For this assignment you will provide security advice for a fictional stakeholder. Assume that you are a cybersecurity consultant that has been brought on board to provide industry best practices. This means that your advice should not rely on your personal opinion, nor on the personal opinion of others. Seek out sources for INDUSTRY best practices - which means using a security framework. Use NIST (800-53). Do NOT prescribe specific technologies or products. Keep it platform neutral. For example, IA-4 calls for Identifier Management, which is solved with the following advice. "Use a centrally managed user repository with individual user IDs based on employee ID, but use aliases for email and IM accounts. This way customers and co-workers can identify contact information for employees, but username remains semi-confidential " The scenario: We need to set up a secure virtual boardroom. Our security people have found the following OSA (open-source architecture) pattern for what we need, but we aren't sure what we actually need to do to accomplish this. https://www.opensecurityarchitecture.org/cms/library/patternlandscape/292-pattern-board-roomLinks to an external site. Can you tell us what security protocols and procedures we need to do this securely and with compliance in mind?
For this assignment you will provide security advice for a fictional stakeholder. Assume that you are a
We need to set up a secure virtual boardroom. Our security people have found the following OSA (open-source architecture) pattern for what we need, but we aren't sure what we actually need to do to accomplish this. https://www.opensecurityarchitecture.org/cms/library/patternlandscape/292-pattern-board-roomLinks to an external site. Can you tell us what security protocols and procedures we need to do this securely and with compliance in mind?
Trending now
This is a popular solution!
Step by step
Solved in 3 steps