Imagine you are an information security manager in a medium-sized organization. Your CIO has asked you to prepare a case analysis report and presentation on establishing internal controls in cloud computing. The CIO has seen several resources online that discuss the security risks related to cloud-based computing and storage. One that stood out was . You are asked to summarize the information you can find on the Internet and other available sources. The CIO wants to have a firm grasp on the benefits and risks associated with public, private, and hybrid cloud usage. There is also concern over how these systems should be monitored to ensure proper usage and data security. Write a 3–4 page paper in which you: This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.The specific course learning outcome associated with this assignment is: Purchase the answer to view it


Cloud computing has revolutionized the way businesses store, process, and manage their data. However, the adoption of cloud computing also brings forth concerns regarding the security of sensitive information. As an information security manager, it is crucial to establish internal controls in cloud computing to mitigate the risks associated with this technology. This case analysis report and presentation aim to provide an overview of the benefits and risks of public, private, and hybrid cloud usage, as well as strategies for monitoring and ensuring data security in these systems.


Cloud computing has gained widespread popularity in recent years due to its scalability, cost-effectiveness, and flexibility. It offers businesses the ability to outsource their computing infrastructure, storage, and applications to third-party service providers. However, this also introduces new security challenges that must be addressed to maintain the confidentiality, integrity, and availability of data.

Benefits of Cloud Computing

One of the key benefits of cloud computing is its cost-effectiveness. By adopting cloud services, organizations can reduce their capital expenditures on hardware and software infrastructure, as well as the associated maintenance and operational costs. Additionally, cloud computing enables businesses to scale their resources on-demand, allowing them to quickly respond to changing business needs.

Another advantage of cloud computing is its flexibility. With cloud services, businesses can access their data and applications from anywhere, at any time, as long as they have an internet connection. This enables remote work and collaboration, promoting productivity and efficiency.

Risks of Cloud Computing

While there are numerous benefits to adopting cloud computing, there are also inherent risks that must be carefully managed. One major concern is the potential loss of control over sensitive data. When data is stored and processed in the cloud, organizations are reliant on third-party service providers to ensure the security and privacy of their data. A breach or unauthorized access to this data can have severe consequences, including financial losses and damage to the organization’s reputation.

Another risk is the possibility of service outages or disruptions. Cloud service providers may experience downtime due to technical failures, natural disasters, or cyber-attacks. This can lead to business disruptions and loss of productivity.

Monitoring and Ensuring Data Security

To address the risks associated with cloud computing, it is crucial to establish robust internal controls. Organizations should implement measures to ensure the confidentiality, integrity, and availability of their data. This includes:

1. Encryption: Data should be encrypted both in transit and at rest to protect it from unauthorized access.

2. Access control: Access to data and resources in the cloud should be restricted to authorized personnel only. Strong authentication mechanisms, such as multi-factor authentication, should be implemented.

3. Regular audits: Organizations should conduct regular audits to assess compliance with security policies and identify any vulnerabilities or weaknesses in the system.

4. Incident response plan: A well-defined incident response plan should be in place to quickly respond to security incidents and mitigate their impact.


Cloud computing offers numerous benefits to organizations, but it also introduces security risks that must be addressed. By implementing effective internal controls, including encryption, access control, regular audits, and incident response plans, organizations can mitigate these risks and ensure the security of their data in the cloud. It is important for information security managers to stay knowledgeable on the latest trends and best practices in cloud security to protect sensitive information and maintain the trust of their stakeholders.

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.

Click Here to Make an Order Click Here to Hire a Writer