Comprehensive Report: Cloud Privacy, Security, and Governance

Verified

Added on  2023/06/06

|35
|1107
|202
Report
AI Summary
This report provides a comprehensive analysis of cloud privacy and security, focusing on the MyLicense portal. It includes a Threat and Risk Assessment (TRA) to identify potential vulnerabilities and outlines preventive actions and contingency plans. The report details a Personal Identifiable Information (PII) strategy to mitigate identified threats and risks, along with an Informal Digital Identity strategy. Furthermore, it establishes a governance plan for various SaaS solutions, covering rules, procedures, and guidelines for managing PII data and digital identities across different user groups, including MyLicense portal users, DAS HR personnel, contractors, and staff in the COTS payroll suite. The report concludes with recommendations for maintaining data privacy, ensuring data integrity, and improving overall security compliance.
Document Page
CLOUD PRIVACY AND
SECURITY
Student Name:
Student ID:
University Name:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
DAS
MyLicense
portal
Threat and Risk
Assessment
(TRA)
Personal
Identifiable
Information
(PII) strategy
proposal
Informal Digital
Identity protection
Strategy
Governance
plan for
Cloud
solutions
Document Page
Threat and Risk
Assessment
Document Page
Threat Preventive
Action
Contingency
Plan
Securing the
Personally
Identifiable
Information
Encryption using
high standards to
secure
communications
Continuity of
operations
Communicating the
crisis
Checking the
readiness of
system
Security
Compliance for
HIPAA Data
Safeguard policies
for Break-in
prevention and
physical threats
Signing of BAA
(Business Associate
Agreements)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
TRA
Threat Preventive
Action
Contingency
Plan
Security of Data Restricting
unauthorized
access and
safeguard
physically
Backup of
additional services
if required
Rogue Software for
Security
Checking of
security log with
the help of HTTP
CP Policy
development and
business impact
analysis
Cyber Terrorism Physical security
for DAS utilities
Handling of
conflicts with
standby forces.
Cyber-espionage
and Theft of
Valuable data
Preparing a
practical checklist
and standard
encryption method
Arrangement of
backup forces to
carry out
operations in the
cyberspace.
Document Page
Threats Preventive
Actions
Contingency
Plan
Ransomware Design approach
for in-depth
security and
restricting access
Carry out backup
and restore
frequently
Redirection of
DNS
Blocking,
monitoring and
controlling
malicious clients
Securing the
operations of
active directory
Wi-Fi
Vulnerabilities
Avoid Wi-Fi
accessibility of the
portal
Preparedness for
continuous
operations
Zero Day Threats Maximum Firewall
protection and
essential
application
launching only
Preparedness and
capacity
establishment
Document Page
PII Privacy Strategies
and Control
Overview
MyLicense portal PII types
Name, email ID
Complete Virtual licences
Home address and mailing address
Phone Numbers
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
PII Privacy Strategies
and Control
Automatic Collection of
Information
Mitigation Plan: Assessing the exposure
of Information, Analysis of risks and
mitigation strategies
Implementation: Collection of various
types of information for security reasons
Document Page
PII Privacy Strategies
and Control
Third Party Cloud Vendors
Mitigation Plan: Development of security
structure required for exposed data
Implementation: Assurance to users
regarding security and non-disclosure of
PII data
Document Page
PII Privacy Strategies
and Control
Tracking and Customization
Information
Cookies
Mitigation Plan: Turning the cookies off
and avoidance of nuisance
Implementation: Allows enabling and
disabling the Cookies
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
PII Privacy Strategies
and Control
Cyber Security
Mitigation Plan: Internal access control
and user training
Implementation: SSL, Firewall and
encryption implementation.
Document Page
PII Privacy Strategies
and Control
Feedback and email/ customer
queries
Mitigation Plan: Appropriate security
for email and feedback
Implementation: Encryption through
SSH
chevron_up_icon
1 out of 35
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]