Monday, April 29, 2019

Risk managments strategy of applaying open stack system Essay

Risk managments strategy of applaying inconsiderate set system - Essay Examplet an open source cloud computing solution that is built on precise components such as storage and network components that are integrated with each other to make a complete open source cloud computing solution. Accordingly, the source code is shared with the vendors as well as the growing team. Consequently, the usability of Open stack can legislate to unpredictable risks. Organization try to mitigate the risks associated with this unpredictable surround may create new risks by exposing the cloud on the Internet instead of utilizing an industry amenable standardized solution. The complex customization and flexibility of opens tack that can be specific to an organization may lead to a conflict with the external open stack infrastructure. Therefore, the internal and external semantics of the cloud infrastructure is intercrossed (Mears, J. 2007).Likewise, there is a risk of implementing throws on the op en stack without performing impact analysis delinquent to informal change management process. For instance, a patch needs to be deployed on the open stack and testing is required before implementation. The IT department will test the patch and attach the results in the change management form with formal approvals. After the approvals, the patch can be deployed only if the test results are all correct. Similarly, patch management for open stack can also lead to vulnerabilities that can be exploited any time. For mitigation, effective patch management process needs to be in dwelling for testing and applying patched in the production environment. The same change management process can be adopted for patch management. However for tracking end of life and end of service for information technology summations, an asset register is require for keeping track. Ideally, an IT asset coordinator is a key person who performs these tasks (KLEPS 2015).After establishing an asset register, all t he assets are now identified and ready for risk assessment. In the first step, the confidentiality,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.