COM7003 Cloud Secuirty CW1 Re-Assignment Brief | BNU
Learning Outcomes of COM7003:
This assignment has been designed to provide you with an opportunity to demonstrate your achievement of the following module learning outcomes:
LO1 Demonstrate a detailed knowledge and understanding of the concepts and terminology of cloud security
LO2 Critically apply knowledge of system requirements in the implementation of appropriate security configurations for a cloud system
LO3 Synthesize complex requirements in the management and configuration of secure cloud systems.
COM7003 Assignment task
Your objective for this assignment is to produce around 3000 words technical report on your research, design and technical documentation for a viable secure cloud system solution for a business. Including a simulation of your proposed cloud-based system’s solution produced by utilising AWS Amazon platform, to be submitted/included along with the technical report.
The purpose of the assignment is to allow you to demonstrate your detailed knowledge and understanding of the concepts and terminology of cloud security that you have explored within the module. It is also an opportunity for you to learn how to design and configure a complex solution for managing and configuring a secure cloud-based system for a business, utilising that knowledge and understanding.
Each student has to build/configure and run the cloud-based system, which provides secure system applications/services (such as computing, storage, database, and management and monitoring). Around 3000 words Technical report is to be written to discuss & analyse cloud system architecture, configurations, and results analysis. (100 mark)
The business scenario to be used for this assignment is as follows:
An International medical Company “Medic-Cloud” is about to move its system from their premises into the cloud. The Company has three branches around Europe Poland, Italy and Portugal, the headquarter is in Italy. The company aims to provide all its medical services to customers/patients in Scotland.
The company is asking you to design and configure a secure, reliable, and efficient cloud- based system by utilising AWS Amazon platform, services, and facilities to achieve its goal. You will be required to create a technical report that fully justifies and discuss the construction and configuration of the secure design for the system.
By using the Amazon (AWS) platform, each student has to use their individual account
(FREE TIER account) to achieve the following:
How to create an account and set and active the billing alert guidance is available on the BB (coursework brief)
MAKE SURE to activate the billing alert service to avoid any charge may occur!
The secure cloud system design must include provision for following services and structure:
- The full system architecture shows region(s), AZ(s), Network or Subnet(s), and services. (20 mark)
- Only three employees at the security team (Admin1, Admin2, and Admin3) have the access to resources and allowed to use the servers. (3 mark)
- The System provides smart mid-term storage services. The storage gives the capability to store data and objects on different categorised folders (patient, staff, and finance). Only staff folder could be accessed remotely. (10 mark)
- The system should provide high-performance cloud Storage Area Network (SAN) to help in scaling fast for most demanding, high-performance workloads. Protect against failures with high availability. (5 mark)
- Protect storage data in the cloud, a point-in-time copy that can be used to enable disaster recovery, migrate data across regions and accounts, and improve backup compliance. (5 mark)
- The company has web server, mail server, and proxy server. All servers are protected against unauthorized users and allowing HTTP connections ONLY. (2 mark)
- Set security facility to control and monitor the system (technically and financially) (5 mark)
- The system should be fully scalable and has the capability to smartly monitor and balance the application loads. (3 mark)
- The system has the capability to identify any risk or problem might occur. (2 mark)
- Database with high availability should be connected to reserves and to provide quick response to quick and intensive applications. (5 mark)
- Cloud based system application should be deployed into company’s cloud platform. Application setup, configuration and deployment should be discussed clearly. (10 mark)
- By using the CloudWatch Monitoring tool, show the following: (5 mark)
- The Percentage of average statistics of CPU utilisation during the first two days of running the system and for each 15 minutes cycle.
- How many Bytes of data have been read during the same period?
- Status of failed instances during the last day. Checks to be shown for every 5 minutes.
- The sum of the CPU Credit Usage during two days for every hour.
- Healthy an Unhealthy hosts on your cloud system for a two days period.
- Discuss in detail and with examples the Security tools and solutions to protect VPC, AZ, and EC2. Support your discussion with a case study implementation of one of these tools.
Each student is responsible to demonstrate and answer questions related to their work during the demonstration slot on week 10.