This document discusses deploying a cloud security control to comply with regulatory requirements for information security. It explains that business executives are responsible for aligning corporate policies with regulations and ensuring controls are enforced. Both internal and external regulations impact enterprise IT operations, and complying with rules can be costly but not complying may result in penalties. The assignment involves addressing security issues related to complying with one of several specific acts such as FERPA, GLBA, HIPAA, PCI DSS, or SOX.