ScenarioColonel Ekson and other high-ranking officers have been pleased with the strides the CARS Unit has made in securing the gConnect network. Further, your IDPS labs and report deliverables have been beneficial to you and the operation.You now receive notification from Colonel Ekson via memo that you need to begin considering cloud technologies.a logo of the company CARS.MemoFrom: Colonel Calvin EksonTo: You (CARS Unit)Subject: VPN & Cloud StrategyThank you for your diligent efforts. To continue to fortify our operations, I would like us to spend some time working in cloud tech. We will focus on building your understanding of cloud reference architecture and review cloud security measures. I share the administration’s continued concerns regarding our adversaries, and I want to be sure we are strengthening our networks from all angles. As we embark on this project, I will forward resources to help firm up your understanding and mastery of these concepts.Please remain vigilant. As always, we ask anyone who detects suspicious activity to report it. I am happy to report that Commander Karen Garrett will be rejoining our team. Though she has been away, she has been briefed on the team’s progress.Be on the lookout for the resources I referenced above. Later in the project I will connect you with Sergeant Kendra O’Rourke to take you through a deep dive into virtual private networks (VPNs). Stay vigilant.Col. EksonCompetenciesYour work will be evaluated using the competencies listed below.1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.1.4: Tailor communications to the audience.2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.3.3: Discuss and analyze mathematical or statistical information, or the results of quantitative inquiry and manipulation of data.5.2: Develop appropriate cryptographic solutions for a given enterprise architecture scenario.5.5: Protect networks, hosts, and applications using intrusion detection and prevention systems (IDPS).5.8: Migrate an existing workload to a secure, scalable cloud environment.