A. System Security Monitoring Policy 3installation and configuration of new hardware parts, migration of existing data and apps tothe new infrastructure, implementation of a robust disaster recover and backup system,implementation of a network security system, configuration of user controls, development ofa comprehensive training program, and post-implementation maintenance and support. The following three items are exempted […]
To start, you canA. System Security Monitoring Policy
3
installation and configuration of new hardware parts, migration of existing data and apps to
the new infrastructure, implementation of a robust disaster recover and backup system,
implementation of a network security system, configuration of user controls, development of
a comprehensive training program, and post-implementation maintenance and support.
The following three items are exempted from the policy’s scope: recruitment of additional
contractors or state to support the use of the infrastructure, changes to business practices and
processes outside the scope, and replacement or medication of existing software systems and
apps outside the infrastructure’s scope.
4
4.2.4. Firewalls logs;
4.2.5. Automated intrusion detection (AID) system logs;
4.2.6. Application logs;
4.2.7. Help desk trouble tickets;
4.2.8. Data recovery and backup logs; and
4.2.9. Fax and network printer logs.
4.3. The checks below will also be performed every six months by authorized or
assigned personnel:
4.3.1. Software and operating system licenses;
4.3.2. Unauthorized modem use;
4.3.3. Unsecure device sharing;
4.3.4. Unauthorized personal web services;
4.3.5. Unauthorized network devices; and
4.3.6. Password strength
4.4. All security concerns identified during system review or assessment will be
classified and mitigated based on three OWASP risk levels. Remediation validation
testing must be performed to validate mitigation/fix strategies for identified issues of
medium and high-risk levels. identified security vulnerabilities. The risk levels
include:
4.4.1. High – All high-risk issues must be mitigated or fixed immediately or
other mitigation approaches must be deployed to restrict exposure before
deployment. Systems or apps with high-risk issues must be removed or denied
release.
5
4.4.2. Medium – Medium risk concerns must be reviewed to establish what is
needed to address and scheduled accordingly. Apps or systems with medium
risk concerns must be removed or denied release based on their count or if
allowing multiple issues can increase the risk. Issues must be addressed or
fixed in a point/patch release unless other mitigation approaches can
potentially limit exposure.
4.4.3. Low – Low-risk issues must be reviewed to establish what is needed to
address them and scheduled accordingly.
4.5. Security concerns, vulnerabilities, and breaches identified will be immediately
forwarded to the ISO (Information Security Officer) for investigation and follow up.
4.6. Displinary action
Violation/breach of this policy would automatically result in employee termination
and fines.
4.7.
B. System Security Patch Management and Update Policy
6
Recommend best practices for monitoring, updating, and patching systems.
Instructions
Write a 6–10 page paper in which you:
Establish a system security monitoring policy addressing the need for monitoring, policy scope, and
exceptions and supported by specific, credible sources.
Justify the need for monitoring.
Define the scope of the policy (the personnel, equipment, and processes to which the policy
applies).
Provide guidelines for policy exceptions, if approved by the IT and Security departments.
Establish a system security patch management and updates policy addressing the need for patch
management and updates, policy scope, and exceptions and supported by specific, credible
sources.
Justify the need for patch management and updates, aligned with ISO/IEC 27002.
Define the scope of the policy (the personnel, equipment, and processes to which the policy
applies).
Provide guidelines for policy exceptions, if approved by the IT and Security departments.
Select your paper details and see how much our professional writing services will cost.
Our custom human-written papers from top essay writers are always free from plagiarism.
Your data and payment info stay secured every time you get our help from an essay writer.
Your money is safe with us. If your plans change, you can get it sent back to your card.
We offer more than just hand-crafted papers customized for you. Here are more of our greatest perks.