Project - prepare a local it security policy

Assignment Help Computer Network Security
Reference no: EM13952374

Project: Prepare a Local IT Security Policy

Introduction

In Project 1, you developed an outline for an enterprise level IT security policy. In this project, you will write an IT security policy which is more limited in scope - a local IT security policy. This policy will apply to a specific facility - a data center. Your policy must be written for a specific organization (the same one you used for Project #1). You should reuse applicable sections of Project #1 for this project (e.g. your organization overview and/or a specific section of your outline).

If you wish to change to a different organization for project #2, you must first obtain your instructor's permission.

Your local IT security policy will be used to implement access control for the information, information systems, and information infrastructure (e.g. networks, communications technologies, etc.) which are housed within the data center. Your policy must protect the data center by preventing personnel who are not authorized to access or use the resources of the organization from gaining access and potentially causing harm (e.g. loss of confidentiality, integrity, or availability). Such personnel may include employees, contractors, vendors, and visitors. You should also address unauthorized individuals who may attempt to gain access to the facility, its information systems, or its networks.

Your policy is being written by you as the facility manager. In this role, you are also the information system owner (ISO) for all IT systems and networks within the data center. The information systems hosted in the data center are shown in Figure 2-1.

The primary audience for your policy is the Tier 1 staff responsible for day-to-day operations and maintenance in the data center. Your policy will be communicated to other personnel and to the senior managers who are ultimately responsible for the security of the organization and its IT assets. These managers include: CEO, CIO/CISO, and CSO.

Research:

1. Research the subject of access controls and control measures (security controls) required for a data center. Suggested control measures are listed in Table 2-1.Use the IT architecture shown in Figure 2-2 to identify the types of systems and networks which must be secured against unauthorized access.

Table 2-1. Access Control Measures for a Data Center

  • Access Control Decisions
  • Access Enforcement
  • Account Management
  • Concurrent Session Control
  • Data Mining Protection
  • Information Sharing
  • Least Privilege
  • Permitted Actions without Authentication
  • Previous Logon (Access) Notification
  • Publicly Accessible Content
  • Reference Monitor
  • Remote Access
  • Security Attributes
  • Session Lock
  • Session Termination
  • System Use Notification
  • Unsuccessful Logon Attempts
  • Use of External Information Systems

2. Using Figure 2-2, identify at least five specific types of information which are likely to be stored within the data center (use your organization's missing, products, and services). Research the types of access controls which must be provided to protect the confidentiality, integrity, and availability of such data. (Remember to consult Table 2-1.)

Figure 2-2. Data Center IT Architecture Diagram

1028_data centre.png

Write:

1. Use the following outline to prepare your local IT security policy for the data center. See the policy template / sample file (attached to the assignment entry) for formatting and content suggestions for individual sections.

I. Identification
a. Organization: [name]
b. Title of Policy: Data Center Access Control
c. Author: [your name]
d. Owner: [role, e.g. Data Center Manager]
e. Subject: Access Control for [data center name]
f. Review Date: [date submitted for grading]
g. Signatures Page: [authorized signers for the policy: CEO, CISO, Data Center Manager]
h. Distribution List
i. Revision History

II. Purpose
a. Provide a high level summary statement as to the policy requirements which are set forth in this document.

III. Scope
a. Summarize the information, information systems, and networks to be protected.
b. Identify who is required to comply with this policy. See the project description for categories of personnel and other individuals.

IV. Compliance
a. Identify the measures which will be taken to ensure compliance with this policy (e.g. audits, compliance reporting, exception reporting, etc.)
b. Identify the sanctions which will be implemented for compliance failures or other violations of this policy.
c. Include information about how to obtain guidance in understanding or interpreting this policy (e.g. HR, corporate legal counsel, etc.)

V. Terms and Definitions

VI. Risk Identification and Assessment
a. Using Figure 2-1, identify potential control weaknesses, threats, and vulnerabilities ("risks") which could negatively impact the information, information systems, and information infrastructure for the data center.
b. Identify and discuss the level of risk associated with the identified weaknesses, threats, and vulnerabilities.
c. Identify the control measures which will be implemented to mitigate or otherwise address each risk or risk area.

VII. Policy
a. For each control measure, write a policy statement ("Shall" wording) which addresses the implementation of that control. (See Table 2-1.)
b. Include an explanatory paragraph for each policy statement.

2. Prepare a Table of Contents and Cover Page for your policy. Your cover page should include your name, the name of the assignment, and the date. Your Table of Contents must include at least the first level headings from the outline (I, II, III, etc.).

3. Prepare a Reference list (if you are using APA format citations & references) or a Bibliography and place that at the end of your file. (See Item #3 under Formatting.) Double check your document to make sure that you have cited sources appropriately.

Reference no: EM13952374

Questions Cloud

Describe the gui and command line utilities : Describe the GUI and command line utilities that you might use in creating and managing users, assigning them to global groups, assigning the global groups to domain local groups and granting domain local groups permissions, should Habibi's grow t..
How might bpr be used in your organization : Discuss why a company would purchase a system rather than build it themselves.
Determine the minimum size for the secondary mirror : Determine the minimum size for the secondary mirror so that it collects all the light from a 200mm diameter mirror operating at f/6 for objects subtending up to 0.5 degrees. What is the focal length of an eyepiece that will give you an exit pupil ..
Nonrenewable resources towards developing : Today, more than any other time in history, there is growing support to move away from nonrenewable resources towards developing renewable resources to meet current and future energy needs. Fossil fuels are nonrenewable resources that continue to ..
Project - prepare a local it security policy : Project: Prepare a Local IT Security Policy- In Project 1, you developed an outline for an enterprise level IT security policy. In this project, you will write an IT security policy which is more limited in scope - a local IT security policy
Create an announcement of the new system : Create an announcement of the new system roll out that includes the benefits to users.
Description about a weekly environmental event : Write a brief description about a weekly environmental event. This can be a weather event, release of new research findings, environmental monitoring or measurement results, or other type of activity specifically related to: Earth science: Environ..
What is the equivalent capacitance between points a and b : What is the equivalent capacitance between points a and b? If a battery of voltage 35.0 volts is connected across points a and b, what voltage will appear across the capacitor identified with a star?
Why is it important to know how to check your bandwidth : Test your current bandwidth and write down the results

Reviews

Write a Review

Computer Network Security Questions & Answers

  Evaluate quality of security offered by micropayment system

Briefly describe how it works. Evaluate the quality of security offered by this micropayment system and evaluate one such micropayment system.

  Security weaknesses

In this phase you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. You will then identify potential security weaknesses

  Discuss the terms confidentiality and integrity

Discuss the terms confidentiality, integrity, and availability as they relate to information systems. Why are they important

  Abc institute of research has sensitive information that

abc institute of research has sensitive information that needs to be protected from its rivals. the institute has

  Communicate together securely

There are two offices in different locations that must communicate together securely.

  Explain how files on the network may be accessed by lsdg

Explain how files on the network may be accessed by LSDG

  Appraise the individual and organizational consequences of

1.compare and contrast the mis in place in two distinctly different organizations.2.compare each organizations use of

  Research paper on the privacy and on financial services

You need to work on the privacy and on financial services. For example Mint, Its an app also online access to keep track of your financial use in a month.

  Determine the suitability of certification

Determine the suitability of certification. Justify by using threat identification and provide risk assessment for this organisation.

  Reasonable to compute rsa signature on long message

Would it be reasonable to compute an RSA signature on a long message by first finding what the message equals, mod n, and signing that?

  Design an algorithm to achieve the byzantine agreement

Design an algorithm to achieve the Byzantine Agreement for the case that there are four processes, amongst which one is corrupted. You should not use public key cryptography for your algorithm (200 words)

  Examine the different levels of security

Examine the different levels of security and how an organization can provide the proper level of effort to meet each information security need and how this relates to what is in an organization's information security policy

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd