SlideShare a Scribd company logo
Worksheet 4: LAN/WAN Compliance and Auditing
look on the document below how its set up
Course Learning Outcome(s)
Analyze information security systems compliance requirements
within the Workstation and LAN Domains.
Design and implement ISS compliance within the LAN-to-WAN
and WAN domains with an appropriate framework.
As auditors, we presume that no data produced on a computer is
100% secure regardless of whether it’s a standalone device or
connected to a local area network (LAN) or a wide area network
(WAN). Organizations implement controls, which are developed
and implemented based on regulations and best security
practices. Security is implemented throughout an organizations
enterprise – from the host the user sits and throughout the
devices data traverses or is stored. Here’s an example of a basic
enterprise and the security controls that may be implemented.
Remember, controls can be physical or logical devices, software
or encryption.
Host – A host is a computer, tablet or other device that a user
interfaces with to perform a function. The device you’re reading
this on is a host. The security controls that could be
implemented onto a host include a Host Based Intrusion
Detection Systems (HIDS), Host Based Intrusion Prevention
System (HIPS), a software Firewall, and Antivirus protection.
Policy controls implemented on a host include Role Based
Access Control (RBAC), Discretionary Access Control (DAC),
Mandatory Access Control (MAC), Login requirements, lockout
settings and others that restrict what a user can and can’t do
while logged into a host and software to manage (allow and
deny) policies electronically (ePo).
Local Area Network – Think of a LAN as an internal network
used by an organization that allows user to execute functions
using various applications and storage while also having the
ability to connect to other organizations using the Internet or
Virtual Private Networks (VPN’s). A host connects to a switch
and data is routed to a router where it either access systems on
the LAN or to a router where it’s going to exchange data with
another LAN or WAN. The devices that comprise a LAN and
WAN are similar with a difference in that a WAN is built to a
much larger scale. As stated, in a network, there are many
devices, servers, switches, routers, storage, Call Managers (for
VoIP communications), firewalls, web content filters, security
appliances that manage Network Intrusion Detection Systems
(NIDS), Network Intrusion Prevention Systems (NIPS) and
other organization unique systems.
Often as a cost savings measure, services such as security, web
content filtering, storage, IP telephony, Software licensing
(SaaS) and others can be outsourced to a third party vendor. An
agreement is made between the organization and the vendor on
the expected requirements and documented in the contract.
These requirements are known as Service Level Agreements
(SLA).At no point does an organization relieve itself of
regulatory requirements for data protection by contracting it out
to a third party or organization external to itself. Regulatory
controls must be incorporated into the SLA’s and audited by the
company contracting services out to ensure compliance.
Repercussions for not meeting SLA requirements should also be
included in the SLA.
Read the scenario below and complete the associated
worksheet.
Tidewater LLC is an organization that produces and sells
apparel for men, women and children online. The company has
grown 70% over the past 2 years and is building a new facility
to support the continued growth. All current services with the
exception of managing their website are hosted by various third
party vendors. Because of the growth, the leadership within the
organization has not been able to validate compliance of the
SLA’s and feel that the vendors do not have the best interest of
Tidewater LLC in mind. Currently, there is a CIO and web
developer acting as the IT staff.
Tidewater LLC is in the process of recovering all IT services
into the server facility being housed in their new facility.
Tidewater LLC wishes establish and staff an IT department with
a system administrator, network administrator, two general
technicians, cyber security specialist and a full time system
auditor.
The new office is a 2000sqft open office with the server room
located in an adjacent room. Hardware supporting the
organizations IT services include 100 desktop computers
supporting the staff, network switches, routers, a firewall,
Maciffy Security Appliance to provide intrusion detection,
prevention and antivirus protection, Network Attached Storage
(NAS) for users to have a home drive as well as a shared
networked drive for collaboration and sharing, an IIS server for
website management and a call manager for VoIP. Wi-Fi access
points will be added as the network installation progresses.
Email will be managed by an exchange server. The only service
outsourced is a100mbps connection for Internet and VPN’s
between the organization and its suppliers.
Current employees are assigned desk with computer. There are
no prerequisite requirements such as training for users to have
accounts created. All data is stored by a third party vendor in a
shared environment. No controls are implemented to prevent
any user from accessing any other user’s files or folders.
You’ve been retained as an organizations auditor and your first
task is to determine what controls need to be implemented so
that the organization achieves a high level of sustained security
and compliance. Utilizing the NIST 800-53A, develop a control
sheet that the organization should implement and will not
impede with the organization’s mission. This control sheet
should encompass controls that apply to the users and systems
within the organization. You will brief these controls to the
CEO and CIO and explain why you choose these controls and
any impact it will have to the organization.
From the Access Control (AC) family of the NIST 800-53A,
select three controls you would recommend be implemented.
Control
Definition
Why Chosen
From the Security Awareness and Training Policy and
Procedures (AT) of the NIST 800-53A, select three controls you
would recommend be implemented.
Control
Definition
Why Chosen
From the Audit and Control (AU) section of the NIST 800-53A,
select three controls you would recommend be implemented.
Control
Definition
Why Chosen
From the Configuration Management (CM) section of the NIST
800-53A, select four controls you would recommend be
implemented.
Control
Definition
Why Chosen
From the Security Assessment and Authorization (CA) section
of the NIST 800-53A, select three controls you would
recommend be implemented.
Control
Definition
Why Chosen
From the Contingency Planning (CP) section of the NIST 800-
53A, select two controls you would recommend be
implemented.
Control
Definition
Why Chosen
From the Identification and Authentication Policy and
Procedures (IA) section of the NIST 800-53A, select three
controls you would recommend be implemented.
Control
Definition
Why Chosen

More Related Content

Similar to Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx

Deployment websese
Deployment webseseDeployment websese
Deployment websese
thanglx
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
HCLSoftware
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelinesamburyj3c9
 
Tools of noc
Tools of nocTools of noc
Tools of nocmunawarul
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowNuuko, Inc.
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
Happiest Minds Technologies
 
LD7007 Network Security.docx
LD7007 Network Security.docxLD7007 Network Security.docx
LD7007 Network Security.docx
stirlingvwriters
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Boney Maundu Slim
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
Ben Rothke
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
sarah david
 
Vazata Federal IaaS
Vazata Federal IaaSVazata Federal IaaS
Vazata Federal IaaS
ftculotta27
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
Brianna Johnson
 
tibbr Security Overview
tibbr Security Overviewtibbr Security Overview
tibbr Security Overview
tibbr
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
sarah david
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
RapidScale
 
Building Secure Services in the Cloud
Building Secure Services in the CloudBuilding Secure Services in the Cloud
Building Secure Services in the Cloud
Sumo Logic
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
Raj Sarode
 
here has been an increase in the number of cybersecurity incident re.docx
here has been an increase in the number of cybersecurity incident re.docxhere has been an increase in the number of cybersecurity incident re.docx
here has been an increase in the number of cybersecurity incident re.docx
simonithomas47935
 

Similar to Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx (20)

Deployment websese
Deployment webseseDeployment websese
Deployment websese
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
 
Tools of noc
Tools of nocTools of noc
Tools of noc
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
LD7007 Network Security.docx
LD7007 Network Security.docxLD7007 Network Security.docx
LD7007 Network Security.docx
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
Vazata Federal IaaS
Vazata Federal IaaSVazata Federal IaaS
Vazata Federal IaaS
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
tibbr Security Overview
tibbr Security Overviewtibbr Security Overview
tibbr Security Overview
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
 
Building Secure Services in the Cloud
Building Secure Services in the CloudBuilding Secure Services in the Cloud
Building Secure Services in the Cloud
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
here has been an increase in the number of cybersecurity incident re.docx
here has been an increase in the number of cybersecurity incident re.docxhere has been an increase in the number of cybersecurity incident re.docx
here has been an increase in the number of cybersecurity incident re.docx
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 

More from griffinruthie22

My country UAE No reflection UAE relies heavily on the busin.docx
My country UAE     No reflection UAE relies heavily on the busin.docxMy country UAE     No reflection UAE relies heavily on the busin.docx
My country UAE No reflection UAE relies heavily on the busin.docx
griffinruthie22
 
My degree is an EDD in Performance Improvement Leadership .docx
My degree is an EDD in Performance Improvement Leadership .docxMy degree is an EDD in Performance Improvement Leadership .docx
My degree is an EDD in Performance Improvement Leadership .docx
griffinruthie22
 
My name is Rachael Bamgboye. I am from African - Nigeria to be p.docx
My name is Rachael Bamgboye. I am from African - Nigeria to be p.docxMy name is Rachael Bamgboye. I am from African - Nigeria to be p.docx
My name is Rachael Bamgboye. I am from African - Nigeria to be p.docx
griffinruthie22
 
Must use the required Template below. No attachments. Do a copy.docx
Must use the required Template below. No attachments. Do a copy.docxMust use the required Template below. No attachments. Do a copy.docx
Must use the required Template below. No attachments. Do a copy.docx
griffinruthie22
 
My company is AmazonA software engineer designs, develop, te.docx
My company is AmazonA software engineer designs, develop, te.docxMy company is AmazonA software engineer designs, develop, te.docx
My company is AmazonA software engineer designs, develop, te.docx
griffinruthie22
 
My name is Hassan Almahdi. I was born and raised in a city in Saudi .docx
My name is Hassan Almahdi. I was born and raised in a city in Saudi .docxMy name is Hassan Almahdi. I was born and raised in a city in Saudi .docx
My name is Hassan Almahdi. I was born and raised in a city in Saudi .docx
griffinruthie22
 
My last name starts with an M DirectionsBased on the firs.docx
My last name starts with an M DirectionsBased on the firs.docxMy last name starts with an M DirectionsBased on the firs.docx
My last name starts with an M DirectionsBased on the firs.docx
griffinruthie22
 
My Bondage andMy FreedomByFrederick DouglasA Penn .docx
My Bondage andMy FreedomByFrederick DouglasA Penn .docxMy Bondage andMy FreedomByFrederick DouglasA Penn .docx
My Bondage andMy FreedomByFrederick DouglasA Penn .docx
griffinruthie22
 
My name is Meridith Hollins and I work and live in Birmingham, Alaba.docx
My name is Meridith Hollins and I work and live in Birmingham, Alaba.docxMy name is Meridith Hollins and I work and live in Birmingham, Alaba.docx
My name is Meridith Hollins and I work and live in Birmingham, Alaba.docx
griffinruthie22
 
My research topic is How does the company Whole Foods go abou.docx
My research topic is How does the company Whole Foods go abou.docxMy research topic is How does the company Whole Foods go abou.docx
My research topic is How does the company Whole Foods go abou.docx
griffinruthie22
 
My role is a cuban male, he coe to USA when he has 13 years, studied.docx
My role is a cuban male, he coe to USA when he has 13 years, studied.docxMy role is a cuban male, he coe to USA when he has 13 years, studied.docx
My role is a cuban male, he coe to USA when he has 13 years, studied.docx
griffinruthie22
 
My evaluation of journals will focus on originality, application of.docx
My evaluation of journals will focus on originality, application of.docxMy evaluation of journals will focus on originality, application of.docx
My evaluation of journals will focus on originality, application of.docx
griffinruthie22
 
My intent is to provide each member of the community of this class t.docx
My intent is to provide each member of the community of this class t.docxMy intent is to provide each member of the community of this class t.docx
My intent is to provide each member of the community of this class t.docx
griffinruthie22
 
My major is mechanical engineering. As you gave me an idea to relate.docx
My major is mechanical engineering. As you gave me an idea to relate.docxMy major is mechanical engineering. As you gave me an idea to relate.docx
My major is mechanical engineering. As you gave me an idea to relate.docx
griffinruthie22
 
Must use the attached articles · Present an argument.docx
Must use the attached articles · Present an argument.docxMust use the attached articles · Present an argument.docx
Must use the attached articles · Present an argument.docx
griffinruthie22
 
My hometown — Port Clinton, Ohio, population 6,050 — was in the 19.docx
My hometown — Port Clinton, Ohio, population 6,050 — was in the 19.docxMy hometown — Port Clinton, Ohio, population 6,050 — was in the 19.docx
My hometown — Port Clinton, Ohio, population 6,050 — was in the 19.docx
griffinruthie22
 
My degree is an EDD in Performance Improvement LeadershipSyste.docx
My degree is an EDD in Performance Improvement LeadershipSyste.docxMy degree is an EDD in Performance Improvement LeadershipSyste.docx
My degree is an EDD in Performance Improvement LeadershipSyste.docx
griffinruthie22
 
My homework is to answer 16 questions (questions are below). No need.docx
My homework is to answer 16 questions (questions are below). No need.docxMy homework is to answer 16 questions (questions are below). No need.docx
My homework is to answer 16 questions (questions are below). No need.docx
griffinruthie22
 
Must have to do with a FEDERAL administrative agency, not local or s.docx
Must have to do with a FEDERAL administrative agency, not local or s.docxMust have to do with a FEDERAL administrative agency, not local or s.docx
Must have to do with a FEDERAL administrative agency, not local or s.docx
griffinruthie22
 
Must follow attached text book In chapter 6, the author desc.docx
Must follow attached text book In chapter 6, the author desc.docxMust follow attached text book In chapter 6, the author desc.docx
Must follow attached text book In chapter 6, the author desc.docx
griffinruthie22
 

More from griffinruthie22 (20)

My country UAE No reflection UAE relies heavily on the busin.docx
My country UAE     No reflection UAE relies heavily on the busin.docxMy country UAE     No reflection UAE relies heavily on the busin.docx
My country UAE No reflection UAE relies heavily on the busin.docx
 
My degree is an EDD in Performance Improvement Leadership .docx
My degree is an EDD in Performance Improvement Leadership .docxMy degree is an EDD in Performance Improvement Leadership .docx
My degree is an EDD in Performance Improvement Leadership .docx
 
My name is Rachael Bamgboye. I am from African - Nigeria to be p.docx
My name is Rachael Bamgboye. I am from African - Nigeria to be p.docxMy name is Rachael Bamgboye. I am from African - Nigeria to be p.docx
My name is Rachael Bamgboye. I am from African - Nigeria to be p.docx
 
Must use the required Template below. No attachments. Do a copy.docx
Must use the required Template below. No attachments. Do a copy.docxMust use the required Template below. No attachments. Do a copy.docx
Must use the required Template below. No attachments. Do a copy.docx
 
My company is AmazonA software engineer designs, develop, te.docx
My company is AmazonA software engineer designs, develop, te.docxMy company is AmazonA software engineer designs, develop, te.docx
My company is AmazonA software engineer designs, develop, te.docx
 
My name is Hassan Almahdi. I was born and raised in a city in Saudi .docx
My name is Hassan Almahdi. I was born and raised in a city in Saudi .docxMy name is Hassan Almahdi. I was born and raised in a city in Saudi .docx
My name is Hassan Almahdi. I was born and raised in a city in Saudi .docx
 
My last name starts with an M DirectionsBased on the firs.docx
My last name starts with an M DirectionsBased on the firs.docxMy last name starts with an M DirectionsBased on the firs.docx
My last name starts with an M DirectionsBased on the firs.docx
 
My Bondage andMy FreedomByFrederick DouglasA Penn .docx
My Bondage andMy FreedomByFrederick DouglasA Penn .docxMy Bondage andMy FreedomByFrederick DouglasA Penn .docx
My Bondage andMy FreedomByFrederick DouglasA Penn .docx
 
My name is Meridith Hollins and I work and live in Birmingham, Alaba.docx
My name is Meridith Hollins and I work and live in Birmingham, Alaba.docxMy name is Meridith Hollins and I work and live in Birmingham, Alaba.docx
My name is Meridith Hollins and I work and live in Birmingham, Alaba.docx
 
My research topic is How does the company Whole Foods go abou.docx
My research topic is How does the company Whole Foods go abou.docxMy research topic is How does the company Whole Foods go abou.docx
My research topic is How does the company Whole Foods go abou.docx
 
My role is a cuban male, he coe to USA when he has 13 years, studied.docx
My role is a cuban male, he coe to USA when he has 13 years, studied.docxMy role is a cuban male, he coe to USA when he has 13 years, studied.docx
My role is a cuban male, he coe to USA when he has 13 years, studied.docx
 
My evaluation of journals will focus on originality, application of.docx
My evaluation of journals will focus on originality, application of.docxMy evaluation of journals will focus on originality, application of.docx
My evaluation of journals will focus on originality, application of.docx
 
My intent is to provide each member of the community of this class t.docx
My intent is to provide each member of the community of this class t.docxMy intent is to provide each member of the community of this class t.docx
My intent is to provide each member of the community of this class t.docx
 
My major is mechanical engineering. As you gave me an idea to relate.docx
My major is mechanical engineering. As you gave me an idea to relate.docxMy major is mechanical engineering. As you gave me an idea to relate.docx
My major is mechanical engineering. As you gave me an idea to relate.docx
 
Must use the attached articles · Present an argument.docx
Must use the attached articles · Present an argument.docxMust use the attached articles · Present an argument.docx
Must use the attached articles · Present an argument.docx
 
My hometown — Port Clinton, Ohio, population 6,050 — was in the 19.docx
My hometown — Port Clinton, Ohio, population 6,050 — was in the 19.docxMy hometown — Port Clinton, Ohio, population 6,050 — was in the 19.docx
My hometown — Port Clinton, Ohio, population 6,050 — was in the 19.docx
 
My degree is an EDD in Performance Improvement LeadershipSyste.docx
My degree is an EDD in Performance Improvement LeadershipSyste.docxMy degree is an EDD in Performance Improvement LeadershipSyste.docx
My degree is an EDD in Performance Improvement LeadershipSyste.docx
 
My homework is to answer 16 questions (questions are below). No need.docx
My homework is to answer 16 questions (questions are below). No need.docxMy homework is to answer 16 questions (questions are below). No need.docx
My homework is to answer 16 questions (questions are below). No need.docx
 
Must have to do with a FEDERAL administrative agency, not local or s.docx
Must have to do with a FEDERAL administrative agency, not local or s.docxMust have to do with a FEDERAL administrative agency, not local or s.docx
Must have to do with a FEDERAL administrative agency, not local or s.docx
 
Must follow attached text book In chapter 6, the author desc.docx
Must follow attached text book In chapter 6, the author desc.docxMust follow attached text book In chapter 6, the author desc.docx
Must follow attached text book In chapter 6, the author desc.docx
 

Recently uploaded

Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 

Recently uploaded (20)

Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 

Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx

  • 1. Worksheet 4: LAN/WAN Compliance and Auditing look on the document below how its set up Course Learning Outcome(s) Analyze information security systems compliance requirements within the Workstation and LAN Domains. Design and implement ISS compliance within the LAN-to-WAN and WAN domains with an appropriate framework. As auditors, we presume that no data produced on a computer is 100% secure regardless of whether it’s a standalone device or connected to a local area network (LAN) or a wide area network (WAN). Organizations implement controls, which are developed and implemented based on regulations and best security practices. Security is implemented throughout an organizations enterprise – from the host the user sits and throughout the devices data traverses or is stored. Here’s an example of a basic enterprise and the security controls that may be implemented. Remember, controls can be physical or logical devices, software or encryption. Host – A host is a computer, tablet or other device that a user interfaces with to perform a function. The device you’re reading this on is a host. The security controls that could be implemented onto a host include a Host Based Intrusion Detection Systems (HIDS), Host Based Intrusion Prevention System (HIPS), a software Firewall, and Antivirus protection. Policy controls implemented on a host include Role Based Access Control (RBAC), Discretionary Access Control (DAC),
  • 2. Mandatory Access Control (MAC), Login requirements, lockout settings and others that restrict what a user can and can’t do while logged into a host and software to manage (allow and deny) policies electronically (ePo). Local Area Network – Think of a LAN as an internal network used by an organization that allows user to execute functions using various applications and storage while also having the ability to connect to other organizations using the Internet or Virtual Private Networks (VPN’s). A host connects to a switch and data is routed to a router where it either access systems on the LAN or to a router where it’s going to exchange data with another LAN or WAN. The devices that comprise a LAN and WAN are similar with a difference in that a WAN is built to a much larger scale. As stated, in a network, there are many devices, servers, switches, routers, storage, Call Managers (for VoIP communications), firewalls, web content filters, security appliances that manage Network Intrusion Detection Systems (NIDS), Network Intrusion Prevention Systems (NIPS) and other organization unique systems. Often as a cost savings measure, services such as security, web content filtering, storage, IP telephony, Software licensing (SaaS) and others can be outsourced to a third party vendor. An agreement is made between the organization and the vendor on the expected requirements and documented in the contract. These requirements are known as Service Level Agreements (SLA).At no point does an organization relieve itself of regulatory requirements for data protection by contracting it out to a third party or organization external to itself. Regulatory controls must be incorporated into the SLA’s and audited by the company contracting services out to ensure compliance. Repercussions for not meeting SLA requirements should also be included in the SLA. Read the scenario below and complete the associated
  • 3. worksheet. Tidewater LLC is an organization that produces and sells apparel for men, women and children online. The company has grown 70% over the past 2 years and is building a new facility to support the continued growth. All current services with the exception of managing their website are hosted by various third party vendors. Because of the growth, the leadership within the organization has not been able to validate compliance of the SLA’s and feel that the vendors do not have the best interest of Tidewater LLC in mind. Currently, there is a CIO and web developer acting as the IT staff. Tidewater LLC is in the process of recovering all IT services into the server facility being housed in their new facility. Tidewater LLC wishes establish and staff an IT department with a system administrator, network administrator, two general technicians, cyber security specialist and a full time system auditor. The new office is a 2000sqft open office with the server room located in an adjacent room. Hardware supporting the organizations IT services include 100 desktop computers supporting the staff, network switches, routers, a firewall, Maciffy Security Appliance to provide intrusion detection, prevention and antivirus protection, Network Attached Storage (NAS) for users to have a home drive as well as a shared networked drive for collaboration and sharing, an IIS server for website management and a call manager for VoIP. Wi-Fi access points will be added as the network installation progresses. Email will be managed by an exchange server. The only service outsourced is a100mbps connection for Internet and VPN’s between the organization and its suppliers. Current employees are assigned desk with computer. There are no prerequisite requirements such as training for users to have
  • 4. accounts created. All data is stored by a third party vendor in a shared environment. No controls are implemented to prevent any user from accessing any other user’s files or folders. You’ve been retained as an organizations auditor and your first task is to determine what controls need to be implemented so that the organization achieves a high level of sustained security and compliance. Utilizing the NIST 800-53A, develop a control sheet that the organization should implement and will not impede with the organization’s mission. This control sheet should encompass controls that apply to the users and systems within the organization. You will brief these controls to the CEO and CIO and explain why you choose these controls and any impact it will have to the organization. From the Access Control (AC) family of the NIST 800-53A, select three controls you would recommend be implemented. Control Definition Why Chosen From the Security Awareness and Training Policy and Procedures (AT) of the NIST 800-53A, select three controls you would recommend be implemented. Control Definition Why Chosen From the Audit and Control (AU) section of the NIST 800-53A, select three controls you would recommend be implemented.
  • 5. Control Definition Why Chosen From the Configuration Management (CM) section of the NIST 800-53A, select four controls you would recommend be implemented. Control Definition Why Chosen From the Security Assessment and Authorization (CA) section of the NIST 800-53A, select three controls you would recommend be implemented. Control Definition Why Chosen From the Contingency Planning (CP) section of the NIST 800- 53A, select two controls you would recommend be implemented. Control Definition Why Chosen
  • 6. From the Identification and Authentication Policy and Procedures (IA) section of the NIST 800-53A, select three controls you would recommend be implemented. Control Definition Why Chosen