Ask Computer Network & Security Expert

Project: Cloud Computing Security Policy

Background: A small non-profit organization (SNPO-MC) has received a grant which will pay 90% of its cloud computing costs for a five year period. This grant contains provisions which arise from the federal government's "cloud first" mandate and related IT reform efforts (see https://cio.gov/wp-content/uploads/downloads/2012/09/25-Point-Implementation-Plan-to-Reform-Federal-IT.pdf)
Before the organization can take advantage of the monies provided by this grant, it must present an acceptable cloud computing security policy to the federal agency which has issued the grant. This policy must also identify and address relevant requirements (items 3, 4, 5, and 6) as set forth in Part I: Section A "Apply ‘Light Technology' and Shared Solutions" of the federal government's25 point implementation plan.

Organization Profile: The organization is headquartered in Boston, MA and has two additional operating locations (offices) in New Orleans, LA and San Francisco, CA. Approximately 50 employees work in a formal office setting at one of these locations. These employees use organization owned IT equipment. The remaining 1,000 staff members are loaned staff or other volunteers who work from their home offices using personally owned equipment. The organization wants to shift to using more cloud-based computing resources so that it can avoid having to purchase new and/or replacement equipment.

Figure 6-1. SNPO-MC As-Is Enterprise IT Architecture

1248_IT Architecture.png

Definitions: Employees of the organization are referred to as employees.

Executives and other staff who are "on loan" from Fortune 500 companies are referred to as loaned staff members. Loaned staff members usually telework for the organization one to two days per week for a period of one year.

Volunteers who perform work for the organization are referred to as volunteer staff members. Volunteer staff members usually telework from their homes one to two days per week.

Cloud Computing includes but is not restricted to:

• Platform as a Service
• Infrastructure as a Service
• Software as a Service

Issues List:

• Who speaks with authority for the firm?
• Who monitors and manages compliance with laws and regulations?
• Ownership of content
• Privacy and confidentiality
• Enforcement
• Penalties for violations of policy
• Use by sales and marketing
• Use by customer service / outreach
• Use by public relations and corporate communications (e.g. information for shareholders, customers, general public)
• Use for advertising and e-commerce
• Use by teleworkers
• Review requirements (when, by whom)
• Use of content and services monitoring tools
• Content generation and management (documents, email, cloud storage)

Resources (suggested by the organization's IT Staff for your consideration):

1. http://www.nsa.gov/ia/_files/support/Cloud_Computing_Guidance.pdf

2. http://www.sans.org/reading-room/whitepapers/analyst/cloud-security-compliance-primer-34910

3. http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf

Tasking:

1. Research best practices for cloud computing. Use the readings posted in the LEO classroom, the resources listed above, and at least three additional resources that you find on your own.

2. Write a policy which addresses the following requirements from the federal government's 25 point plan:
• Shift to a "Cloud First" policy
• Stand-up contract vehicles for secure IaaS solutions
• Stand-up contract vehicles for commodity services
• Develop a strategy for shared services

3. Create a transition strategy for moving from the "As-Is" enterprise architecture to cloud-based services. You should consider IaaS, PaaS, and SecaaS strategies. You should also address deployment considerations (private, public, community, hybrid clouds) and the criteria for selecting an appropriate deployment strategy. Document your transition strategy in a "background" section in your policy. (This strategy forms the basis for the "need" for security for cloud based services to be used by SNPO-MC in the future and should include the "to be" state for its Enterprise IT architecture.

4. Develop and document 10 to 15 policy statements which address requirements for securing the cloud-based "to-be" enterprise architecture. These statements should be specific and based upon best practices.

Your deliverable for this project is a 5 to 8 page professionally formatted draft policy which addresses security requirements for Cloud based services used by the non-profit organization. See the following resources for suggested formats.

• https://it.tufts.edu/cloud-pol

• https://www.american.edu/policies/upload/IT-Security-Policy-2013.pdf

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91677447
  • Price:- $70

Priced at Now at $70, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As