Create for managers approving new access

Assignment Help Basic Computer Science
Reference no: EM131167142

Security and compliance are interconnected in important ways. What happens if you have a policy, but you cannot assure compliance? There is no automated enforcement mechanism. You cannot be sure if policy is followed or not.

To gain a deeper appreciation for the relationship between security and compliance, consider the following scenario:

In an organization, managers are allowed to add users to Active Directory groups, which potentially grant them access to sensitive data on file shares. There are security policies and regulations that state that this access must be reviewed quarterly to ensure that only approved people have access to certain types of sensitive data. Sometimes, when people change jobs, their access may not be removed properly, so controls need to be put in place to demonstrate that the organization is doing a good job of meeting security and regulatory requirements.

Access requirements can change frequently, and at a large organization this can become very difficult to manage. When an employee moves from one job to another in the same organization, someone must change their level of access to certain resources. A manager should approve this change, and there should be quarterly metrics that show how managers are reviewing access levels for employees, and modifying access, as needed.

For this Discussion, in 250-400 words, address the following:

For the given scenario, recommend two policies that you would create for managers approving new access and for monitoring that access. In recommending these policies, make sure they are appropriate for the employees and are in accordance with the organizational policy for approving and monitoring access. Discuss the artifacts you would generate, as a part of these policies, to demonstrate compliance.

Reference no: EM131167142

Questions Cloud

Webcam or computer microphone to spy on them : What does the Law say about using someone's Webcam or Computer Microphone to spy on them?
How many firms will there be in the kite industry : Suppose that the demand for kites is given by the formula Q = 8000 - 50P, where Q is the quantity demanded and P is the price. How many kites will be sold? How many firms will there be in the kite industry
Against net neutrality : 2. Discuss whether or not you are for or against Net Neutrality. Support your position.
Discuss the behavior of given function : Graph this probability versus n for n equal to multiples of 50 up to 1000. - Discuss the behavior of this function and why it behaves as it does.
Create for managers approving new access : For the given scenario, recommend two policies that you would create for managers approving new access and for monitoring that access. In recommending these policies, make sure they are appropriate for the employees and are in accordance with the ..
Determine whether an undirected graph is bipartite : How can you determine whether an undirected graph is bipartite?
The implementation of trakstar into company : As a Project Manager of the implementation of Trakstar into a company with a large amount of employees. Trakstar is a cloud-based platform software that allows Human Resources and managers alike manage feedback, goals, performance reviews, recruiting..
Registering a domain name : What is the provision to change the registrars after registering a domain name?
Probability that at least nine batches will pass inspection : Comdell Computer receives computer chips from Chipco.- What is the probability that at least nine of the batches will pass inspection?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain most of the various models of the shinkansen

Most of the various models of the Shinkansen, Japan's high-speed trains, travel between 240 km/h and 285 km/h. The two exceptions are the Shinkansen "0" series, which began service in 1964, and the new "500" series, which began service in 1997. Se..

  Design a program, in python,

Design a program, in python, that allows the user to enter 20 names into a string array. Sort the array in ascending (alphabetical) order and displays its contents.

  General syntax of an sql

In a VBScript SQL Query statement, what Boolean operator can be used to test a set of conditions whereby all conditions must be true?

  What is the numeric value of the string

What is the numeric value of the string for the following values of y? Note that the value of k is implied; e.g.for case i, k=3, etc. i: 101 ii: 10101 iii: 000111

  Share your ideas and thoughts

When a hacker attacks a system, his primary concern is to erase any kind of digital footprints, which makes him invisible. The data recovery completely depends upon the intensity of the attack. With modern algorithms and data recovery techniques, ..

  Modern religion and technology

Would you agree that science is a modern religion and technology its gift? Did Dr. Frankenstein cross some metaphysical line when he created his monster?

  Application development and programming languages

Compare and contrast object-oriented languages (Java, C++, C#, etc.) to imperative languages (C, Pascal, etc.) in terms of: Programmability, Maintainability, Performance, Development tools

  Compare and contrast the following types of applications

Assignment:In 1-2 pages, compare and contrast the following types of applications: Web-Based Applications Mainframe Client-Server

  The main goal of any business communication

The main goal of any business communication is to determine what message needs to be delivered, and how to deliver it clearly and concisely to the intended audience.

  Information technology is the process of using computers or

information technology is the process of using computers or computing devices to obtain and handle information and

  Create a behavioral description of a full-adder

First create a behavioral description of a full-adder, and then use the full-adder component in your carry-ripple adder

  Construct an e-r diagram for a car insurance company

Each payment is for a particular period of time, and has an associated due date, and the date when the payment was received.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd