question3.docx - Proposed Information Security Controls to...

This preview shows page 1 - 3 out of 6 pages.

Proposed Information Security Controls to mitigate the risks in the implementation ofMulti Cloud and Micro Service ArchitectureThe Department of Spatial Information have decided to incorporate to powerful techniqueswithin the business so as to build an absolute powerful framework that will be capable ofhandling multiple requests at time with increased efficiency. In short, DSI wants adopt thefunctionality of Multi cloud environment along with the effective micro service approach. Bylooking at the potential benefits of these two services, it can be said that the business ownershave made a sensible idea through which they will be able to develop a system that willovercome all the issues that were faced by the business earlier. Although, it serves numerousadvantages to its clients, yet there is certain limitation of using this approach in the systemwhich may hamper the overall performance of the OSDS framework. As there are severalissues associated with the working of micro service architecture within he business. Further,with the multi cloud environment, there will be multiple cloud vendors who can have accessto the DSI’s highly sensitive spatial information which might gave rise to a problem whereany services provider could use this information in inappropriate manner. In short, he multicloud environment also imposes certain risk to the DSI organization. Therefore, it is the dutyof the owners of the DSI organization to make sure that necessary solutions or measures havebeen provided using which these issues could be mitigated easily without involving muchtime and cost. The below area discusses about various techniques using which DSIorganization can secure their data even after adopting these two powerful yet highlyvulnerable approaches within the business. Also, the business owners of the DSI organizationneed to make sure that all these security control are being followed by the employees andother staff members through which they can secure their confidential data from unnecessaryattacks or cyber-crimes. These security controls are elaborated as follows:
Encryption in Hybrid Cloud Environment:Encryption is one of the most powerfultechnique for providing security to the system as it makes use of private keys whichare used to decrypt the code i.e. cipher text into normal text which makes it in human

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 6 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
One
Professor
N/A

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture