logo

Responding to Security and Privacy Breaches

   

Added on  2023-06-08

12 Pages3612 Words78 Views
Data Science and Big Data
 | 
 | 
 | 
RESPONDING TO
SECURITY AND PRIVACY
BREACHES
Responding to Security and Privacy Breaches_1

Table of Contents
INTRODUCTION...........................................................................................................................3
MAIN BODY..................................................................................................................................3
Benefits of AWS Zero Trust Models-.........................................................................................3
Risks and Challenges of Deploying AWS Zero Trust Models....................................................5
Risks............................................................................................................................................5
Challenges....................................................................................................................................6
Downsides of using AWS Zero Trust as opposed to alternative solutions..................................7
Zero Trust implementation for Dr Alarms...................................................................................7
CONCLUSION................................................................................................................................9
REFERENCES................................................................................................................................1
Responding to Security and Privacy Breaches_2

INTRODUCTION
Security beaches referred to as any of the incident which has the outcomes in the
unauthorised access to the data of computer, applications as well as the devices and the network.
This leads to the information is being accessed without any authorisation. When there is weak
and the stolen credentials of securing the data then the security breaches happens. The stolen
password is one of the most common cause of the data breaches (Ghafir & et.al., (2018). This
report will discuss the comparison between the layered defence and the zero trust security
models. Along with this, the main benefits of using the zero trust security models will be
illustrated as well as the main risks and the challenges of using the AWS zero trust security
models will be discussed. Further, the zero trust implementation strategies will be covered within
this report.
MAIN BODY
Benefits of AWS Zero Trust Models-
The zero trust model is basically the security framework which requires all the users
which involves inside and the outside network of the organisation. These has to be authenticated,
authorised as well as it is continuously validated for the configuration of the security as well as
the posture before it is been granted to keep the applications and the data. This model assumes
that there is none of the traditional network edge as networks can be local, or in the cloud, or
may be in the combination or the hybrid within the resources as well as the workers at the any of
the location (Wylde, (2021).
The zero trust framework is used for the security of the infrastructure as well as the data
for the present digital transformation. It helps the companies to solve and address the modern
challenges which are faced within their businesses which involves securing the remote workers,
hybrid cloud environments as well as the ransomware threats. There are number of the benefits
for the companies using this security models within the AWS as this framework is very holistic
for the organisations. These benefits are such as-
Accuracy within infrastructure inventory: The zero trust model requires the administration
which handles exactly the same thing which the users devices, services as well as the
applications are involves in the corporate infrastructure as well as where all the resources are
residing. This means there is accurate infrastructure inventory which is very helpful as regarding
Responding to Security and Privacy Breaches_3

the security matters and this also highly beneficial for the long term performance for the overall
purpose of the planning.
Improving the alerting and monitoringto implement : Monitoring the zero trust model is very
complex till the right resources are not used by the companies such as the security orchestration,
automation as well as the response and the network detection response (Samaniego & Deters,
(2018). Using the combination of the log as well as the event analysis helps in identifying the
security issuers and then this allows to provide the strategies or the ways for remediate these
issue and the problems. This enables the security operations centre administrating the ability for
quickly detecting and then responding to the cybersecurity threats if happens. AWS is the
platform where the companies stores there data using this model will allow them to effectively
detect the issues and the problems and taking the immediate actions for solving them so that the
cybersecurity threats can be eliminated.
Improves the experience of the user: When any of the organisation think of using the IT
security, the first and the foremost thing which comes in there mind is how to effectively keep
the track over the various passwords which they requires for accessing the number of the
applications and the data. One of the key aspect of the zero trust model is the ability of deploying
of single sign-on (SSO) tools as this helps them in simplifying the problem of managing the
various passwords for keeping the track over them (Egerton & et.al., (2021).
The SSO is the authentication framework which helps in organising the resources of the
infrastructure or the devices of the users which they have to access. This helps them in reducing
the problem of the password mismanagement as well as allows the users for easily getting the
resources they requires and on the other hand, the single authentication as well as controls the
operations transparently in the background. Using SSO within the AWS will help them in
managing the passwords of the applications effectively.
Creates the security policy: The companies which are using the transitional models has the
higher level of the risks for privacy and the security breaches. In this, each of the security tool is
separately configured as well as operated independently among all of the security tools. The zero
trust regarding this helps much to the companies as in this model, the universal policy can be
made and created once and this is then implemented throughout the organisation. In this, the
deployment and the management of the security policy becomes more streamlined from the
Responding to Security and Privacy Breaches_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Business continuity plan Assignment PDF
|10
|2217
|80

Cloud Computing
|10
|1592
|194

Proposed Architectures for a Hybrid Cloud: Microsoft Azure and Amazon Web Services
|7
|2176
|345

Migration of the Web Server
|17
|991
|89

Cloud Risk Assessment: Risks and Mitigation Strategies for AWS Edge
|12
|3545
|301

Webb Stores Cloud Computing Solution
|8
|1822
|113