Sanjusas
Sanjusas
Sanjusas
On
ZERO TRUST CLOUD SECURITY
Submitted in partial fulfillment of the requirements of the degree of
BACHELOR OF TECHNOLOGY
in
INFORMATION TECHNOLOGY
Submitted by
Guided by
(AUTONOMOUS)
I YERVA VENKATA ASHOK REDDY a student of B. Tech, Reg.No 218X1A1266 of the Department of
do hereby declare that I have completed the mandatory internship virtually during from JANUARY - 2024 to
MARCH -2024 in EDU SKILLS under the Faculty Guideship of Mr. KOPPISETTY R. M. C. SEKHAR
INSTITUTE OF TECHNOLOGY.
Endorsement
I profoundly express my gratitude and respect towards our honorable chairman SRI
KALLAM MOHAN REDDY, Chairman, KHIT for his precious support in the college.
I express my deepest gratitude to the dynamic director of our institute Dr. M. UMA
SHANKARA REDDY M.Sc. Ph.D., Director, KHIT for his valuable guidance and blessing.
Finally, I would like to thank my parents for being supportive all the time, and I am very
much obliged to them.
CONTENTS
The Zero Trust Cloud Security virtual internship provides participants with hands-on experience in
implementing and managing modern cybersecurity principles in cloud environments. Zero Trust is
a security framework that assumes no implicit trust within or outside an organization’s network,
requiring strict identity verification for every user and device attempting to access resources.
Exploring security technologies such as identity and access management (IAM), multi-factor
authentication (MFA), and continuous monitoring.
3. Hands-on Experience:
Practical labs and simulations focused on implementing Zero Trust in cloud platforms like AWS,
Azure, and Google Cloud.
Working with security tools such as VPNs, firewalls, and security information and event
management (SIEM) systems.
8
Addressing compliance frameworks like GDPR, HIPAA, and SOC 2 in cloud environments.
9
CHAPTER 2: OVERVIEW OF THE ORGANIZATION
Employability and Job Readiness: The organization helps students develop skills that enhance
their employability. This includes not only technical skills but also soft skills like communication,
problem-solving, and teamwork, which are critical for career success.
Collaboration with Academia and Industry: EduSkills works closely with schools, colleges,
universities, and companies to create a seamless pathway for students from education to
employment. Their initiatives often include practical training, internships, and mentorship
opportunities.
Mission of EduSkills:
EduSkills aims to democratize education and skill development by making quality learning
accessible to students from all backgrounds, regardless of geography or socio-economic conditions.
By doing so, the organization strives to create a future-ready workforce capable of meeting the
demands of the rapidly changing job market.
In summary, EduSkills serves as a bridge between academia and industry, fostering a collaborative
environment where students, educators, and professionals can gain the skills necessary to thrive in
an increasingly digital world.
vision and mission and goals of the eduskills organization
Vision:
EduSkills envisions a world where quality education and essential skills are accessible to all,
enabling individuals to thrive in a rapidly evolving digital landscape. The organization aims to create
a future-ready workforce equipped with the necessary tools to succeed in various industries,
ultimately contributing to economic growth and societal development.
Mission:
EduSkills’ mission is to empower students, educators, and institutions through innovative training
programs and resources that enhance digital literacy and employability. By collaborating with
industry leaders and educational institutions, EduSkills strives to bridge the skill gap between
academia and the workforce, ensuring that learners are prepared for the challenges of the modern
job market.
Goals:
Enhance Digital Literacy:
Provide accessible training and resources that improve digital skills among students and educators.
Industry-Relevant Training:
Develop and deliver programs that align with current market demands and emerging technologies,
facilitating industry-recognized certifications.
Empower Educators:
Offer professional development opportunities for teachers to integrate technology and innovative
teaching methods into their classrooms.
11
Promote Employability:
Equip students with both technical and soft skills necessary for career success, increasing their
employability in the competitive job market.
Foster Collaboration:
Build partnerships with educational institutions, industry stakeholders, and government bodies to
create a cohesive ecosystem that supports skill development.
Support Diverse Learners:
Ensure equitable access to education and training resources for learners from various backgrounds,
fostering an inclusive learning environment.
Continuous Improvement:
Regularly assess and adapt programs to meet the evolving needs of students and the job market,
ensuring that EduSkills remains relevant and effective in its mission.
12
CHAPTER 3: INTERNSHIP PART
The Cyber security Intern provides an opportunity to gain professional experience in a real-world
setting
Modules:
Fundamental of cyber security
• Cyber security and attack surface
• Types of cyber security
• Importances of cyber security for business
• Cyber security framework and compliance
• Cyber threats, cyber-attacks and cyber attackers
• Various types of cyber attacks
• Cyber safety and its measures
• Perimeter based and zero trust security models
• Zscaler zero trust exchange
13
Components of the Attack Surface:
User Interfaces: Any point where users interact with a system, such as web applications and APIs.
Network Interfaces: All the entry points to a network, including open ports and communication
protocols.
Software Applications: Programs that might contain vulnerabilities or be misconfigured.
Third-party Services: Any external services or components integrated into your system that could
introduce vulnerabilities.
Reducing the Attack Surface
To minimize the attack surface, organizations can implement several strategies:
Regular Audits and Assessments: Identifying and mitigating vulnerabilities in systems and
applications.
Minimize Services: Disable unnecessary services and applications to reduce potential entry points.
Patch Management: Regularly updating software to fix known vulnerabilities.
Network Segmentation: Dividing networks into smaller segments to limit access and reduce the
potential impact of a breach.
User Education: Training users to recognize phishing attempts and other common attack methods.
3.2 Types of cyber security:
Cybersecurity is vital for several reasons, each addressing different aspects of technology, business,
and personal safety. Here are some key types of cybersecurity importance:
1. Data Protection
Confidentiality: Safeguarding sensitive data from unauthorized access.
Integrity: Ensuring that data is accurate and unaltered during transmission and storage.
Availability: Making sure data and systems are accessible when needed.
2. Business Continuity
Disaster Recovery: Establishing protocols to restore operations after a cyber incident.
Minimizing Downtime: Reducing the impact of attacks to maintain productivity and service delivery.
3. Regulatory Compliance
Adhering to Laws: Meeting industry regulations (e.g., GDPR, HIPAA) to avoid legal penalties.
Building Trust: Demonstrating a commitment to security to customers and partners.
4. Reputation Management
Brand Protection: Preventing breaches that can harm a company’s reputation.
Customer Loyalty: Ensuring trust by safeguarding customer data and privacy.
5. Intellectual Property Protection
Safeguarding Innovations: Protecting proprietary information and trade secrets from theft or
espionage.
14
Fig 3.2.1: TYPES OF CYBER SECURITY
6. Financial Security
Preventing Loss: Reducing the risk of financial loss from cyberattacks, such as ransomware or fraud.
Insurance Benefits: Lowering premiums by demonstrating strong security practices.
7. Employee Safety
Awareness and Training: Educating employees about cybersecurity threats to reduce risks of
breaches.
Creating a Safe Work Environment: Ensuring that internal systems are secure from attacks.
8. National Security
Protecting Critical Infrastructure: Securing systems that support essential services like power,
healthcare, and transportation.
Countering Cyber Warfare: Defending against state-sponsored attacks and cyber terrorism.
9. IoT Security
Managing Connected Devices: Ensuring the security of Internet of Things devices, which can be
vulnerable entry points.
10. Evolving Threat Landscape
Adapting to New Threats: Continuously updating security measures to respond to emerging threats
and attack methods.
15
3.3 Importances of cyber security for business
Certainly! Security can be categorized into various types, each focusing on different areas of
protection. Here’s an overview of the main types of security:
1. Physical Security
Protection of Physical Assets: Involves safeguarding physical locations, such as buildings and
equipment, from unauthorized access, theft, and natural disasters.
Components: Access controls (locks, badges), surveillance (CCTV), security personnel, and
environmental controls (fire alarms, climate controls).
2. Cybersecurity
Protection of Digital Information: Focuses on protecting computer systems, networks, and data from
cyber-attacks and unauthorized access.
Components: Firewalls, encryption, intrusion detection systems, antivirus software, and security
policies.
3. Network Security
Securing Network Infrastructure: Involves protecting the integrity and usability of networks from
intrusions and attacks.
Components: VPNs, firewalls, intrusion prevention systems, and secure configurations.
4. Application Security
Securing Software Applications: Ensures that applications are designed and maintained to prevent
vulnerabilities.
Components: Secure coding practices, application testing, vulnerability assessments, and patch
management.
5. Information Security
Protecting Data Integrity: Focuses on protecting data from unauthorized access and corruption.
Components: Access controls, encryption, data classification, and secure data storage.
6. Operational Security (OpSec)
Protecting Processes and Information: Involves processes that protect sensitive information and
operational capabilities.
Components: Risk assessments, security policies, and employee training.
7. Cloud Security
Securing Cloud Environments: Focuses on protecting data and applications hosted in cloud services.
Components: Identity management, access controls, encryption, and compliance monitoring.
8. Endpoint Security
Protecting End-user Devices: Involves securing devices like laptops, smartphones, and tablets that
connect to the network.
Components: Antivirus software, endpoint detection and response (EDR), and mobile device
16
management (MDM).
9. Mobile Security
Securing Mobile Devices: Focuses on protecting smartphones and tablets from threats and
vulnerabilities.
Components: App vetting, data encryption, and remote wipe capabilities.
10. Disaster Recovery and Business Continuity
Planning for Incidents: Ensures that operations can continue or recover quickly in the event of a
disaster or major disruption.
Components: Backup systems, recovery plans, and continuity planning.
3.4 Cyber security framework and compliance
Cybersecurity frameworks and compliance are essential for organizations aiming to establish robust
security practices and meet regulatory requirements. Here’s an overview of key frameworks and
compliance considerations:
Cybersecurity Frameworks
NIST Cybersecurity Framework (CSF)
Developed by the National Institute of Standards and Technology, this framework provides a policy
framework of computer security guidance for how private sector organizations can assess and improve
their ability to prevent, detect, and respond to cyber attacks.
Core Functions:
Identify: Understanding organizational risks and resources.
Protect: Implementing safeguards to limit the impact of potential events.
Detect: Developing and implementing activities to identify the occurrence of a cybersecurity event.
Respond: Taking action regarding a detected cybersecurity incident.
Recover: Maintaining plans for resilience and restoring services affected by cybersecurity incidents.
ISO/IEC 27001
An international standard for managing information security. It provides requirements for establishing,
implementing, maintaining, and continually improving an information security management system
(ISMS).
Key Components: Risk management, security controls, and continuous improvement.
CIS Controls
Developed by the Center for Internet Security, these are a set of best practices for securing IT systems
and data. The controls provide actionable guidance on protecting against the most common cyber
threats.
Categories: Basic, foundational, and organizational controls, with a focus on risk management and
security hygiene.
17
COBIT (Control Objectives for Information and Related Technologies)
A framework for developing, implementing, monitoring, and improving IT governance and
management practices. It helps organizations align IT goals with business objectives and manage risks
effectively.
PCI DSS (Payment Card Industry Data Security Standard)
A set of security standards designed to ensure that all companies that accept, process, store, or transmit
credit card information maintain a secure environment. Compliance is mandatory for businesses
handling card payments.
Cybersecurity Maturity Model Certification (CMMC)
Developed by the U.S. Department of Defense, this framework is designed to enhance the protection
of sensitive information within the defense industrial base. It includes multiple levels of maturity that
organizations must achieve for compliance.
Organizations must be aware of and comply with industry-specific regulations, such as:
GDPR: General Data Protection Regulation for data protection and privacy in the European Union.
HIPAA: Health Insurance Portability and Accountability Act for protecting healthcare information
in the U.S.
FISMA: Federal Information Security Management Act for federal agencies in the U.S.
Audits and Assessments
Regular security audits and assessments help organizations identify vulnerabilities and ensure
compliance with internal policies and external regulations.
Documentation and Reporting
Maintaining thorough documentation of policies, procedures, and incident responses is crucial for
demonstrating compliance during audits.
Training and Awareness
Continuous employee training on cybersecurity best practices and compliance requirements is
essential for fostering a security-aware culture within the organization.
Risk Management
Implementing a risk management process to identify, assess, and mitigate cybersecurity risks is
fundamental for both compliance and effective security.
3.5 Cyber threats, cyber-attacks and cyber attackers
1. Cyber Threats
Cyber threats are potential malicious activities that aim to compromise or damage digital information
systems, networks, or devices. They target vulnerabilities in software, hardware, or human behavior
to steal data, disrupt services, or cause harm. Cyber threats can be categorized into several types:
Malware: Software designed to harm or exploit a system, including viruses, trojans, spyware, and
ransomware.
18
Phishing: Fraudulent attempts to obtain sensitive information, often by impersonating trustworthy
entities through emails or fake websites.
Ransomware: A type of malware that encrypts files, demanding payment (ransom) in exchange for
decrypting them.
Insider Threats: Employees or individuals with access to sensitive data who intentionally or
unintentionally cause harm.
Zero-day Exploits: Attacks that occur before a software vulnerability is known and patched.
Man-in-the-Middle (MITM): Attacks where a hacker intercepts communication between two parties
to steal or alter data.
23
CHAPTER-4: ACTIVITY LOG AND REPORT
ACTIVITY LOG FOR THE FIRST WEEK: - (09/01/2024-14/01/2024)
24
ACTIVITY LOG FOR THE SECOND WEEK: - (15/01/2024 - 20/01/2024)
25
ACTIVITY LOG FOR THE THIRD WEEK: (21/01/2024 – 26/01/2024)
26
ACTIVITY LOG FOR THE FOURTH WEEK: (27/01/2024 – 01/02/2024)
Day Brief description of the Learning Outcome
& daily activity
Date
Day-1 Summarize efforts in refining
Model Tuning and and optimizing the chosen
27/01/2024 Optimization model.
Day-2 Discuss the outcomes of the
28/01/2024 Validation Results model validation, including any
challenges faced and solutions
implemented.
Day-3 Detail any feedback received
Feedback Incorporation from stakeholders or team
29/01/20240 members.
Day-4 If relevant, discuss efforts to
Model Interpretability interpret the model, including
30/01/2024 the exploration of feature.
Day-5 Report on any updates made to
Documentation Updates project documentation.
31/01/2024
Day-6 Summarize any client or
Communication and stakeholder communication
01/02/2024 Reporting during the week.
27
ACTIVITY LOG FOR THE FIFTH WEEK: (02/02/2024 – 07/02/2024)
Day Brief description of the Learning Outcome
& daily activity
Date
Day-1 Summarize the final steps in
Final Model model development, including
02/02/2024 Development any additional optimizations or
adjustments made based on
feedback and validation
results.
Day-2 Present the final evaluation
Model Evaluation metrics for the model.
03/02/2024
Day-3 Outline the plan for deploying
Model Deployment Plan the model into a production
04/02/2024 environment.
Day-4 Confirm that all project
Documentation documentation is up-to-date,
05/02/2024 Finalization including the data dictionary.
Day-5 Summarize any presentations
Client or Stakeholder or demonstrations made to
06/02/2024 Presentation clients or stakeholders during
the week.
Day-6 Share insights gained from the
Lessons Learned project, including challenges
07/02/2024 faced and lessons learned.
28
ACTIVITY LOG FOR THE SIXTH WEEK: (08/01/2024 – 13/02/2024)
Day Brief description of the Learning Outcome
& daily activity
Date
Day-1 Summarize the steps taken to
deploy the model into a
Model Deployment
08/02/2024 production environment.
29
ACTIVITY LOG FOR THE SEVENTH WEEK: (14/02/2024 – 19/02/2024)
Day Brief description of the Learning Outcome
& daily activity
Date
Day-1 Summarize the analysis of the
model's performance in the
Post-Deployment Analysis
14/02/2024 production environment.
30
ACTIVITY LOG FOR THE EIGHT WEEK: (20/02/2024 – 25/02/2024)
31
ACTIVITY LOG FOR THE NINETH WEEK: (26/02/2024 – 02/03/2024)
32
ACTIVITY LOG FOR THE TENTH WEEK: (03/03/2024 – 08/03/2024)
33
WEEKLY REPORT
Detailed Report:
• Ability to collect user data contributed by the ourselves
• How to became cyber security specialists to help defeat the cyber criminals that threaten the cyber
world Threats are particularly dangerous to certain industries and the records they must
maintain.
• Greater attention to detection and isolation of cyber-attacks, cyber criminals must be more careful
Security provisioning, operate, collect and analyses etc.,
• Inspired and motivated by cyber security professionals.
34
WEEK–2 (From Dt:15-01-2024 To Dt:21-01-2024)
Objective: Objective of the Activity Done: Project Setup, Data Cleaning and Preprocessing, Data
Analysis (EDA), Model Selection
Detailed Report:
• Describe the steps taken to set up the project environment, including tools, libraries, and data
sources.
• Summarize the data collected for the project.
• Summarize the keyinsights gained from the initial EDA. Includevisualizations and trends
35
WEEK–3 (From Dt:21/01/2024 to Dt:26/01/2024)
Objective of the Activity Done: Data Refinement, Feature Engineering, Model Development,
Validation Strategy
Detailed Report:
• Detail any further steps taken in data cleaning and preprocessing. Address specific
challenges encountered and describe the decisions made.
• Outline any feature engineering performed during Week 2 and the rationalebehind those
choices.
• Summarize progress in model development. Include insights gained, initialmodel
training results, and any adjustments made.
Describe the chosen validation strategy and anyinsights gained from validation results.
36
WEEK–4 (From Dt:27/01/2024 to Dt:01/02/2024)
Objective of the Activity Done: Model Tuning and Optimization, Validation Results,
Feedback Incorporation, Model Interpretability
Detailed Report:
37
WEEK–5 (From Dt:02/02/2024 to Dt:07/02/2024)
Objective of the Activity Done: Final Model Development, Model Evaluation, Model
Deployment Plan, Documentation Finalization.
Detailed Report:
• Outline the plan for deploying the model into a production environment.Include
considerations for scalability, monitoring, and maintenance.
38
WEEK–6 (From Dt:08/02/2024 to Dt:13/02/2024)
• Confirm that all project documentation is finalized and comprehensive. Ensurethat it includes
deployment instructions, model monitoring procedures, and any other relevant details.
• Summarize any additional communications with clients or stakeholders Discuss any feedback
received and actions taken.
39
WEEK–7(FromDt:14/02/2024 to Dt:19/02/2024)
Detailed Report:
• Provide a final evaluation of the project's success against the initial goals andobjectives. Discuss
any key insights, achievements, or areas for improvement.
40
WEEK–8(FromDt:20/02/2024 to Dt:25/02/2024)
Objective of the Activity Done: Continued Monitoring and Analysis,User Feedback and Final
Iterations, Knowledge Transfer Confirmation, Final ProjectEvaluation.
Detailed Report:
• Summarize ongoing monitoring and analysis of the model's performance in theproduction
environment.
• If applicable, discuss any final user feedback received and the last iterations orimprovements
made to the model or system.
• If applicable, confirm that knowledge transfer activities are completed.
• Revisit the project's initial goals and objectives. Provide a final evaluation ofthe project's overall
success and discuss any lessons learned.
41
WEEK–09(FromDt:26/02/2024 to Dt:02/03/2024)
Detailed Report:
• the project's overall success and discuss any valuable insights gained.
42
WEEK–10(FromDt:03/03/2024 to Dt:08/03/2024)
Detailed Report:
• Summarize ongoing analyses of the model's performance in the production environment. Discuss
any optimizations or adjustments made based on continued monitoring.
• If applicable, discuss any additional user feedback received and the iterations or improvements
made to the model or system.
• If applicable, confirm the completion of any knowledge transfer activities Ensure that team
members
• Revisit the project's initial goals and objectives. Provide a final evaluation of
• the project's overall success and discuss any valuable insights gained.
43
CHAPTER 5: OUTCOMES DESCRIPTION
Technical Skills:
Programming Languages:
Python: Widely used for data manipulation, analysis, and machine learning. Libraries likeNumPy,
Pandas, and sickie - learn are commonly employed.
R: Used for statistical modeling and analysis. Popular in academia and certain industries.
Data Visualization:
Matplotlib: A 2D plotting library for Python.
Seaborn: Built on top of Matplotlib, Seaborn provides a high-level interface for drawingattractive
and informative statistical graphics.
Platy: An interactive graphing library for Python.
Machine Learning:
Sickie-learn: A machine learning library for classical algorithms and tools for data mining anddata
analysis.
Tensor Flow and Porch: Deep learning frameworks widely used for neural networkdevelopment.
Statistical Analysis:
Statistics: A solid understanding of statistical concepts is crucial for hypothesis testing,confidence
intervals, and data interpretation.
Database Management:
SQL: Proficiency in querying relational databases using SQL is essential.
NoSQL databases: Understanding and working with non-relational databases like MongoDBor
Cassandra.
44
Business Skills:
Domain Knowledge:
Industry Understanding: Familiarity with the specific industry or domain the organization operates
in is crucial for interpreting data in a meaningful business context.
Communication Skills:
Data Storytelling: The ability to convey complex findings in a clear and compellingmanner to non-
technical stakeholders.
Visualization Communication: Effectively using visualizations to convey insights toboth technical
and non-technical audiences.
Problem-Solving:
Critical Thinking: The capacity to approach problems with a logical and analyticalmindset.
Decision-Making: Contributing to decision-making processes by providing data-driveninsights.
Collaboration:
Interdisciplinary Collaboration: Working effectively with professionals from diverse fields,
including business analysts, executives, and IT teams.
Teamwork: Collaborating with cross-functional teams to achieve common goals.
Return on Investment (ROI) Analysis: Assessing the potential impact and value ofdata science
initiatives.
Project Management:
Project Planning: Effectively planning and organizing data science projects.
45
CHAPTER 7: CONCLUSION
Zero Trust Cloud Security is a modern security framework that ensures secure access to cloud
environments by eliminating the notion of inherent trust within a network. Unlike traditional
security models that rely on a strong perimeter, Zero Trust treats all users, devices, and applications
as potential threats, requiring verification and continuous monitoring at every access point.
Key Components of Zero Trust Cloud Security:
Continuous Verification ("Never Trust, Always Verify"): Every request to access data or
resources must be verified, regardless of whether it originates from inside or outside the network.
This includes robust identity verification through multi-factor authentication (MFA), device
health checks, and user context analysis.
1. Least Privilege Access: Users are granted the minimal level of access necessary to perform their
tasks. This principle ensures that even if a user or device is compromised, they cannot access more
than what is required, reducing the potential impact of an attack.
2. Micro-Segmentation: Instead of securing the entire cloud network with a single perimeter,
micro-segmentation breaks the network into smaller zones, each with its own access policies. This
prevents lateral movement within the cloud, containing threats to one part of the network if an attack
occurs.
3. Endpoint Security and Device Trust: In a Zero Trust model, every device accessing the cloud
is treated as untrusted until proven otherwise. Endpoint detection and response (EDR) tools,
alongside device health checks, ensure that only secure and compliant devices can connect to the
network.
4. Real-Time Monitoring and Analytics: Zero Trust requires ongoing monitoring of network
traffic, user behavior, and system logs. Anomalous activity, such as unusual login attempts or
unauthorized access requests, can be flagged and responded to in real time, ensuring threats are
quickly addressed.
5. Encryption and Secure Access: Data is encrypted both in transit and at rest to protect it from
unauthorized access or exposure during transmission across cloud environments. All
communications are secured through encryption protocols like TLS and VPNs for remote access.
6. Assume Breach Mentality: Zero Trust operates with the mindset that breaches are inevitable.
This means preparing for the worst-case scenario and focusing on minimizing the impact of any
compromise. Regularly auditing systems, improving detection capabilities, and having an incident
response plan in place are critical to reducing breach effects.
46
Challenges:
Complex Implementation: Transitioning from a traditional security model to a Zero Trust
architecture requires significant planning, resource investment, and a clear strategy for integrating
existing infrastructure.
Continuous Management: Zero Trust is not a "set it and forget it" solution. It demands ongoing
monitoring, updates, and adjustments to policies as users and devices change.
Initial Costs: Adopting a Zero Trust approach can involve substantial upfront costs related to
upgrading systems, purchasing new security tools, and training personnel.
47
Student Self Evaluation for the Summer Internship
1) Oral Communication 1 2 3 4 5
2) Written Communication 1 2 3 4 5
3) Initiative 1 2 3 4 5
5) Attitude 1 2 3 4 5
6) Dependability 1 2 3 4 5
7) Ability to learn 1 2 3 4 5
9) Professionalism 1 2 3 4 5
10) Creativity 1 2 3 4 5
12) Productivity 1 2 3 4 5
15) OVERALLPERFORMANCE 1 2 3 4 5
Date of Evaluation :
Please note that your evaluation shall be done independent of the student’s self-evaluation
1) Oral Communication 1 2 3 4 5
2) Written Communication 1 2 3 4 5
3) Initiative 1 2 3 4 5
5) Attitude 1 2 3 4 5
6) Dependability 1 2 3 4 5
7) Ability to learn 1 2 3 4 5
9) Professionalism 1 2 3 4 5
10) Creativity 1 2 3 4 5
12) Productivity 1 2 3 4 5
15) OVERALLPERFORMANCE 1 2 3 4 5