Question

In: Computer Science

Describe in 500 words the shared security responsibility model that a dba must be aware of...

Describe in 500 words the shared security responsibility model that a dba must be aware of when moving to the cloud.

Note-Check in chegg writing before you submit it should be 100% unique and don't submit the existing chegg answers,and submit in text format Provide References

Solutions

Expert Solution

Businesses are moving their data to the cloud. Some claim that one of the main reasons for moving data to the cloud is because it is more secure. At the same time, a top reason for not moving data to the cloud is due to concerns about security.

Most IT professionals accept that many features of cloud security are better than on-premises approaches, but this is not the full picture. Security is perhaps the most important facet of an enterprise cloud provider as one incident could lead to a catastrophic loss of business. Therefore, they spend a lot of time and money protecting their own infrastructure, including data centers, server hardware, and internet connectivity.

In the public cloud, there is a shared responsibility between the Cloud Service Provider and the user. Clear owners are needed for things like data classification, network controls, and physical security needs clear owners. The division of these responsibilities is known as the shared responsibility model for cloud security. You share the responsibility for the security of your deployment with your cloud service provider.

In this, CSPs are responsible for the security of the cloud and customers are responsible for securing the data they put in the cloud. It dictates the security obligations of cloud computing.

Depending on the type of deployment customer responsibilities will be determined.

1. IaaS: IaaS services also place more security responsibilities on customers.

2. PaaS: In PaaS, more of the heavy lifting is passed over to CSPs. While customers focus on deploying and managing applications

3. SaaS: In this, the service provider will manage and maintain the piece of software—customers just need to decide how they want to use it.

Cloud security failures will be caused by missteps on the part of customers. That's why it's more important than ever before to clear up confusion around the cloud shared responsibility model and set customers up for success.

Whether you're operating on-prem or in the cloud, one thing remains constant: your systems operate software and hardware under different assumed security responsibilities than what’s actually expected of you. This is one of many reasons why you should review all of your system's configurations and implement secure recommendations, such as the CIS Benchmarks.

As enterprises look for greater operational efficiency to secure a competitive advantage, they turn to cloud service providers like Amazon Web Services to manage their IT infrastructure.

This move can be perceived as risky – the value-add of AWS is that users give up some control over the underlying infrastructure. But cloud services providers such as AWS continue to invest significantly in the security of their services, to make cloud services more secure than on-premises infrastructure.

UPVOTE PLS IF YOU FIND THIS HELPFUL...


Related Solutions

Describe in 500 words what a dba must be aware of to maintain good regulatory compliance...
Describe in 500 words what a dba must be aware of to maintain good regulatory compliance when moving to the cloud.
Discuss security in the cloud using the shared responsibility model and identity and access management (IAM)....
Discuss security in the cloud using the shared responsibility model and identity and access management (IAM). Discuss the networking services that can be used to build a VPC for the company.
No Plagiarism and must be in your own words (300 Words) Subject: Physical Security Describe and...
No Plagiarism and must be in your own words (300 Words) Subject: Physical Security Describe and explain some of the hardening methods of entry control.
1.Describe Amway’s business model. (500 Words) 2. SWOT analysis for Amway (500 words) 3. Develop and...
1.Describe Amway’s business model. (500 Words) 2. SWOT analysis for Amway (500 words) 3. Develop and competitive strength assessment and discuss the strategic implications (500 words)
Must be 500+ words Describe in detail 2 experiments you have or would like to complete...
Must be 500+ words Describe in detail 2 experiments you have or would like to complete to make progress on your leadership challenge (describe Who, what, where, when, why, what was the outcome). 1. Indicate how you think it went, what you learned from it. Indicate which competency it might support. For example, "giving the work back" is a sub-competency. Another sub-competency is “meeting people where they are at.” What do you know about a stakeholder’s values, concerns, and priorities...
( all answers combined must be in 500 words or less ) It is said that...
( all answers combined must be in 500 words or less ) It is said that economic crises (such as the economic recession) can be expected through the performance of financial markets in the period prior to them. 1A-) What is meant by that? 2A-) What is your personal opinion? 3A-) Using the graph, explain what is meant by the Yield Curve and the forms it takes? 4A-) By checking at it, do you think that this curve can be...
No Plagiarism and must be in your own words (300 Words) Subject: Physical Security What are...
No Plagiarism and must be in your own words (300 Words) Subject: Physical Security What are protective barriers, and what should they entail?
Describe the embryological development of the lungs. 500 words.
Describe the embryological development of the lungs. 500 words.
describe the achievement of Jefferson presidency in 500 words
describe the achievement of Jefferson presidency in 500 words
No Plagiarism and must be in your own words (300 Words) Subject: Physical Security .What mitigation...
No Plagiarism and must be in your own words (300 Words) Subject: Physical Security .What mitigation procedures can be used to ensure the resiliency of protective barriers?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT