Essential Reading:
Baron, H., Heide, S., Mahmud, S., & Yeoh, J. (2019). Cloud Security Complexity: Challenges in Managing Security in Hybrid and Multi-Cloud Environments. Retrieved from https://cloudsecurityalliance.org/artifacts/cloud-security-complexity/
Ahmed, I., Nahar, T., Urmi, S. S., & Taher, K. A. (2020). Protection of Sensitive Data in Zero Trust Model. Proceedings of the International Conference on Computing Advancements, Retrieved from https://dl.acm.org/doi/pdf/10.1145/3377049.3377114
Cunningham, C., Holmes, D., Pollard, J., & Their, D. (2019). The eight business and security benefits of zero trust. Retrieved from https://www.managementbase.com/mb/akamai/Akamai-the-eight-business-and-security-benefits-of-zero-trust-report.pdf
Scenario
So you have been Servicing DR Alarms for a while now. So far, all of your projects have been completed successfully and your organisation earned a SLA to provide Security and Privacy Protection Contract with the Dr Alarms. The contract is for the period of 2 years and covers al of the organisations’ cloud privacy & security needs! In order to deliver such a big (and fairly diverse!) project,You need to work as part of a team. A Team will include 3 members note that INDIVIDUAL REPORTS ARE TO BE SUBMITTED FROM EACH OF THE TEAM MEMBERS!
Tasks
You have been engaged to compile a consolidated security & privacy protection policy. The policy must be developed EXCLUSIVELY around Security products and services available via AWS (either directly or via licensed distributors) and incorporate process maps for each of the key policy
areas. The policy document/report must include:
- Executive Summary (10 marks)
- Brief Introduction (10 marks)
- DR Alarms Zero Trust- based Cloud Security Requirements Summary (25 marks)
- AWS Security Baselines/Benchmarks for each of the security requirements outlined in 3. Note: Should include reference to specific AWS products/services available for each of the key security requirements (25 marks)
- Data Sovereignty Challenges $ Strategy for addressing those challenges (25 marks)
- Brief Conclusion (5 marks)
You are to submit your report using the following sub-headings to complete this assessment:
·Executive Summary
·Introduction
·Zero Trust Security Requirements Summary
·AWS Products and Services required
·Data Sovereignty Challenges
·Conclusion
Your report should have a word limit of 3,000 words ± 10%. Your report is to be fully referenced using the APA 7th edition style.
Your report should not use any template developed by a Government Department or Agency. References to the Australian Government’s Information Security Manual or the Protective Security Policy Framework are not permitted.
Question | HD | D | C | P | F |
Benefits of Using Zero Trust Models | Comprehensive exploration of Benefits of AWS Zero Trust Models that includes well considered and argued reasoning | Through exploration of Benefits of AWS Zero Trust Models that includes good reasoning | Detailed exploration of Benefits of AWS Zero Trust Models that includes some reasoning | Adequate exploration of Benefits of AWS Zero Trust Models that includes some good reasoning | Incomplete exploration of Benefits of AWS Zero Trust Models that includes little or no reasoning |
Risks and Challenges of Deploying AWS Zero Trust Models | Comprehensive exploration of Risks and Challenges of Deploying AWS Zero Trust Models that includes well considered and argued reasoning | Though exploration of Risks and Challenges of Deploying AWS Zero Trust Models that includes good reasoning | Detailed exploration of Risks and Challenges of Deploying AWS Zero Trust Models that includes some reasoning | Adequate exploration of Risks and Challenges of Deploying AWS Zero Trust Models that includes some good reasoning | Incomplete exploration of Risks and Challenges of Deploying AWS Zero Trust Models that includes little or no reasoning |
Zero Trust Implementation | Comprehensive exploration of Zero Trust Implementation that includes well considered and argued reasoning | Though exploration of Zero Trust Implementation that includes good reasoning | Detailed exploration of Zero Trust Implementation that includes some good reasoning | Adequate exploration of Zero Trust Implementation that includes some good reasoning | Incomplete exploration of Zero Trust Implementation that includes little or no Reasoning |
Get Expert help for Security and Privacy Protection Contract with the Dr Alarms and many more. Urgent, plag free. 100% safe & trusted. Order online now!