The document outlines an assignment that includes 5 questions about cloud security. Question 1 examines shared responsibility models and how cloud providers and customers each ensure security. Question 2 discusses the role of encryption in transit and at rest and challenges with encryption in the cloud. Question 3 compares identity and access management for on-premise systems versus cloud and best practices for securing cloud resources. Question 4 explores zero trust security principles in cloud computing and how it differs from traditional models. Question 5 examines security considerations when migrating applications to the cloud, including steps for a secure migration and risks/mitigations. The document notes that students should upload a scanned copy and submit a hard copy of the completed assignment.
The document outlines an assignment that includes 5 questions about cloud security. Question 1 examines shared responsibility models and how cloud providers and customers each ensure security. Question 2 discusses the role of encryption in transit and at rest and challenges with encryption in the cloud. Question 3 compares identity and access management for on-premise systems versus cloud and best practices for securing cloud resources. Question 4 explores zero trust security principles in cloud computing and how it differs from traditional models. Question 5 examines security considerations when migrating applications to the cloud, including steps for a secure migration and risks/mitigations. The document notes that students should upload a scanned copy and submit a hard copy of the completed assignment.
The document outlines an assignment that includes 5 questions about cloud security. Question 1 examines shared responsibility models and how cloud providers and customers each ensure security. Question 2 discusses the role of encryption in transit and at rest and challenges with encryption in the cloud. Question 3 compares identity and access management for on-premise systems versus cloud and best practices for securing cloud resources. Question 4 explores zero trust security principles in cloud computing and how it differs from traditional models. Question 5 examines security considerations when migrating applications to the cloud, including steps for a secure migration and risks/mitigations. The document notes that students should upload a scanned copy and submit a hard copy of the completed assignment.
Q1. Examine the shared responsibility model in cloud security.
Analyze the responsibilities of both cloud service providers and customers in ensuring a secure cloud environment. Provide examples to illustrate how this model is applied in practice.
Q2. Discuss the role of encryption in cloud security. Analyze
how encryption techniques contribute to data confidentiality in transit and at rest. Evaluate potential challenges and trade-offs associated with implementing encryption in a cloud environment.
Q3. Compare and contrast identity and access management
(IAM) in on-premise systems and cloud environments. Analyze the unique challenges and advantages of implementing IAM in the cloud. Provide examples of IAM best practices for securing cloud resources.
Q4. Explore the concept of zero trust security in the context of
cloud computing. Analyze the principles behind zero trust and how it differs from traditional security models. Discuss the potential benefits and challenges of implementing a zero trust approach in a cloud infrastructure. Q5. Examine the security considerations when migrating applications from an on-premise environment to the cloud. Analyze the key steps and best practices for ensuring a secure migration process. Discuss potential risks and mitigation strategies for a successful cloud migration.
NOTE: Upload scan copy and submit a hard copy of the Assignment