Imagine you work for an IT department that has weekly IT roundtables. This week you will lead one of the conversations about cloud security. The following types of security that can be included in the...

1 answer below »

Imagine you work for an IT department that has weekly IT roundtables. This week you will lead one of the conversations about cloud security.


The following types of security that can be included in the cloud:



  • Least privilege

  • Separation of duty


Respond to the following in a minimum of 250 words:


Explain
the following about your two security types:



  • A short summary about what you found to be the usage of the security type in business

  • Circumstances in which the security type would be appropriate

  • Circumstances that would indicate the security type would not be appropriate

  • High-level steps to implement the security type

Answered Same DayOct 27, 2021

Answer To: Imagine you work for an IT department that has weekly IT roundtables. This week you will lead one of...

Shubham answered on Oct 28 2021
128 Votes
Least Privilege
Short Summary
    This provides the concept of security that can help in limiting user access rights. This ensures u
sers are provided with permission for execution, reading and writing only resources and files that are required for doing the job (Venugopal, Alves-Foss & Ravindrababu, 2019). It elevates the level for accessing the network and data. The control user access is required for implementation with the approach for permitting user access.
Appropriate circumstances for security type
    It includes conducting privilege audits by reviewing the existing program, accounts and process for ensuring that there are no privileges. It includes implementation of separation of privileges by distinguishing between lower level privileges and higher-level privileges accounts. This required assigning privileges for access to complete necessary tasks.
Inappropriate circumstances for the security type
    It is not appropriate for allowing credentials for retrieving the password safely. The least privileges security control can be applied with all remote access. This does not incorporate real-time vulnerability and threat data for users for making dynamic risks.
High-level steps for implementation
    The principal states that all users can log in into the user account with absolute...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here