This document discusses deploying a cloud security control to comply with regulatory requirements for information security. It explains that business executives are responsible for aligning corporate policies with regulations and ensuring controls are enforced. Both internal and external regulations impact IT operations, as complying requires technical standards that can be costly to implement. The assignment asks the reader to research a specific regulatory requirement of FERPA, GLBA, HIPAA, PCI DSS, or SOX and address how information security controls can ensure compliance.