Assessment report from the previous initiative

Assignment Help Business Management
Reference no: EM132096440

Task 1

Word count for charter:  2500 words - 1.5 spacing, wide margins, page numbers.

Presentation length:  12 slides, including title slide

Referencing Requirements:

  • Must use at least 6 scholarly journals (peer reviewed) - not trade journals
  • Must use 3 trade journal.
  • Must use 6 references from a variety of government reports/ releases, non-for-profit reports, media articles, website.
  • APA 6th Edition Referencing
  • Plagiarism Report provided.

Task

Using the Threat and Risk Assessment Report from the previous initiative (information provided at end in yellow) devise an Information Security Roadmap that selects and articulates the business benefit for 5 individual Information Security Initiatives for EvolveNet. The Information Security Initiatives must involve the implementation of controls that provide the most benefit to the organisation. Controls can be in the form of administrative, technical,

The Information Security Roadmap consists of two deliverables:

1. An Information Security Roadmap Charter Document

2. An Information Security Roadmap Executive Presentation

Information Security Roadmap Charter Document

The charter document must contain a section for each selected initiative that articulates the following:

  • Introduction (including business problem/threat scenario)
  • Scope
  • Business benefits
  • Functional business requirements
  • Key success indicators
  • Required resources
  • Indicative budget
  • Two possible products and technical solutions - have provided 1 already- CyberArk
  • Estimated delivery timeframe

The document clearly describes initiatives and the benefit to the business. Initiative costs and resources are realistic. Selected solutions satisfy business requirements, align with strategy and demonstrate knowledge of the organisation.

Each recommendation must be defined, referenced as evidence as a valid control.

Information Security Roadmap Executive Presentation

The executive presentation must contain:

  • An introductory slide summarising the overall intent of the Information Security Roadmap
  • A slide for each initiative that contains:
  • Initiative executive summary (business problem and benefit)
  • Initiative solution summary
  • A graphic or image representing the initiative
  • Estimated costs and resources
  • A slide summarising all initiatives in a single list (including total roadmap costs)

The document clearly describes and illustrates the selected initiatives. Initiative costs and resources are realistic. Initiatives address risks and align with business strategy. The presentation provides a compelling argument for initiative implementation.

NOTE: EXTRACT FROM TRA - utilise the yellow highlight as the basis of the 5 initiatives. More detail has been provided to assist with some of the requirements, success indicators, implementation etc.

Recommendations / Initiatives from Threat and Risk Assessment Report

  • ISSUE 1 - Privileged Access Management:
    • Unauthorised access into privileged assets (systems, applications and data) test or development environment is occurring. No separation.
    • Access privileges have not been validated regularly or logged to ensure reasonable justification/ need still exists.

Recommendations

o   Conduct a privileged access management audit exercise (including review of remote access)

o   Implement a privileged access management automated tool (CyberArkPAM) - single identities issued (not group/shared) and rules based on defined factors. Privileged users are forced to use multi-factor authentication.

o   Design network segmentation and boundaries restricting network isolation requirements and restricting access to production and non-production environment using production credentials.

o   Release policies, processes and procedure documentation and training sessions for personnel.

o   Develop and run interface for all logs to be collected into Security Information and Event Management tool and for privileged access changes to be monitored.

o   Conduct regular reviews and audit of privileged access ensuring requirement is still valid.

  • ISSUE 2 - Portable assets (such as laptops, tablets, mobile devices) are issued without being logged in inventory.Not all workstations have antivirus installed and there are no technical controls to restrict software installation or access to web/internet facing services.

Recommendations

o   Conduct asset management audit exercises - baselining assets.

o   Develop and implement an automated asset management tool or list.

o   Centralise management and standardise (install or update) operating systems, applications, configurations, release of antivirus, patching and changes all centrally managed by Security. This includes hardening.

o   Consider restricting the use of web-based email and social media to limited number of staff members or consider SSL/TLS inspection.

o   Implement Host-based intrusion detection/prevention system (HIDS/HIPS)

o   Implement Endpoint Detection and Response (EDR) software to improve intrusion detection capability. EDR logs and generates a continuous stream of event data and other system telemetry to the SIEM to improve incident detection and response timeline.

o   Implement Data Loss Prevention tool to avoid risk of business interruption, loss and theft.

o   Release policies, processes and procedure documentation and training sessions for personnel.

o   Develop and run interface for all logs to be collected into Security Information and Event Management (SIEM) tool and for asset changes to be monitored.

o   Set up rules and alerts for anomalous behaviour on assets.

o   Conduct regular reviews of assets to ensure compliance.

  • ISSUE 3 - Event logs have no protection from alteration.

Recommendations

  • Review security protocols for logs (including creation, capturing, transfer and storage).
  • Change access control, denying changes to logs (including develop/modify Group Policies for Windows).Create rule/s and alert/s for any modification and directly interface with the SIEM.
  • Document and socialise changes as required (including incident response scenario).
  • Communicate disciplinary procedures to personnel to ensure awareness of unauthorised behaviour.
  • ISSUE 4 - Sensitive information from customers is routinely sent vie email and instant messaging applications.

Recommendations

  • Deny/disable copy and paste functionality of sensitive/customer data.
  • Encrypt email and chat applications.
  • Communicate and distribute policies, processes and procedures through training and awareness sessions (particularly around data sensitivity, disciplinary actions). Run security awareness campaigns for phishing, malware etc.
  • Check location of e-mail server and functionality (behind a firewall on a different network segment) employing demilitarized zone (DMZ).
  • Run email and malware scanning on email applications.
  • Implement Domain-base Message Authentication Reporting and Conformance (DMARC) and Domain Keys Identified Mail (DKIM) to improve email threat identification. Implement a behaviour-based capability to sandbox, analyse and potentially block transmission of data containing malicious software rather than relying on signature-based identification of malware - before breaching the network perimeter.
  • ISSUE 5 - Unauthorised physical access can occur due to lack of enforcement.

Recommendations

  • Review extant physical security controls, perimeters and boundaries.
  • Implement changes as necessary (including smart card physical auto-log in/outs).
  • Biometric and access control cards for infrastructure, production environments - controlled identity and access management solution.
  • Implement defence-in-depth perimeters.
  • Develop interface for logs to be sent to Physical Control system + SIEM
  • Conduct regular exercises to raise user/ personnel awareness and penalties.

Reference no: EM132096440

Questions Cloud

Identify the composition of target market : Your team is looking for a way to make some revenue as either a for-profit or not-for-profit organization. This organization can market locally.
Create the research section of your marketing plan : To develop effective relationship marketing, a company must first understand its targeted consumers' buying influences and behaviors.
Topic improving fall risk in nursing homes : Taking the annotations you have so far (at least 50), draft a composition that incorporates all of your annotations.
Websites for information on your chosen health issue : For the next newsletter, you have been asked to provide information about the role of government in public health.
Assessment report from the previous initiative : Using the Threat and Risk Assessment Report from the previous initiative (information provided at end in yellow) devise an Information Security Roadmap
What is a potential disadvantage of this methodology : Critical path methodology allows managers to focus on a group of tasks within a project. What is a potential disadvantage of this methodology?
Strategic implications of pursuing internal growth strategy : Discuss the strategic implications of pursuing an internal growth strategy versus growth through M&A deals (mergers and acquisitions).
Discuss about the way drugs affect the brain : Create a 7-12-slide PowerPoint Presentation about the way drugs affect the brain. Include the following in your presentation.
What does the published literature say about the issue : Use the University Library to investigate the claim. What does the published literature say about the issue you are investigating?

Reviews

Write a Review

Business Management Questions & Answers

  Caselet on michael porter’s value chain management

The assignment in management is a two part assignment dealing 1.Theory of function of management. 2. Operations and Controlling.

  Mountain man brewing company

Mountain Man Brewing, a family owned business where Chris Prangel, the son of the president joins. Due to increase in the preference for light beer drinkers, Chris Prangel wants to introduce light beer version in Mountain Man. An analysis into the la..

  Mountain man brewing company

Mountain Man Brewing, a family owned business where Chris Prangel, the son of the president joins. An analysis into the launch of Mountain Man Light over the present Mountain Man Lager.

  Analysis of the case using the doing ethics technique

Analysis of the case using the Doing Ethics Technique (DET). Analysis of the ethical issue(s) from the perspective of an ICT professional, using the ACS Code of  Conduct and properly relating clauses from the ACS Code of Conduct to the ethical issue.

  Affiliations and partnerships

Affiliations and partnerships are frequently used to reach a larger local audience? Which options stand to avail for the Hotel manager and what problems do these pose.

  Innovation-friendly regulations

What influence (if any) can organizations exercise to encourage ‘innovation-friendly' regulations?

  Effect of regional and corporate cultural issues

Present your findings as a group powerpoint with an audio file. In addition individually write up your own conclusions as to the effects of regional cultural issues on the corporate organisational culture of this multinational company as it conducts ..

  Structure of business plan

This assignment shows a structure of business plan. The task is to write a business plane about a Diet Shop.

  Identify the purposes of different types of organisations

Identify the purposes of different types of organisations.

  Entrepreneur case study for analysis

Entrepreneur Case Study for Analysis. Analyze Robin Wolaner's suitability to be an entrepreneur

  Forecasting and business analysis

This problem requires you to apply your cross-sectional analysis skills to a real cross-sectional data set with the goal of answering a specific research question.

  Educational instructional leadership

Prepare a major handout on the key principles of instructional leadership

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd