Determine enterprise areas of security responsibility

Assignment Help Computer Networking
Reference no: EM132349425

For this task you will be required to manage the security, privacy and compliance of a cloud service, and will require access to the following:

• The cloud information and communications technology (ICT) business specifications
• The cloud ICT security assurance specifications
• Management-related scenarios
• A cloud-focused security environment, including threats to security that are, or are held to be, present in the environment
• Information on the security environment, including:
o Laws or legislation
o Existing enterprise security policies
o Enterprise expertise
• Risk analysis tools and methodologies currently used in industry.

To demonstrate that you can effectively manage the security, privacy and compliance of a workplace cloud service, you will need to demonstrate how you:

1. Identify, document and discuss the cloud security issues, including both the business and commercial issues, that relate to the types of delivery and deployment models relevant to your workplace. (discuss this with your assessor)

2. Determine the specific enterprise areas of security responsibility and conduct some research into the relevant security controls and measures for each identified area.

3. Implement the most relevant security controls and measures identified.

4. Identify and document the compliance regulations that are relevant to data storage in your workplace.

5. Determine the business continuity and data recovery plans that are most relevant to your industry and enterprise.

6. Identify what logs and audit trails are available, secure them appropriately and develop a plan to maintain them.

7. Conduct some research to investigate and review the legislation, organisational and jurisdictional policy and procedures that relate to management of the following areas, to ensure that they meet the enterprise policy:
a. Cloud-related privacy issues relevant to your enterprise.
b. Relevant codes of ethics and conduct.
c. The principles of equal employment opportunity, equity and diversity.
d. Financial management requirements.
e. Governance requirements.

8. Implement any changes identified as required by the research conducted, and integrate them appropriately to the business continuity of operation program (COOP) and existing security plans.

9. Develop an ongoing performance measurement and evaluation review process to evaluate the security effectiveness of the implemented security controls.

10. Collect and collate all the relevant documentation required as part of the COOP as would be required for audit tracking purposes.
While you are demonstrating each of the above actions, you will need to keep a journal outlining each point. Ensure that you detail each point clearly outlining how you performed the action and what the outcome was. You must submit your journal as part of this assessment.

Reference no: EM132349425

Questions Cloud

Write a program to implement the secure unicast protocol : Write a program with two interfaces (one for sender, and the another for receiver) to implement the above secure unicast protocol
Is anything still unclear that could be clarified : What were the most compelling topics learned in this course? How did participating in discussions help your understanding of the subject matter?
Relationship between population increases and climate change : What is the relationship between population increases and climate change? Do you think fertility control is an effective strategy to halt climate change?
What type of vendor support you need after implementation : What type of vendor support and vendor maintenance will you need after implementation? How long will this be needed? Write 5 questions that your facility can.
Determine enterprise areas of security responsibility : Determine the specific enterprise areas of security responsibility and conduct some research into the relevant security controls and measures
Effectively to environmental or organizational pressures : In order for managers to respond effectively to environmental or organizational pressures that can be disruptive to an organization,
Create a data governance framework : From this chapter, in addition, the previous ones, we continue to enhance our knowledge and understanding about IG best business practices, and how good data.
Find you have difficulty listening effectively : In what situations do you find you have difficulty listening effectively? how do you think your own cultural values and experiences influence the way you listen
Briefly state organizations identified as targeted victims : According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls.

Reviews

Write a Review

Computer Networking Questions & Answers

  Calculate the end-to-end delay

Suppose a propagation speed of 100 km/hour. Assume caravan travels 150 km, beginning in front of tollbooth. Calculate the end-to-end delay.

  Implement a link-state routing protocol

CIS3202 ROUTING PROTOCOLS AND CONCEPTS What is the external IPv4 address and what is the UDP port number for this Teredo client's traffic - Propose the most efficient and economical solution that does not gives router overhead and Explain your propo..

  Describe how aseptic technique is used by a surgical

1. what is aseptic technique and surgical conscience?2. how to open sterile suppliesa. peel pouchb.wrapped items3.ways

  Evaluate the performance of data analytic techniques

MN623 Cybersecurity and Analytics - Data analytics for intrusion detection - Perform intrusion detection using the available data analytics techniques using

  Create a map of your company or schools local area network

Create a map of your company or school's local area network. Are there any hubs? Where are the hubs located? Are there any switches?

  Define arbitrary waveform generation

Compare and contrast DDS, digital resonator, and lookup table methods of sinusoid generation.

  Calculate the value of qqi for each of the qqic values

Calculate the value of QQI for each of the following QQIC values. Calculate the value of maximum response delay for each of the following maximum response.

  What service would you recommend and why

Based on your table, what service would you recommend and why? How would you implement a cloud solution into the existing campus network structure?

  Discuss the benefits provided by network modeling

Discuss the benefits provided by network modeling

  History of emergency management

Throughout the history of emergency management in the United States, priorities set for government emergency management agencies

  Fahrenheit temperature of a certain city

The Fahrenheit temperature of a certain city has never exceeded 6 degrees°. How would you describe this using Celsius temperature?

  Describe the network management software components

Describe the network management software components

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd