocalypse and end times. Compare how the concept is used in two stories. Compare the representations of zombies in two stories. What do they represent?
Team processes that encourage innovation : What is the difference between a discovery-driven team and an execution-driven team - Critically examine the five team processes that encourage innovation. What is the significance of each process and how does it relate specifically to the team's l..
What industry or industries your company operates in : Analyze the horizontal and vertical analysis you completed in the workbook.Analyze the ratio analysis you completed in the workbook. Address each area of ratio analysis: liquidity, solvency, asset management, profitability, and market analysis. Calcu..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd