Describe cloud security architectureDescribe cloud security architecture

Feb 15, 2024

 Competency

Describe cloud security architecture.

Don't use plagiarized sources. Get Your Custom Essay on
Describe cloud security architectureDescribe cloud security architecture
Just from $13/Page
Order Essay

Scenario

You are the cloud security expert for a finance company. Your company is planning to store Personally Identifiable Information (PII) data on a public cloud medium. Your company will use this PII data to run analytics and then send credit card offers to its customers. It is a federal obligation for financial firms to protect PII data. A public cloud is a safe option but there are still many security threats to consider.

You need to analyze the various security threats and analyze various cloud services that are available to protect your data.

Instructions

In order for the leadership team to approve funding for this project, you will create a case study to help the leadership team decide how to enhance the security of the PII data in the future.

Your case study should include the following points:

  1. Security threats on the cloud
  2. Data encryption on a public cloud
  3. Threat detection tools for a public cloud
  4. Vulnerability scanning tools for a public cloud
  5. Cloud-native security services for a public cloud

Be sure to use a professional tone and check your spelling and grammar.

Length

Microsoft Word, 5-6 pages

References

Include a minimum of 5 scholarly resources

Resources

  • Cloud Security Threats
  • Encryption services- AWS
  • Encryption service- Azure
  • Threat detection tool on AWS
  • Threat detection tool on Azure
  • Cloud Native Security Services on AWS
  • Azure Security Center

The requirement to PASS (RUBRIC)

 Word document is 5 or more pages. 

 A full, robust, and detailed description of security threats on the cloud. 

 A full, robust, and detailed description of data encryption on a public cloud. 

 A full, robust, and detailed description of threat protection tools for a public cloud. 

 A full, robust, and detailed explanation of vulnerability scanning tools for a public cloud. 

 A full, robust, and detailed description of cloud-native security for public cloud infrastructure as a code tool. 

 5 scholarly references provided; documented correctly. 

Recent Posts