Please read the instructions and let me know if you have any questions
Cloud IAM and Data Security DesignReplace all RED TEXT with your selections and justifications. Your content should be in black font typeface.
Business ScenarioA healthcare organization is moving their patient management system to the cloud. They need to ensure proper access controls and data protection measures are in place to meet HIPAA requirements.
InstructionsCreate an APA Style Title Page.
Review the business requirements in the scenario description.
Build on the business scenario with additional content (200-300 words).
For each section below, select the most appropriate options from the provided lists.
Provide a brief justification (1-2 sentences) for each selection that clearly relates back to the business scenario.
Include a few references and citations to support some of your justifications.
Submit the completed template document.
Instructions: Select 3-5 roles from the following list of common healthcare roles:
Physician, Nurse, Medical Administrator, IT Administrator, Billing Specialist, Patient Coordinator, Pharmacist, Lab Technician, Data Analyst
Example Selected Roles:
Justification: Compliance Officers ensure adherence to HIPAA regulations, needing access to audit logs and security configurations.
Instructions: Select 3-4 mechanisms from the following list of IAM controls:
Attribute-Based Access Control (ABAC)Role-Based Access Control (RBAC), Multi-Factor Authentication (MFA), Single Sign-On (SSO), Attribute-Based Access Control (ABAC), Zero Trust Principles, Mandatory Access Control (MAC), Discretionary Access Control (DAC), Time-Based Access Restrictions
Example Selected Mechanisms:
Least Privilege Principle
Justification: Enforcing least privilege minimizes access to only what is necessary, reducing the risk of data breaches.
Instructions: Select 2-3 strategies from the following list of encryption and protection options:
Data Encryption in Transit, Tokenization, Data Masking, Key Management Service (KMS), Data Loss Prevention (DLP), Backup and Recovery
Example Selected Strategies:
Data Encryption at Rest
Justification: Encrypting data at rest ensures patient data stored in the cloud is protected from unauthorized access, a HIPAA requirement.
Instructions: Select 2 options from the following list of security monitoring options:
CloudTrail (AWS) / Activity Logs (Azure) / Audit Logs (GCP), Intrusion Detection System (IDS), Log Retention Policy, Real-Time Monitoring
Example Selected Options:
Security Information and Event Management (SIEM)
Justification: SIEM provides centralized monitoring and analysis of security events, helping detect and respond to potential breaches.