An effective cloud computing security policy will outline what consumers and providers should do
THE COMPANY TO USE: The Goodwill of North Georgia
An effective cloud computing security policy will outline what consumers and providers should do. A successful policy will save providers a significant amount of time by reducing management and administrative issues.
Continuing to build onto your Key Assignment from the previous weeks, add a new section that includes your responses to the following:
Write an additional 3–5 pages, adding another section to the Key Assignment, that addresses gaps in cloud security.
As part of this, include a 1-page sample policy that you would propose being implemented at your chosen company. Also, include recommendations for performing a risk assessment that could help identify the security gaps in cloud computing
Although there is plenty of technology to facilitate business integration, Information Technology experts continue to experience difficulties with protection of data end-to-end particularly while ensuring visibility, audit trails and proper access control. They continue to battle cloud data-security gaps which are mainly………………………………