Solved by verified expert:This assignment is two tasks of a general project and should be about two to three pages. Please review the attached scenario of the project and also the step one and two descriptions. Step 1: Initiating the Project and Defining Its ScopeAs the cloud security architect, you will need to understand the security development lifecycle process. To learn about this, review the following resources:security development life cyclesoftware development methodologiesClick the following links to learn more about critical infrastructure sectors: Critical Infrastructure Sectors. Read their descriptions and consider which sector you support in your role. Process Control Systems: Cybersecurity and Defense To be completed by a designated team member:In your report, you will tailor your life cycle using security development lifecycle elements as well as from the software development life cycle elements, which would use software development methodologies. Provide the concepts of the project. Describe your rationalizations for your tailoring. Define the products needed. Describe the mission of the client organization and the business need to move to a community cloud. This can be fictional or modeled from a real-world example with citations in APA format. Identify the scope of the security architecture and include a topology of the architecture of the cloud environment. The information can be fictional or modeled from a real-world example with citations in APA format. Identify in the topology which security features are needed for each of the components. Examples of topology include Amazon Web services, Generic Hadoop, Map-r, Cloudera, or MS Azure. Look at the functional architecture of a cloud-based system and the security architecture. Identify which parts of the functional architecture are within the scope of the security architecture for the overall systems of systems in the cloud. Identify which security features are needed to protect each component, as data is in transit and data is at rest within the architecture. Include in your descriptions possible software and hardware components as well as an operating system and the security protections needed for those components. Narrow the scope of the security architecture relevant to the project you are assigned and to achieve security for data in transit. State the security objective of this project. When you are considering the software development life cycle approach, consider what model you are following. Some examples are waterfall, spiral, agile, and extreme programming. Other questions to consider in the project initiation discussion: What tools are there? Why should you use them? What are the system issues and other concerns? What is interoperability?Possible technologies to consider include: Data in transitHow protectedData integrity In the project initiation portion of the final report, you will also report on the risk information you have gathered and evaluated and introduce a risk management strategy. Think like an attacker, and describe what are threats and probability of likelihood of those threats being exploited. Think about data in use in the memory of the processing resources. Where in the system is the data most likely plaintext and unprotected? Provide your reasoning and cite sources you used to arrive at your conclusions. Click the link to review the resources on threat modeling, and then include, in your own words, a definition of threat modeling and explain how it is used in determining risk.After defining the project and scope, move to the next step, where the team, as part of your functional analysis and design, will use the SQUARE method for requirements information gathering.Step 2: Begin Functional Analysis and Design—Use SQUARE for Requirements Information GatheringNow that the team has initiated the project, they will now focus on the functional design of the project. To be completed by a designated team member:Click the following link to learn more about software quality requirements engineering (SQUARE). Then, identify the SQUARE process and provide an overview of how to collect requirements for the security technology and/or techniques that are being proposed.This information will be added to the group report.In the next step, the team will learn how to secure data in the cloud.
project_4_transcript.pdf
Unformatted Attachment Preview
CST620_Project 4: Software Development Life Cycle
for Data in the Cloud Computing Environment
[MUSIC PLAYING]
Each team member is a security software architect in a cloud service provider company, assigned
to a project to provide the client with data integrity and confidentiality protections for data in
transit that will be using applications in the cloud. Your client is an HR company that is moving
HR applications and HR data into a community cloud, sharing tenancy with other clients. Your
company has set up a software as a service, SAS, offering for its client base.
The data that the HR company will be pushing to and from the cloud will contain sensitive
employee information, such as personally identifiable information, PII. You will have to address
sensitive data and transit issues of the client data using the HR applications stored in the cloud,
and provide a lifecycle management report that includes solutions to the cloud computing
architect of your company.
The team will decide on a team leader, who may divide sections to complete by small groups of
team members. You decide to make an outline of the report, and to use the phases of the software
development lifecycle, SDLC, as a basis for the report. The outline includes the following:
examine the cloud computing environment and determine the protection techniques and how
they will be applied to components within the cloud to ensure end-to-end protection of data in
transit. Consider what security techniques and methods are applicable, and tailor the software
development lifecycle methodology for the cloud computing environment.
Select the best methods and techniques for protecting confidentiality and integrity of data in
transit, and apply principles to the whole study approach. These are the software development
life cycle phases to use as the report outline: initiating projects/defining scope, functional design,
analysis and planning, system design specifications, software development,
installation/implementation, tailoring, operation and maintenance, and disposal. Work in
partnership teams to create the report.
[MUSIC PLAYING]
…
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more