0% found this document useful (0 votes)
8 views10 pages

Ghost Isa (Update)

The document discusses the application of the risk management life cycle to Nebula Intel Limited's cloud infrastructure, emphasizing risk identification, assessment, and mitigation strategies. It highlights specific vulnerabilities in cloud systems, such as poor authentication mechanisms and insufficient access controls, and outlines methods to mitigate risks related to data breaches and unauthorized access. The conclusion stresses the importance of a multifaceted approach to enhance security while leveraging cloud computing benefits.

Uploaded by

Eric Ezekiel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views10 pages

Ghost Isa (Update)

The document discusses the application of the risk management life cycle to Nebula Intel Limited's cloud infrastructure, emphasizing risk identification, assessment, and mitigation strategies. It highlights specific vulnerabilities in cloud systems, such as poor authentication mechanisms and insufficient access controls, and outlines methods to mitigate risks related to data breaches and unauthorized access. The conclusion stresses the importance of a multifaceted approach to enhance security while leveraging cloud computing benefits.

Uploaded by

Eric Ezekiel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

THE INSTITUTE OF FINANCE MANAGEMENT

FACULTY OF BUSINESS AND ECONOMICS (FBE)

BACHELOR IN ACCOUNTING WITH INFORMATION TECHNOLOGY

COURSE: INFORMATION SYSTEM AUDIT

CODE ITU 08213

STREAM C,

YEAR THREE

ACADEMIC 2024/2025

NATURE OF WORK: INDIVIDUAL ASSIGNMENT

NAME: ERICK EZEKIEL GADIGA

REG, NUMBER: IMC/BAIT/2224396


Scenario-02

Introduction

Cloud computing is a transformative technology that enables organizations to access and


utilize computing resources over the internet, rather than relying on local servers or personal
computers. This model allows businesses to store data, run applications, and manage IT
infrastructure in a flexible and scalable manner. By leveraging cloud services, companies can
reduce costs associated with hardware procurement and maintenance while gaining the ability
to scale resources up or down based on demand. The primary types of cloud services include
Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a
Service (SaaS), each offering varying levels of control and management.

Despite its advantages, cloud computing introduces new security challenges and risks that
organizations must address to ensure data integrity, confidentiality, and availability. such
concerns may include No clear visibility on where the system is stationed scooch as theirs
servers and where the data is stored

a) How would you apply the risk management life cycle to identify and assess the risks
associated with Nebula Intel Limited's cloud infrastructure?

Applying the Risk Management Life Cycle to Nebula Intel Limited's Cloud
Infrastructure

To effectively manage the risks associated with Nebula Intel Limited's transition to a cloud-
based IT infrastructure for its e-Inventory Management System, it is essential to apply the
risk management life cycle. This structured approach involves several key steps: risk
identification, risk assessment, risk response, and ongoing monitoring and review. Below is a
detailed explanation of each step in the context of Nebula Intel Limited.

Risk Identification

The first step in the risk management life cycle is identifying potential risks that could impact
the cloud infrastructure. This involves:

Objective: Identify potential risks that could affect cloud operations, data security, regulatory
compliance, and service availability.

2|Page
RISK REGISTER: a risk register is a formal, living document or software-based tool that
records all identified risks within an organization. it acts as the central repository for risk
information and is essential for tracking and managing risk across departments. Each
identified risk is logged into a Risk Register, a central document that tracks all
organizational risks.

Key entries include: Risk ID, description, likelihood, impact, owner, mitigation strategies,
and status. Example entry: Risk ID: CR-101, Description: data exposure, Likelihood:
Medium Impact: High

Risk Assessment

Once risks are identified, they must be assessed to determine their potential impact on the
organization. This involves two main components Qualitative Assessment: Evaluating risks
based on their severity and likelihood using a scoring system (e.g., low, medium, high). This
helps prioritize which risks need immediate attention. Quantitative Assessment: Where
possible, quantifying the financial impact of risks using metrics such as potential loss in
revenue or costs associated with data breaches. Objective: Determine the likelihood and
impact of each identified risk using qualitative or quantitative methods.

RISK CHAMPIONS

Risk Champions are appointed individuals within each business unit or department (e.g., IT,
HR, Legal, Compliance) who play a key role in supporting risk management processes at the
operational level.

Role of Risk Champions:

1. Risk Champions from each department (IT, Legal, Operations, Compliance) provide
domain-specific insights.
2. They assess departmental exposures and update risks relevant to their units.
3. Help ensure that risk identification is holistic across all operations.
4. Monitor the progress of assigned mitigation actions
5. Monitor the progress of assigned mitigation actions
6. Ensure that risk mitigation strategies are implemented.

3|Page
3.Risk Evaluation and Prioritization

Objective: Rank the risks to determine which require immediate attention or mitigation.
Application, High-priority risks (e.g., lack of encryption at rest, weak IAM policies) are
escalated to the Risk and Compliance Committee (RCC). RCC evaluates whether the
organization's risk appetite and tolerance levels are breached.

Risk and Compliance Committee (RCC)

The Risk and Compliance Committee (RCC) is a high-level governance body responsible
for overseeing and directing the organization’s risk and compliance strategy. A governance
body responsible for overseeing enterprise risk. Includes senior leadership from Legal, IT,
Compliance, and Audit. Evaluates proposed controls and provides strategic guidance on risk
decisions.

Key Responsibilities

i. Review and approve the Risk Register and major risk entries.
ii. Prioritize risk treatment strategies aligned with business goals.
iii. Approve resource allocation for risk mitigation.
iv. Monitor compliance with regulatory requirements (e.g., GDPR, ISO 27001).
v. Make strategic decisions about risk tolerance and risk appetite.
vi. Escalate high-risk items to the Board if needed.

Risk Treatment and Mitigation

Objective: Define actions to reduce or manage risk to an acceptable level.

Treatment Options: Accept the risk (if within tolerance) Mitigate the risk (e.g., through
firewalls, encryption, MFA) Transfer the risk (e.g., via cloud provider SLAs or cyber
insurance) Avoid the risk (e.g., not using a particular cloud service)

Risk Monitoring and Reporting

4|Page
Objective: Continuously monitor the effectiveness of risk controls and adjust as necessary.
Application Monthly or quarterly reviews of the Risk Register. Cloud logs and security
alerts are continuously monitored. Risk Champions report updates to the RCC.

Reporting Structure:

Risk Champions → Department Heads → RCC

RCC consolidates reports and communicates with executive leadership and board.

Risks associated with accessing data online

Reputational Damage: Reputational damage is one of the most severe consequences that
can arise from mishandling data online. When an organization suffers a data breach or fails to
protect sensitive information adequately, it can lead to:

Loss of Customer Trust: Customers expect their personal information to be safeguarded. A


breach can erode trust and lead customers to seek alternatives

Negative Publicity: Media coverage surrounding data breaches often highlights the
organization's failure to protect its customers, leading to negative perceptions in the public
eye

Impact on Brand Value: Long-term reputational damage can affect brand equity and market
position, resulting in decreased sales and customer loyalty

Data Breaches: Data breaches are among the most pressing concerns when accessing data
online. They occur when unauthorized individuals gain access to sensitive information, which
can result in:

Financial Losses: Organizations may incur substantial costs related to forensic


investigations, legal fees, and remediation efforts following a breach

Identity Theft: Breached personal information can be used for identity theft, leading to
further complications for affected individuals and potential lawsuits against the organization (

5|Page
Intellectual Property Theft: Sensitive corporate data or proprietary technology may be
stolen during a breach, jeopardizing competitive advantage

Compliance Violations and Penalties

Organizations must adhere to various regulations governing data protection and privacy.
Non-compliance can lead to severe penalties:

Regulatory Fines: Laws such as GDPR impose hefty fines on organizations that fail to
comply with data protection standards. These fines can reach millions of dollars depending
on the severity of the violation (The General Data Protection Regulation).

Legal Action: Affected individuals may file lawsuits against organizations for failing to
protect their personal information adequately. This legal exposure can result in costly
settlements or judgments

B) What are the five (5) specific vulnerabilities in cloud-based systems would you focus
on during the risk management process?

Poor Authentication Mechanisms: Weak authentication practices can lead to unauthorized


access to sensitive data and applications. This vulnerability arises from inadequate password
policies, lack of multi-factor authentication (MFA), or reliance on easily guessable
credentials. If attackers gain access through compromised credentials, they can manipulate
data, steal information, or disrupt services. Implementing strong authentication measures,
such as MFA and robust password policies, is essential to mitigate this risk.

Lack of Control Over System Updates and Patch Management

Cloud applications rely on underlying software and operating systems managed by either the
organization or the cloud provider. Delays or gaps in applying critical security patches leave
systems exposed. Furthermore, in a cloud environment, organizations often rely on service
providers to manage system updates and patches. This lack of control can result in delayed
updates or failure to address known vulnerabilities promptly. Unpatched systems are
susceptible to exploitation by cybercriminals who take advantage of known vulnerabilities.
Organizations should establish clear agreements with service providers regarding update
schedules and ensure that they have visibility into the patch management process.

6|Page
Insufficient Access Controls

Inadequate access controls can lead to excessive permissions granted to users or applications
within a cloud environment. This vulnerability often stems from poor identity and access
management practices. When users have more privileges than necessary, it increases the risk
of accidental or malicious actions that could compromise system integrity or data security.
Implementing role-based access control (RBAC) and regularly reviewing user permissions
are critical steps in mitigating this vulnerability

Data Exposure and Inadequate Encryption: Without strong encryption, data stored or
transmitted via cloud platforms can be intercepted, especially during backups, replication, or
API calls. The e-Inventory system likely stores financial records, product data, and possibly
customer details. Any data leak could lead to regulatory violations and reputational damage.
Lack of key management or poor implementation of encryption protocols. Mitigations
Enforce end-to-end encryption

c) How would you mitigate the five (5) risks related to data breaches and unauthorized
access to the cloud infrastructure?Strong Authentication Policy: A strong authentication
policy is critical in safeguarding cloud infrastructure against unauthorized access. This
involves implementing multi-factor authentication (MFA), which requires users to provide
two or more verification factors to gain access. MFA typically combines something the user
knows (password), something the user has (a mobile device or hardware token), and
something the user is (biometric verification). By enforcing a strong authentication policy,
Nebula Intel can significantly reduce the risk of unauthorized access due to compromised
credentials. Additionally, password management practices should be established, including
regular password changes, complexity requirements, and prohibiting password reuse. This
approach ensures that even if a password is compromised, additional layers of security will
protect sensitive data

Separation Between Application and Database Servers: Implementing a clear separation


between application servers and database servers is another effective strategy for mitigating
risks related to data breaches. By isolating these components within the cloud architecture,
organizations can minimize the attack surface available to potential intruders. This separation
ensures that even if an attacker gains access to the application layer, they cannot directly
interact with the database without additional authentication measures. Network segmentation

7|Page
can be employed to create distinct zones within the cloud environment where different types
of traffic are controlled and monitored Firewalls and virtual private networks (VPNs) can
further enhance this separation by restricting access based on predefined rules.

Awareness Training: Human error remains one of the leading causes of data
breaches; therefore, conducting regular awareness training for employees is vital in
mitigating risks associated with unauthorized access. Training programs should
educate staff about best practices for data security, including recognizing phishing
attempts, understanding social engineering tactics, and adhering to company
policies regarding data handling. Awareness training should also cover how
employees can identify suspicious activities within their accounts or systems. By
fostering a culture of security awareness among employees at Nebula Intel
Limited, organizations can empower their workforce to act as an additional line of
defense against potential threats

Regular System Audits Conducting regular system audits is essential for identifying
vulnerabilities within cloud infrastructure that could lead to data breaches or unauthorized
access. These audits should include comprehensive assessments of security controls,
configurations, compliance with regulatory standards, and overall system performance.
Audits help organizations detect anomalies or deviations from established security protocols
before they escalate into significant issues. Automated tools can assist in monitoring logs for
unusual activity patterns while manual reviews ensure that all aspects of security are
evaluated thoroughly Establishing a routine audit schedule allows Nebula Intel Limited to
maintain continuous oversight over its cloud environment.

Least Privilege Policy: Implementing a least privilege policy ensures that users have only
the minimum level of access necessary to perform their job functions effectively. This
principle limits exposure by reducing permissions granted to users based on their roles within
the organization. By regularly reviewing user permissions and adjusting them as needed—
especially when employees change roles or leave the company—Nebula Intel can minimize
opportunities for unauthorized access or accidental data exposure Role-based access control

8|Page
(RBAC) mechanisms can facilitate this process by automatically assigning permissions based
on predefined roles rather than individual user requests.

Conclusion

In conclusion, mitigating risks related to data breaches and unauthorized access in cloud
infrastructure requires a multifaceted approach encompassing strong authentication policies,
separation between application and database servers, employee awareness training, regular
system audits, and least privilege policies. By implementing these strategies effectively
within its IT framework for the Nebula GenX e-Inventory Management System, Nebula Intel
Limited can enhance its security posture while leveraging the benefits offered by cloud
computing.

9|Page
REFFERENCE

Tipton & Krause , "Information Security Management Handbook." (Print)


Erl et al., "Cloud Computing: Concepts, Technology & Architecture." (Print)
Raghavan et al., "The Cloud Security Ecosystem." (Print)
Kumar & Singh , "Managing Cloud Services: A Practical Guide." (Print)
Buyya&Broberg&Goscinski , "Cloudonomics: The Business Value of Cloud Computing."
(Print)

10 | P a g e

You might also like