Facebook Pixel Code
x
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Cloud Computing Security Policy Essay Example

Show related essays

Cloud Computing Security Policy

This is a preview of the 5-page document
Read full text

The policy must also be endorsed by the management and executives. The cloud computing security policy should also identify information security roles and responsibilities that must also be evaluated and reviewed in line with the changes of information and business risks. Data integration is a vital requirement in the policy that must be included since it helps circumvent any associated protective security measure and explain the consequences for breaching of the policy. The cloud computing security policy should also be communicated on an ongoing basis and should be accessible to all organization employees.For third party access organizations should establish a framework that will provide coordination and direction for the management of the security policy. The organizations are to ensure that necessary requirements for cloud computing security are documented when the organizations are entering into outsourcing contracts or making arrangements with consultants and contractors. The cloud computing security policy mandates organizations to ensure that they have appropriate permissions from the third parties before they can access any information belonging to the third parties.SNPO-MC is subscribers to the cloud computing security services, and they should, therefore, ensure that they have a department or individuals within SNPO-MC to handle cloud computing security issues with the providers.SNPO-MC’s cloud computing security providers should monitor and manage the laws and regulations of cloud computing security. The managers and executives’ role at SNPO-MC is to discuss with the providers on the security measures being undertaken to ensure that cloud computing information is secure.SNPO-MC and authorized third parties are the only rightful owners of cloud computing information, and they should be the only individuals permitted to access the content. Although these two parties can claim ownership of the content, it is important that the cloud computing security policy permits only a few individuals to access the original content in the cloud space and then divide it with employees of the organization (Krutz & Vines, 2010).SNPO-MC should solely operate its cloud infrastructure. The management of the cloud infrastructure can be undertaken by the third parties or the management itself. The cloud infrastructure can also exist on or

This is a preview of the 5-page document
Open full text

References

Krutz, R. L., & Vines, R. D. (2010). Cloud Security: A comprehensive guide to secure cloud computing. John Wiley & Sons.

Grance, T., Stevens, M., & Myers, M. (2008). Guide to selecting information technology security products. Network Security.

Takai, T. M. (2012). Cloud computing strategy. Department of Defense Washington dc chief information officer.

Santos, N., Gummadi, K. P., & Rodrigues, R. (2009, June). Towards trusted cloud computing. In Proceedings of the 2009 conference on Hot topics in cloud computing (pp. 3-3).

Close ✕
Tracy Smith Editor&Proofreader
Expert in: Information Technology, Military, Engineering and Construction
Hire an Editor
Matt Hamilton Writer
Expert in: Information Technology, Agriculture, Technology
Hire a Writer
preview essay on Cloud Computing Security Policy
WE CAN HELP TO FIND AN ESSAYDidn't find an essay?

Please type your essay title, choose your document type, enter your email and we send you essay samples

Contact Us