Instructions CIS Critical Security Control Assessment For this assignment, you will be selecting a total of nine of the critical security controls that you have learned about in this unit. You will...

1 answer below »

Instructions

CIS Critical Security Control Assessment

For this assignment, you will be selecting a total of nine of the critical security controls that you have learned about in this unit. You will then conduct Internet research about how the controls that you have selected are used in other organizations. This assignment builds upon your previous unit assignments; therefore, the assessment should be based on your previous choice of industries: aerospace, healthcare, or government agencies.


You must include the following information in your assignment.



  • Include a title page containing the company name and your name.

  • Choose three critical security controls from each critical security control category (basic, foundational, organizational) for a total of nine critical security controls. Explain how the controls you selected will be used in the organization’s critical asset based on what you have learned from your Internet research. Then create a risk assessment matrix that shows the impact (low, medium, or high) for each of the controls.

  • Identify where each of the categories will be located in the security document.

  • Include a reference page that contains at least three references.


Your critical security control assessment must be at least one page in length, not including the title page or references page. This assessment will be added to your outline to produce a completed project at the end of the course. (Hint: Be sure to read your study guide.) Adhere to APA Style when creating citations and references for this assignment. APA formatting, however, is not necessary.

Answered 5 days AfterMay 27, 2021

Answer To: Instructions CIS Critical Security Control Assessment For this assignment, you will be selecting a...

Deepti answered on Jun 02 2021
141 Votes
Critical Security Controls to be implemented for MedCare Hospital:
1. Continuous Vulnerability Management- This security con
trol shall offer operational and executive visibility and updated reporting. Continuous scanning will uncover critical vulnerability and protect MedCare from newest attacks.
2. Controlled use of administrative privileges- Administrative accounts will be validated and protected on workstations and servers and authorized users shall be protected from opening malicious contents through links, websites, etc. or revealing access to admin password.
3. Secure configuration for hardware and software on mobile devices, laptops, workstations and servers- MedCare shall maintain documented security configuration standards. It will reconfigure its DB systems, servers and network devices to secure standards and monitor any deviation.
4. Email and web browser protections- Any unauthorized browser or email client plugins shall be disabled and network-based URL filters shall be enforced. Sender Policy framework shall be beneficial to control malicious mail traffic.
5. Malware defense- Anti malware software shall be centrally managed and signatures shall be continuously updated. This software shall block malicious content...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here