Cloud Computing Security Policy - Essay Example

Comments (0) Cite this document
The service shall be implemented with security protocols both from the vendor and SNPO-MC.
The cloud vendor shall provide servers to host the companies website,…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
Cloud Computing Security Policy
Read TextPreview

Extract of sample "Cloud Computing Security Policy"

Download file to see previous pages The private network shall be hosted off the premises of SNPO-MC but will be managed by both the cloud vendor and IT staff from SNPO-MC. The shall effect cloud bursting between the public and private cloud.
Cloud computing services comprise of an infrastructure, resources and applications that SNPO-MC can access over the Internet. Large companies like Microsoft, Google, Amazon provide these resources so that they can be readily and cheaply available to people. Most of the cloud services provide support for communication, data storage, data analysis, data processing, project management, and scheduling. Cloud services will be very easy for the staff and executives of SNPO-MC to use since they are readily accessible to workstations, tablets, smartphones and laptops via the Internet. Despite the numerous advantages of the cloud, security is a primary concern especially on the public cloud where unauthorized access of organizations data can compromise the operations of an organization and bring a lot of losses.
SNPO-MC should verify before entering into an agreement with the cloud vendor that it complies with standards from Federal Information Processing (FIPS) and NIST Special Publications (SP). The standards include:
A chief IT manager shall be appointed and will be responsible for all cloud service negotiations with cloud vendors. The IT manager will overview the implementation of all security policies that involve both the general staff and the executive. The IT manager in consultancy with the company lawyer will monitor compliance with SNPO-MC cloud policies with the required government standards. No individual department or manager in SNPO-MC shall be allowed to procure cloud services for the daily operations of the organization.
Data and information stored in the cloud databases are owned by the creator of the data. In this case SNPO-MC organization. The cloud provider shall not in any case alter, ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Cloud Computing Security Policy Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Cloud Computing Security Policy Essay Example | Topics and Well Written Essays - 1250 words. Retrieved from
(Cloud Computing Security Policy Essay Example | Topics and Well Written Essays - 1250 Words)
Cloud Computing Security Policy Essay Example | Topics and Well Written Essays - 1250 Words.
“Cloud Computing Security Policy Essay Example | Topics and Well Written Essays - 1250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cloud Computing Security Policy

Cloud Computing and Security Issues

...helps the user in using the service as and when needed. The concept behind cloud computing is truly revolutionary as it allows small organizations to scale up their operations to high proportions without buying hardware and software and without hiring a fleet of IT experts. The immense potential offered by cloud computing is acknowledged across the industry, and yet, there is hesitation in its rapid adoption by many organizations (Armbrust et al, 2010). This is because the rapid growth in the technology is also accompanied by growing concerns about security related issues. Cloud computing, being an innovative method of...
51 Pages(12750 words)Dissertation

Cloud Computing

..., reliability, scalability, performance, security and maintenance of the various applications being utilized in a business. Through empowerment, the concept of cloud computing facilitates the users with the control of all the resources at their disposal. Its agility can always be improved with their user’s ability of re-provisioning technological infrastructural resources. These technologies usually provide interfaces that allow many users to communicate and share resources such as software (Miller, 2008). Another major advantage of using cloud computing is that it enables users to get accessibility to various systems by using only web browsers such as...
9 Pages(2250 words)Assignment

Cloud computing the outline below: I. Introduction: Thesis Statement: The revolutionizing and emerging concept of Cloud Computing is assessed for conceptuality and strength. II. Background.­­­­ A. Conventional Pre-Cloud computing infrastructures and architectures would be introduced. B. The way cloud computing differed from conventional networks would be explained. III. Architecture. A. Technology A. Technologically advanced devices that lay down the basis of cloud computing have been explored. B. Master Slave approach operating underneath. B. Cloud Storage C. Cloud...
4 Pages(1000 words)Thesis

Cloud Computing

..., and data of the user. The reason for the study of “cloud computing” is to have a detailed insight into the history, significance, fundamentals, components, systems, methodologies, and implementation, and more related to cloud computing. This paper achieves this purpose by first discussing the history of cloud computing, followed by the discussion of its ramifications in the technology world, development of the system and its security, and relationship between agile software development and cloud computing. The history of cloud computing Although there...
10 Pages(2500 words)Research Paper

Cloud Computing and Security

...Cloud Computing and Security In the last few years, the paradigm of cloud computing has evolved from a talented business idea to one of the rapidly developing tools of information technology all over the world. Additionally, with its talent to offer users animatedly extendable and collective business resources over the web based technology like internet cloud computing prevents from large level business expenses. In addition, cloud computing guarantees to modernize the future of business as well as corporate computing environment extensively. At the present,...
7 Pages(1750 words)Term Paper

Security Concerns in Cloud Computing

...? Full Paper Introduction Cloud computing is considered to be a value driven technology, as it saves cost along with advanced virtualization of business functions that is globally accessible. Organizations consider it a cost effective tools, as the requirement of maintaining a complex technology infrastructure along with resources is not essential. Likewise, risk factors are also been considered, as the risk, mentioned in the underpinning contract is now owned by a third party i.e. cloud computing vendors. Martin Sandler, who is a director of HP systems security Lab says, “People often think of virtualization as adding to security...
5 Pages(1250 words)Research Paper

Cloud Computing Security the cloud computing arrangement. These security issues are becoming more and more serious and causing serious damages to working and operational environment. Insecure Interfaces and APIs Cloud computing services are provided through a wide variety of user interfaces which are known as application programming interfaces (APIs). A user who wants to access and use a cloud service must interact with the cloud using an interface. Thus, the security of a cloud service heavily depends on the security of these APIs. In addition, from confirmation and access control to...
5 Pages(1250 words)Dissertation

Cloud Computing Security

...? Cloud Computing Security Cloud Computing Security Introduction The rising cost of computing resources has been a matter of concerns for many organizations whether large, medium, or small. As a result, many organizations are struggling to adopt a cost effective computing resources for their business applications. In this regard, many organizations have moved towards adoption cloud-computing concept in their business environment in a bid to reduce cost. Iyer and Henderson (2010) define cloud computing as a collection of information...
4 Pages(1000 words)Essay

Cloud based computing security

...Table of Contents: Introduction: Security Overview: Computing Resources and Cloud Computing: How Security Issues Impact upon Cloud Computing: CurrentTrends: Security Concerns: Using the Cloud Safely: Data Storage: Conclusion: Name Date Professor’s Name Course Section/# Cloud Based Computing Security Introduction: Many enterprises rely on database systems for day-to-day operations and decision making; as such, the security of data managed by these systems becomes critical. Misuse or damage of data can affect not only a...
8 Pages(2000 words)Essay

Cloud computing risks & security concerns

...provider and has minimal extensibility or control by the customer. This differs from PaaS which offers greater extensibility and customer control. The lower abstraction levels for IaaS provide customers with greater control on security than SaaS or PaaS would do. Thus, cloud computing is a complex technology with immense risks and security challenges, hence the need for adoption of effective and specific strategies to safeguard organisational interests. Cloud Computing Risks Organisations leverage on cloud computing for varied benefits. However, Yeboah-Boateng and Essandoh (2014) point out the existence...
12 Pages(3000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Cloud Computing Security Policy for FREE!

Contact Us