Question

In: Computer Science

Develop a process to assess the security posture of the service provider. What security requirements should...

Develop a process to assess the security posture of the service provider.

  1. What security requirements should your organization have?
  2. Define security requirements in a cloud-based environment that should be part of your standard.

Solutions

Expert Solution

  1. This shared security responsibility model can reduce your operational burden in many ways, and in some cases may even improve your default security posture without additional action on your part.

2. The organization's security requirements are: the first requirement is to develop security measures and determination of the most appropriate method to use security control performance.

To measure agencies' data potential program level or system level performance including system security risk assessment report.

Selected information security measures may address the security performance of specific security controls, groups of related or interdependent controls, an information system, or security function, service, or program spanning multiple systems.

The set of measures with potential applicability security performance drivers and objectives is typically large and diverse. To overcome the challenges comprehensive measurement would present, agencies need to prioritize performance objectives and implemented measures to ensure that selected measures provide appropriate coverage for security controls and information systems categorized at higher risk levels.

3.Cloud security standards and their support by prospective cloud service providers and within the enterprise should be a critical area of focus for cloud service customers. The benefits of supporting key security standards are

• Standards promote interoperability, eliminating vendor lock-in and making it simpler to transition from one cloud service provider to another.

• Standards facilitate hybrid cloud computing by making it easier to integrate on-premises security technologies with those of cloud service providers.

• Standards provide a level of assurance that critical best practices are being followed both internally within an enterprise and by cloud service providers – certifications are available for several security standards.

• Standards support provides an effective means by which cloud service customers can compare and contrast cloud service providers.

• Standards support enables an easier path to regulatory compliance.

These types of security standards specifically define APIs, data structures and communication protocols that must be implemented to claim support for the standard. There can be test suites associated with these standards that enable implementers to demonstrate compliance to the standard and there can also be mechanisms to demonstrate interoperability between different implementations. In many cases, such standards allow for extensibility, permitting implementers to include functions that go beyond those defined in the standard.

From a security perspective, it is important that once the customer has completed the exit process, "reversibility" or "the right to be forgotten" is achieved – that is, none of the customer's data should remain with the provider. The provider must ensure that any copies of the data are wiped clean from the provider's environment, wherever they may have been stored.


Related Solutions

Develop, assess, and document security policies, practices, and procedures?
A-2 Develop, assess, and document security policies, practices, and procedures?C-1 Identify and assess current and anticipated security risks and vulnerabilities?C-2 Evaluate current and emerging tools and technologies?
OA company recently hired a payroll service provider to process its payroll-that service provider has essentially...
OA company recently hired a payroll service provider to process its payroll-that service provider has essentially taken over the payroll function, and payroll represents OA's largest expense. Comment on the following statement: OA's auditors should make certain that the payroll service provider's most recent financial statements are audited, and that the related audit report includes no indication of a weakness in internal control related to processing its own payroll.
What is an organizational profile? What should the process be to develop the profile? What information...
What is an organizational profile? What should the process be to develop the profile? What information will you include, and where will you get your information? How will you utilize the information?
What two ways can management change corporate culture to improve the security posture of a company?...
What two ways can management change corporate culture to improve the security posture of a company? Why do you believe these changes will make a difference in the corporate culture?
What is a network security assessment? The process of judging a security solution The process of...
What is a network security assessment? The process of judging a security solution The process of testing a security solution The process of evaluating a deployed security solution All of these are correct
What principles should the information security analyst apply in order to develop appropriate acceptable use policies...
What principles should the information security analyst apply in order to develop appropriate acceptable use policies for the client? Make sure to address confidentiality, integrity, and availability of information. Answer the following please; What should users generally be allowed to do with their computing and network resources? When and why would each example be allowable? What should users generally be prohibited from doing with their computing and network resources? When and why would each example require prohibition? When and why...
What principles should the information security analyst apply in order to develop appropriate acceptable use policies...
What principles should the information security analyst apply in order to develop appropriate acceptable use policies for the client? Make sure you address confidentiality, integrity, and availability of information, as well as each of the following questions: 1-What should users generally be allowed to do with their computing and network resources? When and why would each example be allowable? 2-What should users generally be prohibited from doing with their computing and network resources? When and why would each example require...
So should information security team first assess the corporate culture prior to attempting to implement an...
So should information security team first assess the corporate culture prior to attempting to implement an insider threat program
Who is covered by Social Security? Describe the eligibility requirements? How is Social Security financed? What...
Who is covered by Social Security? Describe the eligibility requirements? How is Social Security financed? What is Primary Insurance Amount and Family Maximum Benefit?
Create a guideline document which should address the Physical Security requirements of the IT Infrastructure and IT Assets for the organization.
1) Create a guideline document which should address the Physical Security requirements of the IT Infrastructure and IT Assets for the organization. 2) Address the data security requirements for your branch offices in other cities.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT