Cloud Architecture Week 3

Considerations for Securing Applications in the Cloud Note there are 8 questions and each response should be at least 250 words not including sources if needed.

Using the resources that you’ve studied(see links below) in this module and your own research please answer the following questions related to securing applications in the cloud.

1.       You read material and watched videos that described DevOps and the SDLC. 

a.       In your own words briefly describe each and then explain how DevOps differs from the traditional SDLC. 

b.       Explain how you think cloud computing enhances DevOps.

2.       Using the resources you’ve studied and your own research, describe what practices, tools, etc. can be used to ensure that DevOps becomes Secure DevOps.
 

3.       Our text describes RESTful APIs.  What are RESTful APIs and why are these APIs important to cloud computing? 

a.       What are the security risks? 

b.       How can we mitigate these risks?

4.       What is Threat Modeling? 

a.       What are the six components of the STRIDE threat model? 

b.       How does threat modeling help with cloud application assurance?

Resources and links:

https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v1.pdf

https://aws.amazon.com/devops/what-is-devops/

Solution

This question has been answered.

Order Now
Scroll to Top