Reference no: EM133520967
Question1:
1) describe rationalization for tailoring it;
2) define products needed;
3) describe mission of client organization; describe the business need to move to a community cloud;
4) identify scope of security architecture;
5) include topology of the architecture of the cloud environment.
Question 2: Identify scope of security architecture to:
1) include topology of the architecture of the cloud environment;
2) include topology which security features are needed for each component;
3) look at functional architecture of cloud-based system and security architecture;
4) identify parts of functional architecture are within scope of security architecture for the overall systems of systems in cloud;
5) identify which security features are needed to protect each component within the architecture (data in transit & data at rest). Identify in descriptions, possible software and hardware components, operating systems and security protections needed for these components. Narrow scope of security architecture relevant to project to achieve security for data in transit and state security objective for project. Consider what model you are following (Waterfall, Spiral, Agile, Extreme programming). Also consider: 1) What tools are there? 2) Why should you use them? 3) What are the system issues and other concerns? 4) What is interoperability? 5) Technologies to consider (Data in transit); 6) How protected? 7) Data integrity.