Ask a question from expert

Ask now

Security Management and Migration Report

11 Pages2567 Words372 Views
   

Added on  2019-11-08

Security Management and Migration Report

   Added on 2019-11-08

BookmarkShareRelated Documents
Running head: CLOUD COMPUTINGAssessment 1 Security Management and Migration [Student Name, ID][Student Email] [Professor’s Name Here][Date Here][Name] [Student No.]
Security Management and Migration Report_1
CLOUD COMPUTINGExecutive SummaryVirtualization technologies are defiantly the next big thing in the world of technology as theypresent new and refined platforms for conducting different operations in the digitalenvironment. As an example of these technologies, cloud computing is at the forefront ofdelivering services and resources to users based on their immediate needs. This outcomemakes the technology a key component of IT as it allows users to maximise on resourceswhile increasing the benefits and conveniences of operations. Now, similar objectives areheld by Webb’s Stores, who in their existing IT infrastructure are presented with manychallenges particularly in the management of their data. Therefore, this report outlines thesteps and procedures that can be used to deploy the cloud infrastructure in accordance withthe organization’s requirements. Moreover, the report also offers decisive recommendationson the tools, procedures and measures to implement in order to safeguard the data used. [Name] [Student No.]2
Security Management and Migration Report_2
CLOUD COMPUTINGTable of ContentsContents PageTask 1: IaaS security..........................................................................3a. IaaS security...................................................................................3b. Benefits and issues of the security features...................................3Task 2: Risks of cloud migration.......................................................4a. Database risks.............................................................................4b. IaaS infrastructure.......................................................................5c. Communication between IaaS (CSP) and Webb’s Stores..........5Task 3: Backup and archival of records...........................................6a. Risks of cloud backups...............................................................6i. Backing up data.........................................................................6ii. Storage of data in the cloud.....................................................6iii. Retrieval of data......................................................................7b. How DR plan is affected by the cloud resource........................7Task 4: Cloud access protection........................................................8a. IaaS infrastructure.......................................................................8b. Ms SQL cloud server instance....................................................8c. Cloud network structure..............................................................9d. Cloud back-up and restoration structure.....................................9References..........................................................................................10[Name] [Student No.]3
Security Management and Migration Report_3
CLOUD COMPUTINGTask 1: IaaS securitya. IaaS securityMost modern IaaS infrastructure will offer adequate security features, however, the leasingorganization (like Webb) should enforce them in their own resources rather than expect theservice providers to do so. Nevertheless, there are key types of security measures toimplement:Data encryption – it’s outlined as the main and most important methods of protecting dataas it meticulously manages security systems including the access keys as they arethoroughly encrypted.Network encryption – most cloud service providers (CSP) will empathize on theencryption of the communication channel to deter interception threats that prey on thevulnerabilities of data transportation.Access control – to create accountability, Webb’s Stores, must know the people accessingtheir critical database hosted in the IaaS resources. This accountability is enforced usingaccess control measures that manage user’s activities. Finally, a security access brokers – known as CASBs, these are tools that helpadministrators to identify and locate risks within the database thus providing a high-endlevel encryption[ CITATION Wal15 \l 2057 ].b. Benefits and issues of the security featuresBenefits: First, protection against attacks more so, denial of service attacks that interceptcloud services.Security of the data – the features would protect the critical database and its data.[Name] [Student No.]4
Security Management and Migration Report_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on Webb Stores and Cloud Computing
|13
|2905
|54

Assignment Cloud Computing Information Technology
|14
|3513
|308

(Solved) Assignment on Cloud Computing
|13
|2925
|208

Assignment on Cloud Computing and Webb Store
|13
|2958
|265

Data Migration in Webb Store: Assignment
|9
|2809
|83

Cloud Technology : Report
|12
|2121
|119