ECPI Comprehensive Threat Analysis & Recommendations of Cloud Migration Discussion
Can you help me understand this Computer Science question?
PLEASE USE SAME COMPANY!
In Phase 5, you will compile your research into one complete document to provide comprehensive threat analysis and recommendations of cloud migration for the Fortune 500 Company you selected for your project. Your final paper will include the following:
- Phase 1 through 4 submissions in a logical order
- Select an appropriate security framework and develop a framework mapping of security controls in the Cloud (based on Cloud services used) to the functional areas within the framework
- Analyze whether the security controls will provide enough evidence to response to an incident
- Provide 3-4 recommendations or solutions to harden security controls (physical and/or logical)
Include proper APA citations (both in-text and references) for any references you use in your research. Ensure you have proper spelling, grammar, and mechanics throughout your writing.