Address Information Security and Compliance Issues. Information security and privacy are critical to the success of any IT deployment for the growth and viability of the business. However, this is through a framework such as the confidentiality, availability, and integrity, known as the CIA triad.
To review information on security and compliance issues: Network Security Design, Application and Data Security, Cloud and Network Security Issues, Data Compliance, Cloud-Specific Compliance Issues, Frameworks for Analyzing
BallotOnline must also keep its data compliant with regulatory policies and procedures.
In this step, consider the relevant information security and compliance issues related to the “cloud ready” application/workloads you have designated and define how they will be addressed in the policy addendum
The quotes should be complete sentences (no more, less) and should be incorporate-d in your essay to illustrate your ideas. Please, cite your sources in a clickable reference list at the end. Also, do not copy without providing proper attribution (quotation marks and in-line citations). Also, write an essay format, not in bullet form, numbering, or another list format. It would be best if you use your own words. Lastly, proofread your work and run it through Grammarly for thorough confirmation.