Due Week 4 and worth 125 points Imagine you are an Information Security Manager in a medium-sized organization. Your CIO has asked you to prepare a case analysis report and presentation on establishing internal controls in cloud computing. The CIO has seen several resources online which discuss the security risks related to Cloud based computing and storage. One that stood out was located at . You are being asked to summarize the information you can find on the Internet and other sources that are available.  Moving forward, the CIO wants to have a firm grasp of the benefits and risks associated with public, private, and hybrid cloud usage. There is also concern over how these systems, if they were in place, should be monitored to ensure not only proper usage, but also that none of these systems or their data have been compromised. Write a three to four (3-4) page paper in which you: Purchase the answer to view it Purchase the answer to view it

Establishing Internal Controls in Cloud Computing


Cloud computing has become an integral part of many business operations, allowing organizations to benefit from flexible and scalable technology solutions. However, as with any new technology, there are risks associated with cloud computing that organizations need to consider. This paper aims to provide a comprehensive analysis of the benefits and risks associated with public, private, and hybrid cloud usage, as well as propose strategies for monitoring these systems and ensuring data security.

Benefits of Cloud Computing

Cloud computing offers numerous benefits to organizations, including cost savings, scalability, and increased accessibility. By leveraging cloud services, organizations can eliminate the need for extensive hardware infrastructure and technical support, resulting in significant cost reductions. Additionally, the cloud allows for easy scalability, enabling businesses to quickly and efficiently adjust their computing resources based on demand. Furthermore, cloud-based solutions provide remote access to data and applications, enhancing collaboration and accessibility for geographically dispersed teams.

Risks of Cloud Computing

Despite its benefits, cloud computing also presents several inherent risks that organizations must address. One of the primary concerns is the security of data stored in the cloud. With sensitive information being hosted on external servers, there is a risk of unauthorized access and data breaches. The multi-tenant nature of public clouds poses additional security challenges, as organizations have little control over the security measures implemented by the cloud service provider (CSP).

Another risk associated with cloud computing is the potential for service disruptions or outages. Organizations relying on cloud services for critical business operations may face significant downtime if the cloud provider experiences technical issues. The loss of internet connectivity can also disrupt access to cloud resources, further impacting business continuity.

Monitoring and Ensuring Data Security

To address the security concerns associated with cloud computing, organizations must implement robust internal controls. One key aspect of internal controls is the establishment of strong access controls. Organizations should implement multi-factor authentication, enforce strong password policies, and regularly review user access privileges to ensure that only authorized individuals can access cloud resources.

Furthermore, organizations should closely monitor cloud resources to detect and respond to any signs of compromise or malicious activity. This can be achieved through the implementation of security monitoring tools that provide real-time visibility into cloud environments. Additionally, organizations should conduct regular vulnerability assessments and penetration testing to identify and address any vulnerabilities in their cloud infrastructure.


Cloud computing offers numerous benefits to organizations, but it also presents inherent security risks that must be properly addressed. By implementing strong internal controls, organizations can mitigate these risks and ensure the security and integrity of their data. This includes enforcing access controls, continuously monitoring cloud resources, and regularly conducting vulnerability assessments. With a proactive approach to internal controls, organizations can confidently embrace cloud computing while safeguarding their sensitive information.

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.

Click Here to Make an Order Click Here to Hire a Writer