Preview

Unit 2 Assignment 2

Powerful Essays
Open Document
Open Document
1463 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 2 Assignment 2
An access control policy should be established, documented and periodically reviewed, based on business needs and external requirements. Access control policy and associated controls should take account of:
- Security issues for particular data systems and information processing facilities, given business needs, anticipated threats and vulnerabilities;
- Security issues for particular types of data, given business needs, anticipated threats and vulnerabilities;
- Relevant legislative, regulatory and certificatory requirements;
- Relevant contractual obligations or service level agreements;
- Other organizational policies for information access, use and disclosure; and
- Consistency among such policies across systems and networks.

Access control policies generally should include:
- Clearly stated rules and rights based on user profiles;
- Consistent management of access rights across a distributed/networked environment;
- An appropriate mix of administrative, technical and physical access controls;
- Administrative segregation of access control roles -- e.g., access request, access authorization, access administration;
- Requirements for formal authorization of access requests
- Requirements for authorization and timely removal of access rights ("de-provisioning").

The following procedure guide would allow Ken 7 Windows Limited IT department to easily manage their access control changes:

Policy
Ken 7 Windows Limited has chosen to adopt the Access Control principles established in NIST SP 800-53 “Access Control,” Control Family guidelines, as the official policy for this domain. The following subsections outline the Access Control standards that constitute Ken 7 Windows Limited policy. Each Ken 7 Windows Limited Business System is then bound to this policy, and must develop or adhere to a program plan which demonstrates compliance with the policy related the standards documented.

Access Control Procedures: All Ken 7 Windows Limited Business

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Jennifer works in the Sales Department by day and part-time as the evening accounts payable clerk with credit memo privileges to correct customer orders. Jennifer is a valuable asset for the organization. Since she joined the accounts payable department, the late payment rate has dropped by 20 percent while the warehouse-shipping rate increased by 10 percent, and the overall profit has increased by a modest amount of 0.005 percent for the first reporting period.…

    • 1078 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    All access control requirements are commensurate with the user’s duties at a particular incident. For DNS, access control is implemented in accordance with the following principles:…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

    Page 5 Additional Information  Client preferences • How client conducts business  Data expectations • Format and delivery mechanism  Process expectations • “How things should work” IS4799 Information Systems and Cybersecurity Capstone Project © ITT Educational Services, Inc. All rights reserved.…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Limit unauthorized use of network resources by allowing access during businiess hours only. Do not allow remote access permitions to anyone, except those that…

    • 563 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 9 Assignment 1

    • 582 Words
    • 2 Pages

    - Ensure compliance requirements of this policy concerning data at rest and role-holders access to managed networks, systems and servers…

    • 582 Words
    • 2 Pages
    Good Essays
  • Good Essays

    access control entry (ACE)/ An entry in an object’s access control list (ACL) that grants permissions to a user or group. Each ACE consists of a security principal (the name of the user, group or computer being granted the permissions) and the specific permissions assigned to that security principal. When you manage permissions in any of the Windows Server 2008 permission systems, you are creating and modifying the ACEs in an ACL.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Powerful Essays

    Winsec2E Lab02 AW

    • 294 Words
    • 2 Pages

    4. List at least three different types of access control permissions you can enable for…

    • 294 Words
    • 2 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Is3230 Project Description

    • 2573 Words
    • 19 Pages

    Relate how an access-control policy framework is used to define authorization and access to an…

    • 2573 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    IS 3340 FINAL EXAM QUESTIONS

    • 1651 Words
    • 13 Pages

    4. Which among the following is the best reason to define security groups while configuring access…

    • 1651 Words
    • 13 Pages
    Powerful Essays