How Will My Work Be Evaluated?

Words: 486
Pages: 2
Subject: Uncategorized

**PLEASE USE ATTACHED TEMPLATE**

Instructions

Support your plan with rationale for why you have made the choices that you have. To make this project easier, you can speak in generalities (cloud agnostic) or select a real CSP such as AWS or Azure to complete this plan.

Guidelines

It is recommended to use the Cloud Security Project 2 Template. In the template, you will see specific instructions. Delete the instruction text before you submit the project.

Your report should include:

-Executive Summary
-Introduction to the purpose of the plan, statement of need, and assumptions.
-Recommendation of Cloud Service Model to use.
-Recommendation of which services should be cloud native versus hybrid (if any).
-Recommendation of which security services should BCO leverage from the CSP.
-Recommendation for performing Incident Response.
-Recommendation for Disaster Recovery Planning and high uptime.
-Discussion of the cost estimate for the recommendations.
-Discussion on resource plan and hiring a Managed Service Provider (MSP) versus hiring additional staff.
-Discussion on the timeline for implementation of the recommendations.
-Conclusion
-Be between five to ten pages (plus cover page, and table of content)

How Will My Work Be Evaluated?

As a cloud security architect tasked with developing a proof of concept for the companies cloud adoption, you will prepare an plan to be submitted to the company owner. By developing a well-structured report of your results and recommendations to management, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express recommendations to decision makers with the right mix of technical detail in an accepted format is an important workplace and career skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

1.1.1: Articulate the main idea and purpose of a communication.
1.1.3: Present ideas in a clear, logical order appropriate to the task.
1.2.1: Identify the target audience, the context, and the goal of the communication.
1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.
1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.
1.4.1: Produce grammatically correct material in standard academic English that supports the communication.
2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.
2.3.1: State conclusions or solutions clearly and precisely.
10.1.1: Identify the problem to be solved.
10.1.2: Gather project requirements to meet stakeholder needs.
12.7.1: Explain the process for acquiring evidence of IT incidents.
12.7.2: Explain the process of analyzing IT incidents.
13.1.1: Create documentation appropriate to the stakeholder.

Let Us write for you! We offer custom paper writing services Order Now.

REVIEWS


Criminology Order #: 564575

“ This is exactly what I needed . Thank you so much.”

Joanna David.


Communications and Media Order #: 564566
"Great job, completed quicker than expected. Thank you very much!"

Peggy Smith.

Art Order #: 563708
Thanks a million to the great team.

Harrison James.


"Very efficient definitely recommend this site for help getting your assignments to help"

Hannah Seven