Explain control domain and how it maps to your chosen scope

Assignment Help Computer Networking
Reference no: EM131909395

Discussion

This discussion focuses on mapping cloud security controls to existing frameworks or regulations.

You will need to create 1 new thread AND post AT LEAST 2 comments on other students' threads. Here's how to get started:

Download the Cloud Security Alliance (CSA) Cloud Controls Matrix spreadsheet. (A quick Internet search should give you the address of the most current version for download.) Under the "Scope Applicability" heading, select a category that is applicable to the organization for which you work. For example, if your organization handle personal medical data and uses the COBIT framework, you could choose either COBIT or HIPAA/HITECH. Once you select a category, choose row from "Control Domain" (that no other student has already selected!) Then, create a new thread in this week's discussion with the title from column B (i.e. CCM V3.0 Control ID.) Explain the control domain, how it maps to your chosen scope, and specifically what your organization does to implement the stated control.

If you don't know which scope applies to your organization, just use the University of the Cumberlands (UC) as your organization. As a university, we are under the domain of FERPA, So, is you choose UC, you would need to choose a Control Domain and explain how it maps to FERPA, and how UC implements the controls.

So, here's an example. Let's suppose I work for a large on-line retailer. We handle payment cards and are therefore under PCI DSS requirements. I'll select BCR-03 control ID (Business Continuity Planning.) So I would create a new thread in this week's discussion with the title "BCR-03." Then I'd explain what BCR-03 is, what it maps to in PCI DSS (4.1, 4.1.1, 9.1, 9.2), and then I'd explain what my organization does to comply with this control requirement.

Once you create your new thread, you need to find AT LEAST 2 other threads from other students and comment on their threads. Make sure your comments are more than "I agree", or "Good post."

Reference no: EM131909395

Questions Cloud

What turns people into terrorists : What turns people into terrorists? That question might sound simple, but it's at the heart of the struggle to prevent terrorist attacks.
Consider a regression that uses the square of the residuals : Consider a regression that uses the square of the residuals from the first regression above as the dependent variable and has a constant term
Think about your future role in public policy : Think about your future role in public policy and the ways in which you might effect positive social change.
Think about a policy change you might propose : Think about which public policy area needs to be addressed or which public policy you feel is most important to change, and then propose a policy change.
Explain control domain and how it maps to your chosen scope : Explain the control domain, how it maps to your chosen scope, and specifically what your organization does to implement the stated control.
When does diversity not matter when working with clients : Explain the process for clients who refuse to pay for services after therapy. When does diversity not matter when working with clients?
Electronics produce the new satellite radio receiver : What is the payback period of the project? What is the profitability index of the project? Should ABC Electronics produce the new satellite radio receiver?
Calculate the Genworth NDI for the borrowers : Using the Excel or Online version of the Genworth Serviceability Calculator, calculate the Genworth NDI for the borrowers
Financial break-even points for wettway sailboat : Use the above expression to find cash, accounting and financial break-even points for Wettway Sailboat.

Reviews

Write a Review

Computer Networking Questions & Answers

  Define an extended network prefix

Define an extended network prefix that allows the creation of 44 Hosts on each subnet. List the network prefix and the equivalent Subnet Mask. What is the maximum number of valid Hosts that can be assigned to each subnet AND the maximum number of sub..

  Discuss as a team the pros and cons to using a wan

Discuss as a team the pros and cons to using a WAN over the Internet or VPN-based WAN. Based on your discussions outcome, decide as a group if a VPN-based WAN is a good solution to connect the two organizations (Telex and Virex).

  What might you suggest that the technology department use

What might you suggest that the technology department use instead to support the six internal divisions?

  Design the network with best practices

Design the network with best practices. Please provide a diagram and be sure to include the devices and type of network circuits you would use, and explain why

  Write down 400-600 words which respond to the given

write 400-600 words that respond to the following questions with your thoughts ideas and comments. use the library and

  The drive roller for a conveyor belt link a-b is rotating

the drive roller for a conveyor belt. a link a-b is rotating at 80 rpm counterclockwise .b link a-b is 60mm long link

  The project is sub divided in to five milestones which will

knowing that you are taking a course on digital commerce and e-business you have been approached by your organizations

  Discuss the role of each of the server types on a lan

Discuss the role of each of the following server types on a LAN and the type of software licensing with which the software should be purchased:

  Question 1aregister the owasp top 10 web application

question 1aregister the owasp top 10 web application security risks for 2010.bwhy does software have to be intensively

  Designing an enhanced lan network to a virtual hospital

Review of background reading, which draws on appropriate sources, approach to be taken in attempting to solve the problem and choices should be justified

  Create a diagram that illustrates communication structure

Create a diagram that illustrates the communication structure of your chosen technology in Visio or its open source alternative software.

  Capstone project on contactless biometrics

Write a well researched academic Capstone Project Report between 3500 and 5000 words on the chosen capstone experience and its application in your chosen organisation

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd