INTRODUCTION
Throughout your career in cloud security administration and engineering, you will be asked to develop and improve cloud resources to support a company’s security posture. You will need to configure the security settings for a cloud service model to be in alignment with an organization’s business requirements.
In this task, you will be given a scenario that includes business requirements from a company’s IT department. Using the provided lab environment, you will update the cloud security configurations of the company. You will submit a report to executives outlining your security plan and the updated configurations. You will need to read the attached “Company Overview and Requirements” prior to starting your work.
Please note that the live lab environment has a 4-hour time limit. At the end of the 4-hour time limit, 15-minute extensions will be offered (up to an additional 2 hours). See the “D485 Skillable Lab FAQ” attachment for more information.
SCENARIO
As organizations embrace cloud computing, cybersecurity practices continue to evolve. A robust cloud security posture protects assets from bad actors and helps organizations realize the benefits of cloud computing. In this task, you will assume the role of cloud security engineer for SWBTL LLC. You have been hired following the departure of a disgruntled employee who left behind no documentation and created cybersecurity concerns.
You will analyze the current environment, using the lab environment web link and the “Company Overview and Requirements” attachment, making recommendations and implementing configuration changes in alignment with regulatory and business requirements. The analysis should also include shared responsibilities, risks, threats, and countermeasures. The chief information officer has requested a walk-through of the environment with demonstrations of security misalignments, updated configurations, and how the updates meet compliance requirements.
In your lab instance, you will be provided accounts on the right-hand side that correspond to the specific job roles. Use only those accounts to complete your task. You may see other accounts or groups in the lab, but those should not be used.
REQUIREMENTS
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The similarity report that is provided when you submit your task can be used as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).
A. Provide an executive summary of the company’s current security environment based on the business requirements given in the “Company Overview and Requirements” document.
B. Describe a proposed course of action for a secure Azure cloud solution for the company, based on the given scenario, and include the following in your description:
• identification of the service model
• applicable regulatory compliance directives
• security benefits and challenges of transitioning to this service model
C. Analyze the current state of role-based access controls in the cloud lab environment for the marketing, accounting, and IT resource groups.
1. Discuss three recommendations for role-based access controls that can be configured in alignment with the principle of least privilege based on the business requirements in the given scenario.
2. Configure the role-based access controls in alignment with your given recommendations in part C1 and provide a screenshot for each of the updated configurations. The screenshots must be clear and show the full view of your screen, including the date and time.
D. Analyze the existing Azure Key Vaults in the cloud lab environment focusing on encrypting data in transit and data at rest for the marketing, accounting, and IT resource groups.
1. Implement two best practices for Azure Key Vaults applicable to the resource groups listed and in alignment with the given scenario, providing screenshots of your updated access policies for each group. The screenshots must be clear and show the full view of your screen, including the date and time.
2. Explain two recommendations for how the key vaults can be used to encrypt both data at rest and data in transit.
E. Analyze the current state of file backups in the cloud lab environment for the company.
1. Configure two settings for file backups that are in alignment with the given scenario, providing screenshots of your updated configurations. The screenshots must be clear and show the full view of your screen, including the date and time.
2. Explain how the updated configurations from part E1 support the business requirements.
F. Describe the division of security responsibilities between the company and the cloud service provider (Azure), including shared responsibilities if any, for the cloud service model you selected in part B.
1. Discuss three risks assumed by the company for the cloud service model based on the shared responsibilities identified in part F, and include in your discussion the level of impact each risk may have on the company’s use of cloud computing resources.
2. Explain three recommendations to ensure compliance with the company’s cloud security posture, and include a justification based on industry best practices for each recommendation.
G. Explain three threats that have the potential to impact the company’s updated cloud solution, and include in the explanation the threat mitigation countermeasures that could be used to minimize the impact of each threat.
H. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
I. Demonstrate professional communication in the content and presentation of your submission.
INTRODUCTION Throughout your career in cloud security administration and enginee
Struggling With a Similar Paper? Get Reliable Help Now.
Delivered on time. Plagiarism-free. Good Grades.
What is this?
It’s a homework service designed by a team of 23 writers based in Carlsbad, CA with one specific goal – to help students just like you complete their assignments on time and get good grades!
Why do you do it?
Because getting a degree is hard these days! With many students being forced to juggle between demanding careers, family life and a rigorous academic schedule. Having a helping hand from time to time goes a long way in making sure you get to the finish line with your sanity intact!
How does it work?
You have an assignment you need help with. Instead of struggling on this alone, you give us your assignment instructions, we select a team of 2 writers to work on your paper, after it’s done we send it to you via email.
What kind of writer will work on my paper?
Our support team will assign your paper to a team of 2 writers with a background in your degree – For example, if you have a nursing paper we will select a team with a nursing background. The main writer will handle the research and writing part while the second writer will proof the paper for grammar, formatting & referencing mistakes if any.
Our team is comprised of native English speakers working exclusively from the United States.
Will the paper be original?
Yes! It will be just as if you wrote the paper yourself! Completely original, written from your scratch following your specific instructions.
Is it free?
No, it’s a paid service. You pay for someone to work on your assignment for you.
Is it legit? Can I trust you?
Completely legit, backed by an iron-clad money back guarantee. We’ve been doing this since 2007 – helping students like you get through college.
Will you deliver it on time?
Absolutely! We understand you have a really tight deadline and you need this delivered a few hours before your deadline so you can look at it before turning it in.
Can you get me a good grade? It’s my final project and I need a good grade.
Yes! We only pick projects where we are sure we’ll deliver good grades.
What do you need to get started on my paper?
* The full assignment instructions as they appear on your school account.
* If a Grading Rubric is present, make sure to attach it.
* Include any special announcements or emails you might have gotten from your Professor pertaining to this assignment.
* Any templates or additional files required to complete the assignment.
How do I place an order?
You can do so through our custom order page here or you can talk to our live chat team and they’ll guide you on how to do this.
How will I receive my paper?
We will send it to your email. Please make sure to provide us with your best email – we’ll be using this to communicate to you throughout the whole process.
Getting Your Paper Today is as Simple as ABC
No more missed deadlines! No more late points deductions!
You give us your assignments instructions via email or through our order page.
Our support team selects a qualified writing team of 2 writers for you.
In under 5 minutes after you place your order, research & writing begins.
Complete paper is delivered to your email before your deadline is up.
Want A Good Grade?
Get a professional writer who has worked on a similar assignment to do this paper for you