Reference no: EM132385297
Question: CIS 608 Information Security Management, Bellevue University
Requirements: Refer to the attached SAP Template.
1. Complete the first 2 tabs with the information from your chosen RMF scenario, building on the Categorization and Controls. Please find attached files.( Categorization and Controls.pdf and Minimim_hardware_software.docx)
Section 2.0 - Complete all fields in this tab, ensuring consistency with the 'Assessment Architecture' tab.
Section 2.1 - List each assessment method that will be executed as part of the Security Assessment Plan in the "Test Battery" column. List all hosts with the method that will be used to assess in the "Test Target" column; this field should include every target hostname, whenever applicable. Include the verification method that will be used by the validator and how the results/output will be captured in the corresponding fields.
2. Based on your system's hardware and software list, determine which STIGs will be applied in RMF Step 3.
Information related to above question is enclosed below:
Attachment:- SAPTemplate.rar