Unit_4_WorkSheet_2

docx

School

Lone Star College, CyFair *

*We aren’t endorsed by this school

Course

2279

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

7

Uploaded by EarlBear1147

Report
Unit 4 Privacy Data Security Gap Mitigation Recommendations Instructions: Given a Request for Proposal (RFP), the results of information technology (IT) security compliance and governance gap analysis, and a list of privacy data related gaps, describe each recommendation from the gap analysis and suggest at least one control change to satisfy the recommendation. Provide a narrative explaining the importance of mitigating each privacy data security gap. Privacy Data Security Gap Mitigation Control Mitigation Importance Personnel Background Investigation 1- Reinvestigation requirements. 2-Risk level changes. If an employee or appointee experiences a change to a higher position risk level due to promotion, demotion, or reassignment, or the risk level of the employee’s or appointee’s position is changed to a higher level. * Agencies must ensure that reinvestigations are conducted and a determination made regarding continued employment of persons occupying public trust positions at least once every 5 years * Agencies must notify all employees covered by this section of the reinvestigation requirements under this paragraph. 2- the employee or appointee may remain in or encumber the position. Any upgrade in the investigation required for the new risk level should be initiated within 14 calendar days after the promotion, demotion, reassignment or new designation of risk the level is final.
Unit 4 Privacy Data Security Gap Mitigation Recommendations Segregation of Duties SOD 1- Authorization or approval of transactions. 2- Custody of assets. 3-Reviewing and reconciliation transactions. 4- Monitoring user access rights 5- Reviewing financial reports . A manager or someone with the delegated authority approves certain transactions. Using an inventory, a manager authorizes the purchase and the budget. This is where that extra layer of financial auditing comes in for the inventory. The worker who records the items as received has their work reviewed and reconciled for accuracy and compliance. Separation of Development and Production Facilities Separating development and test activities from and restricting developer access to operational environments reduces the risks of inadvertent or unauthorized modifications to the operational system that could compromise the system’s integrity or availability. One worker orders the goods, and another worker marks the items as received in the company’s system . This way, the person who orders the items can’t pad the order with more than needed and take some for personal use at the company’s expense. Production Environment Access Control 1- change access to Group Policy Objects (GPOs) in the production environment of the domain. 2- replacing any existing permissions on those GPOs. 3- configure permissions at the domain level to either allow or prevent users from editing, deleting, or modifying the security of GPOs in the production environment when they are not using the Change Control folder in the Group Policy Management Console (GPMC). Changing how access to the production environment is delegated does not affect users' ability to link GPOs . add permissions for a user or group that does not have access to the production environment, or to replace the permissions for a user or group that does have access: Application Control 1- Removing local admin rights. 2- Enforcing least privilege. 3- Implementing application control policies. protecting the workstations beyond the corporate network is necessary. Workstations have become the new edge, and Windows, macOS and Linux devices present a common entry point for threat actors offers best practices for defending against breaches without hampering end user productivity or creating operational bottlenecks using an endpoint privilege manager . Operating System Access Control 1- protect your staff, customers, visitors, stock, and spaces within a building is the cornerstone of a well-functioning access access control systems should enable effortless movement and enhance the overall efficiencies of day-to-day business.
Unit 4 Privacy Data Security Gap Mitigation Recommendations control system 2- Access control solutions should help your business minimize risk and create a safe environment by controlling who can enter a building or access specific areas within the premises. 3- get a really good access control system for the company like Protege WX for small business. Protege GX Protege WX provides the user with the familiarity of a browser-based platform that is both flexible and intuitive, making daily access control management a breeze. ICT offers installers free online training, and should an end-users requirements change, the modular hardware design allows the system to scale with ease. Protege GX is an enterprise level integrated access control, intruder detection, and building automation solution with a feature set that is easy to operate, simple to integrate, and effortless to extend. Session Timeouts 1-Risk Identification 2- Evaluate potential third-party partnersContractual Safeguards and Onboarding. 3- Enhance contracts with risk mitigation 4- Ongoing Monitoring and Compliance. 5- Incident Response Planning. Begin with a comprehensive assessment of third- party relationships and their potential risks. using risk assessment criteria, ensuring alignment with your organization's standards. measures and integrates new partners with a focus on security and compliance. Establish mechanisms for continuous monitoring of third-party performance, compliance, and emerging risks. Collaboratively develop incident response plans to address potential disruptions or breaches involving third-party partners.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Unit 4 Privacy Data Security Gap Mitigation Recommendations Password Management 1- Set Up and Enforce Password Policies. 2- Use a Password Manager 3- Use a Second Factor (2FA/MFA) 4- Train Employees About Password Hygiene 5- Use Phishing Simulations to Reduce Password Theft. Password policies include everything associated with managing passwords and keeping passwords secure. a policy should include the safe storage of passwords and how often a password needs to be changed. such as Lastpass and password generators reduce password fatigue and, therefore, can help eliminate password reuse and sharing. Using a second factor, such as a mobile authentication code, is a useful way to add another layer of security to the access of an application. enforcing this policy requires employees to understand why secure passwords are essential. By training employees on how phishing works and what the tell-tale signs of a phishing message look like, a company can help prevent the theft of credentials via phishing. Use of Shared Technology Resources 1- The company must provide the CSP services 2- provide cloud security configuration tools and monitoring systems. 3- Provide Organizational administrators in the company are usually responsible for configuring application-level security ( access controls for authorization to data) CSPs and cloud customers share unique and overlapping responsibilities to ensure the security of services and sensitive data stored in public clouds. Shared technology resources affects routine operations, such as patch management, and exceptional events, such as security incident response. Monitoring System Access and Use 1- mitigation controls when it is not possible to separate Segregation of duties SoD from the business process. 2- use Mitigating Controls to associate controls with risks, and assign them to users, roles, profiles, or HR objects. 3- mitigation monitors are assigned to control monitor alerts. * Create mitigating controls (that you cannot remove) * Assign mitigating controls to users, roles, and profiles that contain a risk *Establish a period of time during which the control is valid * Specify steps to monitor conflicting actions associated with the risk * Create administrator, control monitors, approvers, and risk owners, and assign them to mitigating controls monitoring system Access allows company to proceed for risk analysis under Access Management Event Logging your audit logs should feature these elements: User ID Terminal identity Log on and log off time and date Systems, data, applications, files, and networks accessed When security breaks down and your application or network is compromised, event logging and monitoring can notify you that a problem exists as well as where the breach has occurred, enabling
Unit 4 Privacy Data Security Gap Mitigation Recommendations Failed attempts to access systems, data, applications, files, and networks Changes to system configurations and use of system utilities Alarms and other security events Activity from cybersecurity tools like the firewall or antivirus software activity within your applications needs to be regularly saved and analyzed Logged events typically include the following: *Application exceptions *Major events like startups, stops, and *restarts, as well as security events. *Error events that prevent the application from starting *Some debug information *SQL logs you to stop or limit the damage. It can also help you understand the vulnerabilities that have been exploited by an outside threat so you can attempt to recover or protect that data—or at least do what’s necessary to avoid similar breaches in the future. System Development and Maintenance Control 1-equipment maintenance 2- the information security related requirements should be included in the requirements for new information systems or enhancements to existing information systems. 3- Securing application services on public networks – information involved in application services passing over public networks should be protected from fraudulent activity, contract dispute and unauthorized disclosure and modification. Protecting application services transactions – Information involved in application service transactions should be protected to prevent incomplete transmission, misrouting, unauthorized message alteration, unauthorized The objective of Security requirements of information systems is to ensure that information security is an integral part of information systems across the entire lifecycle. This also includes the requirements for information systems which provide services over public networks. The objective of security in development and support processes is to ensure that information security is designed and implemented within the development lifecycle of information systems.
Unit 4 Privacy Data Security Gap Mitigation Recommendations disclosure, unauthorized message duplication or replay. User Registration and Authorization Authentication methods include something users know, something users have and something users are. Not every authentication type is created equal to protect the network, authentication methods range from offering basic protection to stronger security. Using more than one method -- multi factor authentication ( MFA ) -- is recommended. use user authentication types such as:- 1-Password-based authentication. 2 Two-factor/multi factor authentication 3-Biometric authentication 4-Single sign-on 5-Token-based authentication 6. Certificate-based authentication Requiring users to provide and prove their identity adds a layer of security between adversaries and sensitive data. With authentication, IT teams can employ least privilege access to limit what employees can see. The average employee, for example, doesn't need access to company financials, and accounts payable doesn't need to touch developer projects. Loss of User Privilege A privileged user is someone”trusted” who has administrative type access to critical systems which include:- System / DatabaseAdministrators Human Resources Staff Support Staff amend system configurations install and/or upgrade software and change access for other users. override existing security policies, make unauthorized system changes and access confidential data. The company should provide the best self hosted access management software to efficiently manage data and mitigate any security threat. If risks are identified, we collaborate to develop effective strategies for risk mitigation and remediation reduce company risk of fraud. privileged access rights can also be granted to Service Accounts User Privilege Control 1- manage the risk: implement a user management policy,access Management, password Management. 2- monitor activity, do an audit trail of changes to critical or master data such as address book,vendor,supplies. 3- Monthly user Access review. track changes to your critical data prevent and detect fraud in your ERP system.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Unit 4 Privacy Data Security Gap Mitigation Recommendations 4-Ask your vendors to regularly supply a list of their employees who are assigned to your account.