Nt1310 Unit 7 Assignment 1

Words: 709
Pages: 3

Unit 7 Journal Submission One of the most intriguing aspects of cyber threats to cloud computing that I encountered in Unit 7 was the complexity of network security and compliance. Complexity arises because cloud environments are inherently multi-tenant and scalable, which means that security measures must be robust enough to handle diverse and evolving threats (Ots, 2021). I found this interesting because the challenge of securing dynamic and scalable environments is substantial. Unlike traditional on-premises networks, cloud environments need security measures that adapt in real-time to changes in workload and traffic patterns. My impression is that network security in the cloud is a critical field that necessitates continuous innovation. …show more content…
Follow emerging threats and vulnerabilities specific to cloud networks. Identity management is another critical aspect of cloud security because effectively managing access controls ensures that only authorized users can access sensitive data and resources (Yeluri & Leon, 2014). Actions like implementing strong authentication mechanisms such as multi-factor authentication and managing permissions and roles dynamically are necessary. I found the focus on identity management particularly compelling because it highlights the shift from perimeter-based security to identity-based security. Technologies such as single sign-on (SSO) and identity federation are evolving rapidly, providing more seamless and secure ways to manage user identities across multiple cloud services. Advancements are crucial for enhancing user experience while maintaining high security standards. To delve deeper into identity management in cloud security, my plans include: a)Understanding the latest developments in identity and access management (IAM) technologies. b)Learning about the implementation of SSO and its security implications. c)Exploring the role of biometric authentication in cloud environments. d)Investigating best practices for managing privileged access in the