Description
Students have learned about various threats that exist in the data and the cloud infrastructure. The need for assessing these risks is high. However, as consumers of cloud services, people do not have control over the cloud provider’s infrastructure.
– How could the chosen company perform a risk assessment to identify gaps in cloud security?
– Can this be done, or does this need to be conducted strictly from a standpoint of how users interact with the cloud?
– What policies can be established to help ensure security of the data to and from the cloud and who is responsible for enforcing these policies?