SlideShare a Scribd company logo
1 of 1
Every endpoint on the organization’s network must be properly secured, hardened, and
managed throughout its life cycle to ensure that it is patched, and its vulnerabilities are
remediated. Endpoints include servers, desktop computers, laptops, network infrastructure
devices, and other assets on the organization’s network. In addition, Identity and Access
Management (IAM) systems and processes will need to be implemented for management and
control of enterprise resources. In a 4-5-page paper in MS Word provide the following:
Describe in detail as the CCISO how key endpoint security controls should be considered and
implemented when hardening assets.
Describe Identity and access management (IAM) systems and processes for management and
control access of enterprise resources. Specifically describe the Subject, Object, and Access
components of IAM.
Describe the functions of identification, authentication, authorization, and
accountability/auditing as IAM fundamentals
Provide the 4-5-page Word paper in the following format:
Title Page (does not count towards the page length requirement)
Key Endpoint Security Controls
IAM Systems
IAM Fundamentals
Conclusion
APA Reference Page does not count towards the page length requirement)

More Related Content

Similar to Every endpoint on the organizations network must be properly secured-.docx

Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxRunning Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
healdkathaleen
 
Assignment 1 Single Sign-On AccessSome business and organizat.docx
Assignment 1 Single Sign-On AccessSome business and organizat.docxAssignment 1 Single Sign-On AccessSome business and organizat.docx
Assignment 1 Single Sign-On AccessSome business and organizat.docx
sherni1
 
20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx
Anand Dhouni
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
ogglili
 

Similar to Every endpoint on the organizations network must be properly secured-.docx (20)

Intelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementIntelligence Driven Identity and Access Management
Intelligence Driven Identity and Access Management
 
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxRunning Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
 
VANMATHY V cloud computing
VANMATHY V cloud computingVANMATHY V cloud computing
VANMATHY V cloud computing
 
Cis controls v8_guide (1)
Cis controls v8_guide (1)Cis controls v8_guide (1)
Cis controls v8_guide (1)
 
Assignment 1 Single Sign-On AccessSome business and organizat.docx
Assignment 1 Single Sign-On AccessSome business and organizat.docxAssignment 1 Single Sign-On AccessSome business and organizat.docx
Assignment 1 Single Sign-On AccessSome business and organizat.docx
 
Tft2 Task3 Essay
Tft2 Task3 EssayTft2 Task3 Essay
Tft2 Task3 Essay
 
Defining Enterprise Identity Management
Defining Enterprise Identity ManagementDefining Enterprise Identity Management
Defining Enterprise Identity Management
 
Aws security at_scale_governance_in_aws_
Aws security at_scale_governance_in_aws_Aws security at_scale_governance_in_aws_
Aws security at_scale_governance_in_aws_
 
20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx
 
Resume
ResumeResume
Resume
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industry
 
Content Management System
Content Management SystemContent Management System
Content Management System
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
 
Saipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_VitaeSaipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_Vitae
 
Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)
 
IDSA at Denver IAM Meetup
IDSA at Denver IAM MeetupIDSA at Denver IAM Meetup
IDSA at Denver IAM Meetup
 
IAM Solution
IAM  SolutionIAM  Solution
IAM Solution
 
Build Your Career With Sailpoint Training.pdf
Build Your Career With Sailpoint Training.pdfBuild Your Career With Sailpoint Training.pdf
Build Your Career With Sailpoint Training.pdf
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
 
OWASP Top 10 List Overview for Web Developers
OWASP Top 10 List Overview for Web DevelopersOWASP Top 10 List Overview for Web Developers
OWASP Top 10 List Overview for Web Developers
 

More from rosaliaj1

discuss the following-The St- Fleur family is well respected in the Ha.docx
discuss the following-The St- Fleur family is well respected in the Ha.docxdiscuss the following-The St- Fleur family is well respected in the Ha.docx
discuss the following-The St- Fleur family is well respected in the Ha.docx
rosaliaj1
 
Discuss how the IHI (Institute for Healthcare Improvement) Quadruple A.docx
Discuss how the IHI (Institute for Healthcare Improvement) Quadruple A.docxDiscuss how the IHI (Institute for Healthcare Improvement) Quadruple A.docx
Discuss how the IHI (Institute for Healthcare Improvement) Quadruple A.docx
rosaliaj1
 
DescriptionGlobalization is the process of interaction and integration.docx
DescriptionGlobalization is the process of interaction and integration.docxDescriptionGlobalization is the process of interaction and integration.docx
DescriptionGlobalization is the process of interaction and integration.docx
rosaliaj1
 

More from rosaliaj1 (20)

Discuss the similarities and differences between Prisons and Jails-Wha.docx
Discuss the similarities and differences between Prisons and Jails-Wha.docxDiscuss the similarities and differences between Prisons and Jails-Wha.docx
Discuss the similarities and differences between Prisons and Jails-Wha.docx
 
discuss the following-The Purnell Model for Cultural Competence and it.docx
discuss the following-The Purnell Model for Cultural Competence and it.docxdiscuss the following-The Purnell Model for Cultural Competence and it.docx
discuss the following-The Purnell Model for Cultural Competence and it.docx
 
Discuss the features of surrealism in one Surrealist artwork (pp-915-9.docx
Discuss the features of surrealism in one Surrealist artwork (pp-915-9.docxDiscuss the features of surrealism in one Surrealist artwork (pp-915-9.docx
Discuss the features of surrealism in one Surrealist artwork (pp-915-9.docx
 
discuss the following-The St- Fleur family is well respected in the Ha.docx
discuss the following-The St- Fleur family is well respected in the Ha.docxdiscuss the following-The St- Fleur family is well respected in the Ha.docx
discuss the following-The St- Fleur family is well respected in the Ha.docx
 
Discuss how the IHI (Institute for Healthcare Improvement) Quadruple A.docx
Discuss how the IHI (Institute for Healthcare Improvement) Quadruple A.docxDiscuss how the IHI (Institute for Healthcare Improvement) Quadruple A.docx
Discuss how the IHI (Institute for Healthcare Improvement) Quadruple A.docx
 
discuss the following-Mary and Elmers fifth child- Melvin- was born 6.docx
discuss the following-Mary and Elmers fifth child- Melvin- was born 6.docxdiscuss the following-Mary and Elmers fifth child- Melvin- was born 6.docx
discuss the following-Mary and Elmers fifth child- Melvin- was born 6.docx
 
Discuss the differences between the criminal courts and the civil cour.docx
Discuss the differences between the criminal courts and the civil cour.docxDiscuss the differences between the criminal courts and the civil cour.docx
Discuss the differences between the criminal courts and the civil cour.docx
 
Discuss the aspects of your chosen vulnerable population-Discuss the r.docx
Discuss the aspects of your chosen vulnerable population-Discuss the r.docxDiscuss the aspects of your chosen vulnerable population-Discuss the r.docx
Discuss the aspects of your chosen vulnerable population-Discuss the r.docx
 
Discuss how strategies are translated into action plans-ExpectationsIn.docx
Discuss how strategies are translated into action plans-ExpectationsIn.docxDiscuss how strategies are translated into action plans-ExpectationsIn.docx
Discuss how strategies are translated into action plans-ExpectationsIn.docx
 
Disaster Planning and RecoveryFrom a healthcare organization perspecti.docx
Disaster Planning and RecoveryFrom a healthcare organization perspecti.docxDisaster Planning and RecoveryFrom a healthcare organization perspecti.docx
Disaster Planning and RecoveryFrom a healthcare organization perspecti.docx
 
Directions-Many of us have been impacted by outbreaks of disease in ou.docx
Directions-Many of us have been impacted by outbreaks of disease in ou.docxDirections-Many of us have been impacted by outbreaks of disease in ou.docx
Directions-Many of us have been impacted by outbreaks of disease in ou.docx
 
Directions-Consider the scenario below- then follow the instructions u.docx
Directions-Consider the scenario below- then follow the instructions u.docxDirections-Consider the scenario below- then follow the instructions u.docx
Directions-Consider the scenario below- then follow the instructions u.docx
 
Directions-Genetic engineering has become a part of our culture- and i.docx
Directions-Genetic engineering has become a part of our culture- and i.docxDirections-Genetic engineering has become a part of our culture- and i.docx
Directions-Genetic engineering has become a part of our culture- and i.docx
 
Diagnostic ModelsDiscussion Question(s) for Response- What are the maj.docx
Diagnostic ModelsDiscussion Question(s) for Response- What are the maj.docxDiagnostic ModelsDiscussion Question(s) for Response- What are the maj.docx
Diagnostic ModelsDiscussion Question(s) for Response- What are the maj.docx
 
Differentiate between a leadership and a management mindset by doing t.docx
Differentiate between a leadership and a management mindset by doing t.docxDifferentiate between a leadership and a management mindset by doing t.docx
Differentiate between a leadership and a management mindset by doing t.docx
 
DescriptionGlobalization is the process of interaction and integration.docx
DescriptionGlobalization is the process of interaction and integration.docxDescriptionGlobalization is the process of interaction and integration.docx
DescriptionGlobalization is the process of interaction and integration.docx
 
Did you attend preschool-Do you know what the preschool options were w.docx
Did you attend preschool-Do you know what the preschool options were w.docxDid you attend preschool-Do you know what the preschool options were w.docx
Did you attend preschool-Do you know what the preschool options were w.docx
 
Directions-Disorders of the endocrine system affect many individuals-.docx
Directions-Disorders of the endocrine system affect many individuals-.docxDirections-Disorders of the endocrine system affect many individuals-.docx
Directions-Disorders of the endocrine system affect many individuals-.docx
 
Directions-Every year- natural disasters impact families- communities-.docx
Directions-Every year- natural disasters impact families- communities-.docxDirections-Every year- natural disasters impact families- communities-.docx
Directions-Every year- natural disasters impact families- communities-.docx
 
Description-During the Week 2 Assignment- Project Plan- you chose a to.docx
Description-During the Week 2 Assignment- Project Plan- you chose a to.docxDescription-During the Week 2 Assignment- Project Plan- you chose a to.docx
Description-During the Week 2 Assignment- Project Plan- you chose a to.docx
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 

Every endpoint on the organizations network must be properly secured-.docx

  • 1. Every endpoint on the organization’s network must be properly secured, hardened, and managed throughout its life cycle to ensure that it is patched, and its vulnerabilities are remediated. Endpoints include servers, desktop computers, laptops, network infrastructure devices, and other assets on the organization’s network. In addition, Identity and Access Management (IAM) systems and processes will need to be implemented for management and control of enterprise resources. In a 4-5-page paper in MS Word provide the following: Describe in detail as the CCISO how key endpoint security controls should be considered and implemented when hardening assets. Describe Identity and access management (IAM) systems and processes for management and control access of enterprise resources. Specifically describe the Subject, Object, and Access components of IAM. Describe the functions of identification, authentication, authorization, and accountability/auditing as IAM fundamentals Provide the 4-5-page Word paper in the following format: Title Page (does not count towards the page length requirement) Key Endpoint Security Controls IAM Systems IAM Fundamentals Conclusion APA Reference Page does not count towards the page length requirement)