SlideShare a Scribd company logo
1 of 9
member is a security software architect in a cloud service
provider company, assigned to a project to provide the client
with data integrity and confidentiality protections for data in
transit that will be using applications in the cloud. Your client
is an HR company that is moving HR applications and HR data
into a community cloud, sharing tenancy with other clients.
Your company has set up a software as a service, SAS, offering
for its client base.
The data that the HR company will be pushing to and from the
cloud will contain sensitive employee information, such as
personally identifiable information, PII. You will have to
address sensitive data and transit issues of the client data using
the HR applications stored in the cloud, and provide a life cycle
management report that includes solutions to the cloud
computing architect of your company.
Software Development Life Cycle
Technology development and implementation usually follow a
software development life cycle (SDLC) methodology. This
approach ensures accuracy of information for analysis and
decision making, as well as appropriate resources for effective
technology management.
You and your team members will use components of the SDLC
methodology to develop a
life cycle management report
for the cloud computing architect of a company. This is a group
exercise, representing the kind of collaboration often required
in the cybersecurity technology community.
There are 11 steps to lead you through this project. Similar
steps are typically used in organizational SDLC projects. Most
steps should take no more than two hours to complete, and the
entire project should take no more than three weeks to
complete. Begin with the workplace scenario, and then continue
with Step 1: “Initiating the Project.”
Life Cycle Management Report:
A 10- to 15-page double-spaced Word document on data
protection techniques for a cloud-based service with citations in
APA format. The page count does not include figures or tables.
There is no penalty for using additional pages if you need them.
Include a minimum of six references. Include a reference list
with the report.
As the cloud security architect, you must understand the
security development life cycle process. Review the following
resources to learn about the security development life cycle
process:
security development life cycle
software development methodologies
Click the following links to learn more about critical
infrastructure sectors:
Critical Infrastructure Sectors
. Read their descriptions and consider which sector you support
in your role.
Process Control Systems: Cybersecurity and Defense
To be completed by a designated team member:
You will begin your Life Cycle Management Report now.
Choose a fictional or actual organization. Describe the mission
of the organization and the business need to move to a cloud
environment.
Identify the scope of the security architecture and include a
topology. To narrow your scope, focus on issues that
application security engineers can control. Avoid discussing
resilience and business continuity issues, physical security
issues, traditional best practices for software development, or
underlying infrastructure security. Examples of topology
include Amazon Web Services, Generic Hadoop, Map-r,
Cloudera, or Microsoft Azure.
In your report, you will combine security development life
cycle and software development life cycle methodologies. When
you are considering the software development life cycle
approach, consider what model you are following. SDLC
examples include Waterfall, Spiral, Agile, and Extreme
Programming.
Address confidentiality, integrity, and availability requirements
for data at rest and data in transit.
Think like an attacker exploiting software vulnerabilities and
the likelihood of those vulnerabilities being exploited.
Think about data in use in the memory of the processing
systems. Where in the system are the data most vulnerable?
Describe the concepts and products you chose and explain why
these were chosen.
Include in your descriptions possible software and hardware
components as well as an operating system and the security
protections needed for those components.
Include a discussion of interoperability among the solutions you
choose.
Provide your rationale for your strat nctional Analysis and
Design—Use SQUARE for Requirements Information Gathering
In the previous step, the team initiated the project. In this step,
team members will focus on the functional design of the project.
To be completed by a designated team member:
Click the following link to learn more about
software quality requirements engineering (SQUARE)
. Then, identify the SQUARE process and provide an overview
of how to collect requirements for the security technology
and/or techniques that are being proposed.
This information will be added to the group report.
Step 4: Provide Analysis and Planning for Evaluating
Technologies
Once the team members have understood various ways to secure
data in the cloud, the team will analyze and develop a plan to
use technologies and/or techniques to meet the functional
requirements developed earlier for protecting client data
protection in transit.
To prepare, click the following links and learn more about
virtualization and cloud computing:
Server Virtualization
Benefits and Features of Cloud Computing
Mobile Cloud Computing
To be completed by a designated team member:
Compare different technologies and techniques, including
encryption,
access control
, and other techniques. Consider their efficiency, effectiveness,
and other factors that may affect the security of the data in the
cloud. Include your reasoning and conclusions in your
evaluation. Conclude which is generally a better, stronger
technique and why.
You will include this summary in your report.
Step 5: Create System Design Specifications
In the last step, the team completed an analysis of technologies
and techniques. In this step, the team will provide system
design specifications for a data-in-transit protection model.
To be completed by a designated team member:
Conduct independent research on system design specifications
and propose a set of design specifications that meet the design
requirements.
You will include these system design specifications in your
report.
For the next step, the team will explain the software
development plan.
Step 6: Explain the Software Development Plan
Now that the team has identified system specifications, provide
an explanation of the software development need and the plan
for software development, if any.
To be completed by a designated team member:
Identify different design and development considerations for the
system.
Include this explanation in the final report.
In the next step, the team will outline plans for testing and
integration.
Step 7: Provide a Plan for Testing and Integration
In the previous step, the team explained the software
development plan. In this step, the team will develop a plan for
testing and integration.
To be completed by a designated team member:
Include test plans for the various devices that will be used to
access the system. The following should be included in the plan:
Include testing for software functions as well as compatibility
with other software that may exist on those devices.
Include cloud data transactions as well as data transactions
outside the cloud.
Provide research and justification for applying data
confidentiality and data integrity protections.
Consider examples of technologies and/or techniques that can
be used to protect the data in transit.
Provide the expected results from implementing these
technologies and/or techniques.
Include the plan in the final report.
In the next step, the team will discuss how to adapt and deploy
the technology appropriate for software as a service (SaaS) in
the cloud.
Step 8: Adapt and Deploy Software as a Service
Once the team has successfully developed a testing and
integration plan, it is time to adapt and deploy software as a
service (SaaS) in the cloud model.
To be completed by a designated team member:
Provide a description of the SaaS adaptation and deployment
strategy in the final report. Include a deployment strategy for
the SaaS cloud infrastructure.
Include the following in the deployment strategy:
Cloud topology where these techniques are employed.
Various techniques used by various components.
Include this description in the final report.
Step 9: Provide a Plan for Operations and Maintenance
In the previous step, the team adapted SaaS. In this step, the
team will plan for operations and maintenance.
To be completed by a designated team member:
Prepare a plan for operations and maintenance of the system.
The plan should also include:
An auditing plan to assess the strength of the security controls
for the data in transit.
A process for continuous monitoring of the data in transit.
Include this plan in the final report.
In the next step, the team will create a disposal plan.
Step 10: Create a Disposal Plan
In the previous step, the team developed a plan for operations
and maintenance. In this step, the team will create a disposal
plan.
To be completed by a designated team member:
Prepare a disposal plan for the system including tools and
techniques used for disposal.
Include this disposal plan in the final report.

More Related Content

Similar to member is a security software architect in a cloud service provider .docx

Cryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxCryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxmydrynan
 
CST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.comCST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.comdonaldzs8
 
CST 630 Exceptional Education - snaptutorial.com
CST 630   Exceptional Education - snaptutorial.comCST 630   Exceptional Education - snaptutorial.com
CST 630 Exceptional Education - snaptutorial.comDavisMurphyA97
 
Cst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comCst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comrobertlesew6
 
Cst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.comCst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.comMcdonaldRyan79
 
Cst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.comCst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.comPrescottLunt385
 
Cst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.comCst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.comDavis11a
 
IT 600 Final Project Milestone Two Template Analytical Organi.docx
IT 600 Final Project Milestone Two Template Analytical Organi.docxIT 600 Final Project Milestone Two Template Analytical Organi.docx
IT 600 Final Project Milestone Two Template Analytical Organi.docxpriestmanmable
 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxtienboileau
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and designRobinsonObura
 
Throughout this course you will be working on several aspects of s.docx
Throughout this course you will be working on several aspects of s.docxThroughout this course you will be working on several aspects of s.docx
Throughout this course you will be working on several aspects of s.docxherthalearmont
 
IT 600 Final Project Guidelines and Rubric Overview.docx
IT 600 Final Project Guidelines and Rubric   Overview.docxIT 600 Final Project Guidelines and Rubric   Overview.docx
IT 600 Final Project Guidelines and Rubric Overview.docxAASTHA76
 
TEAM CAPSTONESECTIONS VI & VIIPROJECT MANAGE.docx
TEAM CAPSTONESECTIONS VI & VIIPROJECT MANAGE.docxTEAM CAPSTONESECTIONS VI & VIIPROJECT MANAGE.docx
TEAM CAPSTONESECTIONS VI & VIIPROJECT MANAGE.docxmattinsonjanel
 
Management Information Systems – Week 7 Lecture 2Developme.docx
Management Information Systems – Week 7 Lecture 2Developme.docxManagement Information Systems – Week 7 Lecture 2Developme.docx
Management Information Systems – Week 7 Lecture 2Developme.docxcroysierkathey
 
System Development Life_IntroductionCycle.pdf
System Development Life_IntroductionCycle.pdfSystem Development Life_IntroductionCycle.pdf
System Development Life_IntroductionCycle.pdfpncitechnologies
 
CPIN 269 Final Documentation
CPIN 269 Final DocumentationCPIN 269 Final Documentation
CPIN 269 Final DocumentationJennifer Cordes
 
 risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docxodiliagilby
 
Project on multiplex ticket bookingn system globsyn2014
Project on multiplex ticket bookingn system globsyn2014Project on multiplex ticket bookingn system globsyn2014
Project on multiplex ticket bookingn system globsyn2014Md Imran
 
Software development life cycle
Software development life cycle Software development life cycle
Software development life cycle shefali mishra
 

Similar to member is a security software architect in a cloud service provider .docx (20)

Cryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxCryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docx
 
CST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.comCST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.com
 
CST 630 Exceptional Education - snaptutorial.com
CST 630   Exceptional Education - snaptutorial.comCST 630   Exceptional Education - snaptutorial.com
CST 630 Exceptional Education - snaptutorial.com
 
Cst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comCst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.com
 
Cst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.comCst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.com
 
Cst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.comCst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.com
 
Cst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.comCst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.com
 
IT 600 Final Project Milestone Two Template Analytical Organi.docx
IT 600 Final Project Milestone Two Template Analytical Organi.docxIT 600 Final Project Milestone Two Template Analytical Organi.docx
IT 600 Final Project Milestone Two Template Analytical Organi.docx
 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docx
 
Sdlc
SdlcSdlc
Sdlc
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
 
Throughout this course you will be working on several aspects of s.docx
Throughout this course you will be working on several aspects of s.docxThroughout this course you will be working on several aspects of s.docx
Throughout this course you will be working on several aspects of s.docx
 
IT 600 Final Project Guidelines and Rubric Overview.docx
IT 600 Final Project Guidelines and Rubric   Overview.docxIT 600 Final Project Guidelines and Rubric   Overview.docx
IT 600 Final Project Guidelines and Rubric Overview.docx
 
TEAM CAPSTONESECTIONS VI & VIIPROJECT MANAGE.docx
TEAM CAPSTONESECTIONS VI & VIIPROJECT MANAGE.docxTEAM CAPSTONESECTIONS VI & VIIPROJECT MANAGE.docx
TEAM CAPSTONESECTIONS VI & VIIPROJECT MANAGE.docx
 
Management Information Systems – Week 7 Lecture 2Developme.docx
Management Information Systems – Week 7 Lecture 2Developme.docxManagement Information Systems – Week 7 Lecture 2Developme.docx
Management Information Systems – Week 7 Lecture 2Developme.docx
 
System Development Life_IntroductionCycle.pdf
System Development Life_IntroductionCycle.pdfSystem Development Life_IntroductionCycle.pdf
System Development Life_IntroductionCycle.pdf
 
CPIN 269 Final Documentation
CPIN 269 Final DocumentationCPIN 269 Final Documentation
CPIN 269 Final Documentation
 
 risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx
 
Project on multiplex ticket bookingn system globsyn2014
Project on multiplex ticket bookingn system globsyn2014Project on multiplex ticket bookingn system globsyn2014
Project on multiplex ticket bookingn system globsyn2014
 
Software development life cycle
Software development life cycle Software development life cycle
Software development life cycle
 

More from wkyra78

Melissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docx
Melissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docxMelissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docx
Melissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docxwkyra78
 
Melissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docx
Melissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docxMelissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docx
Melissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docxwkyra78
 
Meiner, S. E., & Yeager, J. J. (2019). Chapter 17Chap.docx
Meiner, S. E., & Yeager, J. J. (2019).    Chapter 17Chap.docxMeiner, S. E., & Yeager, J. J. (2019).    Chapter 17Chap.docx
Meiner, S. E., & Yeager, J. J. (2019). Chapter 17Chap.docxwkyra78
 
Melissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docx
Melissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docxMelissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docx
Melissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docxwkyra78
 
Melissa is a 15-year-old high school student. Over the last week.docx
Melissa is a 15-year-old high school student. Over the last week.docxMelissa is a 15-year-old high school student. Over the last week.docx
Melissa is a 15-year-old high school student. Over the last week.docxwkyra78
 
Measurement  of  the  angle  θ          .docx
Measurement  of  the  angle  θ          .docxMeasurement  of  the  angle  θ          .docx
Measurement  of  the  angle  θ          .docxwkyra78
 
Measurement of the angle θ For better understanding .docx
Measurement of the angle θ     For better understanding .docxMeasurement of the angle θ     For better understanding .docx
Measurement of the angle θ For better understanding .docxwkyra78
 
Meaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docx
Meaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docxMeaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docx
Meaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docxwkyra78
 
MBA6231 - 1.1 - project charter.docxProject Charter Pr.docx
MBA6231 - 1.1 - project charter.docxProject Charter Pr.docxMBA6231 - 1.1 - project charter.docxProject Charter Pr.docx
MBA6231 - 1.1 - project charter.docxProject Charter Pr.docxwkyra78
 
Medication Errors Led to Disastrous Outcomes1. Search th.docx
Medication Errors Led to Disastrous Outcomes1. Search th.docxMedication Errors Led to Disastrous Outcomes1. Search th.docx
Medication Errors Led to Disastrous Outcomes1. Search th.docxwkyra78
 
Meet, call, Skype or Zoom with a retired athlete and interview himh.docx
Meet, call, Skype or Zoom with a retired athlete and interview himh.docxMeet, call, Skype or Zoom with a retired athlete and interview himh.docx
Meet, call, Skype or Zoom with a retired athlete and interview himh.docxwkyra78
 
Medication Administration Make a list of the most common med.docx
Medication Administration Make a list of the most common med.docxMedication Administration Make a list of the most common med.docx
Medication Administration Make a list of the most common med.docxwkyra78
 
media portfolio”about chapter 1 to 15 from the book  Ci.docx
media portfolio”about chapter 1 to 15 from the book  Ci.docxmedia portfolio”about chapter 1 to 15 from the book  Ci.docx
media portfolio”about chapter 1 to 15 from the book  Ci.docxwkyra78
 
MediationNameAMUDate.docx
MediationNameAMUDate.docxMediationNameAMUDate.docx
MediationNameAMUDate.docxwkyra78
 
Media coverage influences the publics perception of the crimina.docx
Media coverage influences the publics perception of the crimina.docxMedia coverage influences the publics perception of the crimina.docx
Media coverage influences the publics perception of the crimina.docxwkyra78
 
Media Content AnalysisPurpose Evaluate the quality and value of.docx
Media Content AnalysisPurpose Evaluate the quality and value of.docxMedia Content AnalysisPurpose Evaluate the quality and value of.docx
Media Content AnalysisPurpose Evaluate the quality and value of.docxwkyra78
 
Mayan gods and goddesses are very much a part of this text.  Their i.docx
Mayan gods and goddesses are very much a part of this text.  Their i.docxMayan gods and goddesses are very much a part of this text.  Their i.docx
Mayan gods and goddesses are very much a part of this text.  Their i.docxwkyra78
 
Media and SocietyIn 1,100 words, complete the followingAn.docx
Media and SocietyIn 1,100 words, complete the followingAn.docxMedia and SocietyIn 1,100 words, complete the followingAn.docx
Media and SocietyIn 1,100 words, complete the followingAn.docxwkyra78
 
MBA 5110 – Business Organization and ManagementMidterm ExamAns.docx
MBA 5110 – Business Organization and ManagementMidterm ExamAns.docxMBA 5110 – Business Organization and ManagementMidterm ExamAns.docx
MBA 5110 – Business Organization and ManagementMidterm ExamAns.docxwkyra78
 
Media & Culture AssignmentFor this assignment, you are to develo.docx
Media & Culture AssignmentFor this assignment, you are to develo.docxMedia & Culture AssignmentFor this assignment, you are to develo.docx
Media & Culture AssignmentFor this assignment, you are to develo.docxwkyra78
 

More from wkyra78 (20)

Melissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docx
Melissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docxMelissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docx
Melissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docx
 
Melissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docx
Melissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docxMelissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docx
Melissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docx
 
Meiner, S. E., & Yeager, J. J. (2019). Chapter 17Chap.docx
Meiner, S. E., & Yeager, J. J. (2019).    Chapter 17Chap.docxMeiner, S. E., & Yeager, J. J. (2019).    Chapter 17Chap.docx
Meiner, S. E., & Yeager, J. J. (2019). Chapter 17Chap.docx
 
Melissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docx
Melissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docxMelissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docx
Melissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docx
 
Melissa is a 15-year-old high school student. Over the last week.docx
Melissa is a 15-year-old high school student. Over the last week.docxMelissa is a 15-year-old high school student. Over the last week.docx
Melissa is a 15-year-old high school student. Over the last week.docx
 
Measurement  of  the  angle  θ          .docx
Measurement  of  the  angle  θ          .docxMeasurement  of  the  angle  θ          .docx
Measurement  of  the  angle  θ          .docx
 
Measurement of the angle θ For better understanding .docx
Measurement of the angle θ     For better understanding .docxMeasurement of the angle θ     For better understanding .docx
Measurement of the angle θ For better understanding .docx
 
Meaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docx
Meaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docxMeaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docx
Meaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docx
 
MBA6231 - 1.1 - project charter.docxProject Charter Pr.docx
MBA6231 - 1.1 - project charter.docxProject Charter Pr.docxMBA6231 - 1.1 - project charter.docxProject Charter Pr.docx
MBA6231 - 1.1 - project charter.docxProject Charter Pr.docx
 
Medication Errors Led to Disastrous Outcomes1. Search th.docx
Medication Errors Led to Disastrous Outcomes1. Search th.docxMedication Errors Led to Disastrous Outcomes1. Search th.docx
Medication Errors Led to Disastrous Outcomes1. Search th.docx
 
Meet, call, Skype or Zoom with a retired athlete and interview himh.docx
Meet, call, Skype or Zoom with a retired athlete and interview himh.docxMeet, call, Skype or Zoom with a retired athlete and interview himh.docx
Meet, call, Skype or Zoom with a retired athlete and interview himh.docx
 
Medication Administration Make a list of the most common med.docx
Medication Administration Make a list of the most common med.docxMedication Administration Make a list of the most common med.docx
Medication Administration Make a list of the most common med.docx
 
media portfolio”about chapter 1 to 15 from the book  Ci.docx
media portfolio”about chapter 1 to 15 from the book  Ci.docxmedia portfolio”about chapter 1 to 15 from the book  Ci.docx
media portfolio”about chapter 1 to 15 from the book  Ci.docx
 
MediationNameAMUDate.docx
MediationNameAMUDate.docxMediationNameAMUDate.docx
MediationNameAMUDate.docx
 
Media coverage influences the publics perception of the crimina.docx
Media coverage influences the publics perception of the crimina.docxMedia coverage influences the publics perception of the crimina.docx
Media coverage influences the publics perception of the crimina.docx
 
Media Content AnalysisPurpose Evaluate the quality and value of.docx
Media Content AnalysisPurpose Evaluate the quality and value of.docxMedia Content AnalysisPurpose Evaluate the quality and value of.docx
Media Content AnalysisPurpose Evaluate the quality and value of.docx
 
Mayan gods and goddesses are very much a part of this text.  Their i.docx
Mayan gods and goddesses are very much a part of this text.  Their i.docxMayan gods and goddesses are very much a part of this text.  Their i.docx
Mayan gods and goddesses are very much a part of this text.  Their i.docx
 
Media and SocietyIn 1,100 words, complete the followingAn.docx
Media and SocietyIn 1,100 words, complete the followingAn.docxMedia and SocietyIn 1,100 words, complete the followingAn.docx
Media and SocietyIn 1,100 words, complete the followingAn.docx
 
MBA 5110 – Business Organization and ManagementMidterm ExamAns.docx
MBA 5110 – Business Organization and ManagementMidterm ExamAns.docxMBA 5110 – Business Organization and ManagementMidterm ExamAns.docx
MBA 5110 – Business Organization and ManagementMidterm ExamAns.docx
 
Media & Culture AssignmentFor this assignment, you are to develo.docx
Media & Culture AssignmentFor this assignment, you are to develo.docxMedia & Culture AssignmentFor this assignment, you are to develo.docx
Media & Culture AssignmentFor this assignment, you are to develo.docx
 

Recently uploaded

Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

member is a security software architect in a cloud service provider .docx

  • 1. member is a security software architect in a cloud service provider company, assigned to a project to provide the client with data integrity and confidentiality protections for data in transit that will be using applications in the cloud. Your client is an HR company that is moving HR applications and HR data into a community cloud, sharing tenancy with other clients. Your company has set up a software as a service, SAS, offering for its client base. The data that the HR company will be pushing to and from the cloud will contain sensitive employee information, such as personally identifiable information, PII. You will have to address sensitive data and transit issues of the client data using the HR applications stored in the cloud, and provide a life cycle management report that includes solutions to the cloud computing architect of your company. Software Development Life Cycle Technology development and implementation usually follow a software development life cycle (SDLC) methodology. This approach ensures accuracy of information for analysis and decision making, as well as appropriate resources for effective technology management. You and your team members will use components of the SDLC methodology to develop a life cycle management report for the cloud computing architect of a company. This is a group exercise, representing the kind of collaboration often required in the cybersecurity technology community. There are 11 steps to lead you through this project. Similar steps are typically used in organizational SDLC projects. Most steps should take no more than two hours to complete, and the
  • 2. entire project should take no more than three weeks to complete. Begin with the workplace scenario, and then continue with Step 1: “Initiating the Project.” Life Cycle Management Report: A 10- to 15-page double-spaced Word document on data protection techniques for a cloud-based service with citations in APA format. The page count does not include figures or tables. There is no penalty for using additional pages if you need them. Include a minimum of six references. Include a reference list with the report. As the cloud security architect, you must understand the security development life cycle process. Review the following resources to learn about the security development life cycle process: security development life cycle software development methodologies Click the following links to learn more about critical infrastructure sectors: Critical Infrastructure Sectors . Read their descriptions and consider which sector you support in your role. Process Control Systems: Cybersecurity and Defense To be completed by a designated team member:
  • 3. You will begin your Life Cycle Management Report now. Choose a fictional or actual organization. Describe the mission of the organization and the business need to move to a cloud environment. Identify the scope of the security architecture and include a topology. To narrow your scope, focus on issues that application security engineers can control. Avoid discussing resilience and business continuity issues, physical security issues, traditional best practices for software development, or underlying infrastructure security. Examples of topology include Amazon Web Services, Generic Hadoop, Map-r, Cloudera, or Microsoft Azure. In your report, you will combine security development life cycle and software development life cycle methodologies. When you are considering the software development life cycle approach, consider what model you are following. SDLC examples include Waterfall, Spiral, Agile, and Extreme Programming. Address confidentiality, integrity, and availability requirements for data at rest and data in transit. Think like an attacker exploiting software vulnerabilities and the likelihood of those vulnerabilities being exploited. Think about data in use in the memory of the processing systems. Where in the system are the data most vulnerable? Describe the concepts and products you chose and explain why
  • 4. these were chosen. Include in your descriptions possible software and hardware components as well as an operating system and the security protections needed for those components. Include a discussion of interoperability among the solutions you choose. Provide your rationale for your strat nctional Analysis and Design—Use SQUARE for Requirements Information Gathering In the previous step, the team initiated the project. In this step, team members will focus on the functional design of the project. To be completed by a designated team member: Click the following link to learn more about software quality requirements engineering (SQUARE) . Then, identify the SQUARE process and provide an overview of how to collect requirements for the security technology and/or techniques that are being proposed. This information will be added to the group report. Step 4: Provide Analysis and Planning for Evaluating Technologies Once the team members have understood various ways to secure data in the cloud, the team will analyze and develop a plan to use technologies and/or techniques to meet the functional requirements developed earlier for protecting client data protection in transit. To prepare, click the following links and learn more about
  • 5. virtualization and cloud computing: Server Virtualization Benefits and Features of Cloud Computing Mobile Cloud Computing To be completed by a designated team member: Compare different technologies and techniques, including encryption, access control , and other techniques. Consider their efficiency, effectiveness, and other factors that may affect the security of the data in the cloud. Include your reasoning and conclusions in your evaluation. Conclude which is generally a better, stronger technique and why. You will include this summary in your report. Step 5: Create System Design Specifications In the last step, the team completed an analysis of technologies and techniques. In this step, the team will provide system design specifications for a data-in-transit protection model. To be completed by a designated team member: Conduct independent research on system design specifications and propose a set of design specifications that meet the design requirements. You will include these system design specifications in your
  • 6. report. For the next step, the team will explain the software development plan. Step 6: Explain the Software Development Plan Now that the team has identified system specifications, provide an explanation of the software development need and the plan for software development, if any. To be completed by a designated team member: Identify different design and development considerations for the system. Include this explanation in the final report. In the next step, the team will outline plans for testing and integration. Step 7: Provide a Plan for Testing and Integration In the previous step, the team explained the software development plan. In this step, the team will develop a plan for testing and integration. To be completed by a designated team member: Include test plans for the various devices that will be used to access the system. The following should be included in the plan: Include testing for software functions as well as compatibility with other software that may exist on those devices.
  • 7. Include cloud data transactions as well as data transactions outside the cloud. Provide research and justification for applying data confidentiality and data integrity protections. Consider examples of technologies and/or techniques that can be used to protect the data in transit. Provide the expected results from implementing these technologies and/or techniques. Include the plan in the final report. In the next step, the team will discuss how to adapt and deploy the technology appropriate for software as a service (SaaS) in the cloud. Step 8: Adapt and Deploy Software as a Service Once the team has successfully developed a testing and integration plan, it is time to adapt and deploy software as a service (SaaS) in the cloud model. To be completed by a designated team member: Provide a description of the SaaS adaptation and deployment strategy in the final report. Include a deployment strategy for the SaaS cloud infrastructure. Include the following in the deployment strategy: Cloud topology where these techniques are employed.
  • 8. Various techniques used by various components. Include this description in the final report. Step 9: Provide a Plan for Operations and Maintenance In the previous step, the team adapted SaaS. In this step, the team will plan for operations and maintenance. To be completed by a designated team member: Prepare a plan for operations and maintenance of the system. The plan should also include: An auditing plan to assess the strength of the security controls for the data in transit. A process for continuous monitoring of the data in transit. Include this plan in the final report. In the next step, the team will create a disposal plan. Step 10: Create a Disposal Plan In the previous step, the team developed a plan for operations and maintenance. In this step, the team will create a disposal plan. To be completed by a designated team member: Prepare a disposal plan for the system including tools and techniques used for disposal.
  • 9. Include this disposal plan in the final report.