member is a security software architect in a cloud service provider company, assigned to a project to provide the client with data integrity and confidentiality protections for data in transit that will be using applications in the cloud. Your client is an HR company that is moving HR applications and HR data into a community cloud, sharing tenancy with other clients. Your company has set up a software as a service, SAS, offering for its client base.
The data that the HR company will be pushing to and from the cloud will contain sensitive employee information, such as personally identifiable information, PII. You will have to address sensitive data and transit issues of the client data using the HR applications stored in the cloud, and provide a life cycle management report that includes solutions to the cloud computing architect of your company.
Technology development and implementation usually follow a software development life cycle (SDLC) methodology. This approach ensures accuracy of information for analysis and decision making, as well as appropriate resources for effective technology management.
You and your team members will use components of the SDLC methodology to develop a life cycle management report for the cloud computing architect of a company. This is a group exercise, representing the kind of collaboration often required in the cybersecurity technology community.
There are 11 steps to lead you through this project. Similar steps are typically used in organizational SDLC projects. Most steps should take no more than two hours to complete, and the entire project should take no more than three weeks to complete. Begin with the workplace scenario, and then continue with Step 1: “Initiating the Project.”
As the cloud security architect, you must understand the security development life cycle process. Review the following resources to learn about the security development life cycle process:
Click the following links to learn more about critical infrastructure sectors:
To be completed by a designated team member:
You will begin your Life Cycle Management Report now.
Provide your rationale for your strat nctional Analysis and Design—Use SQUARE for Requirements Information Gathering
In the previous step, the team initiated the project. In this step, team members will focus on the functional design of the project.
To be completed by a designated team member:
Click the following link to learn more about software quality requirements engineering (SQUARE). Then, identify the SQUARE process and provide an overview of how to collect requirements for the security technology and/or techniques that are being proposed.
This information will be added to the group report.
Once the team members have understood various ways to secure data in the cloud, the team will analyze and develop a plan to use technologies and/or techniques to meet the functional requirements developed earlier for protecting client data protection in transit.
To prepare, click the following links and learn more about virtualization and cloud computing:
To be completed by a designated team member:
Compare different technologies and techniques, including encryption, access control, and other techniques. Consider their efficiency, effectiveness, and other factors that may affect the security of the data in the cloud. Include your reasoning and conclusions in your evaluation. Conclude which is generally a better, stronger technique and why.
You will include this summary in your report.
In the last step, the team completed an analysis of technologies and techniques. In this step, the team will provide system design specifications for a data-in-transit protection model.
To be completed by a designated team member:
Conduct independent research on system design specifications and propose a set of design specifications that meet the design requirements.
You will include these system design specifications in your report.
For the next step, the team will explain the software development plan.
Now that the team has identified system specifications, provide an explanation of the software development need and the plan for software development, if any.
To be completed by a designated team member:
Identify different design and development considerations for the system.
Include this explanation in the final report.
In the next step, the team will outline plans for testing and integration.
In the previous step, the team explained the software development plan. In this step, the team will develop a plan for testing and integration.
To be completed by a designated team member:
Include test plans for the various devices that will be used to access the system. The following should be included in the plan:
Include the plan in the final report.
In the next step, the team will discuss how to adapt and deploy the technology appropriate for software as a service (SaaS) in the cloud.
Once the team has successfully developed a testing and integration plan, it is time to adapt and deploy software as a service (SaaS) in the cloud model.
To be completed by a designated team member:
Provide a description of the SaaS adaptation and deployment strategy in the final report. Include a deployment strategy for the SaaS cloud infrastructure.
Include the following in the deployment strategy:
Include this description in the final report.
In the previous step, the team adapted SaaS. In this step, the team will plan for operations and maintenance.
To be completed by a designated team member:
Prepare a plan for operations and maintenance of the system. The plan should also include:
Include this plan in the final report.
In the next step, the team will create a disposal plan.
In the previous step, the team developed a plan for operations and maintenance. In this step, the team will create a disposal plan.
To be completed by a designated team member:
Prepare a disposal plan for the system including tools and techniques used for disposal.
Include this disposal plan in the final report.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more